CLOUDSTACK-1578 SRX: Egress default policy configurable using network offering 
on SRX firewall


Project: http://git-wip-us.apache.org/repos/asf/cloudstack/repo
Commit: http://git-wip-us.apache.org/repos/asf/cloudstack/commit/07034b62
Tree: http://git-wip-us.apache.org/repos/asf/cloudstack/tree/07034b62
Diff: http://git-wip-us.apache.org/repos/asf/cloudstack/diff/07034b62

Branch: refs/heads/master-6-17-stable
Commit: 07034b620620d084ee50810ba986d1b15fa16e9b
Parents: 32b43d2
Author: Jayapal <jaya...@apache.org>
Authored: Thu Jun 20 16:28:09 2013 +0530
Committer: Jayapal <jaya...@apache.org>
Committed: Mon Jun 24 14:30:23 2013 +0530

----------------------------------------------------------------------
 .../com/cloud/agent/api/to/FirewallRuleTO.java  | 19 ++++-
 .../network/resource/JuniperSrxResource.java    | 86 ++++++++++++++------
 scripts/network/juniper/security-policy-add.xml |  3 +-
 .../ExternalFirewallDeviceManagerImpl.java      | 24 ++----
 4 files changed, 86 insertions(+), 46 deletions(-)
----------------------------------------------------------------------


http://git-wip-us.apache.org/repos/asf/cloudstack/blob/07034b62/api/src/com/cloud/agent/api/to/FirewallRuleTO.java
----------------------------------------------------------------------
diff --git a/api/src/com/cloud/agent/api/to/FirewallRuleTO.java 
b/api/src/com/cloud/agent/api/to/FirewallRuleTO.java
index f296aa4..29d9c6f 100644
--- a/api/src/com/cloud/agent/api/to/FirewallRuleTO.java
+++ b/api/src/com/cloud/agent/api/to/FirewallRuleTO.java
@@ -53,6 +53,9 @@ public class FirewallRuleTO implements InternalIdentity {
     private Integer icmpType;
     private Integer icmpCode;
     private FirewallRule.TrafficType trafficType;
+    private String guestCidr;
+    private boolean defaultEgressPolicy;
+    private FirewallRule.FirewallRuleType type;
 
     protected FirewallRuleTO() {
     }
@@ -110,9 +113,12 @@ public class FirewallRuleTO implements InternalIdentity {
         this(rule.getId(),srcVlanTag, srcIp, rule.getProtocol(), 
rule.getSourcePortStart(), rule.getSourcePortEnd(), revokeState, alreadyAdded, 
purpose,rule.getSourceCidrList(),rule.getIcmpType(),rule.getIcmpCode());
     }
 
-    public FirewallRuleTO(FirewallRule rule, String guestVlanTag, 
FirewallRule.TrafficType trafficType) {
+    public FirewallRuleTO(FirewallRule rule, String guestVlanTag, 
FirewallRule.TrafficType trafficType, String guestCidr, boolean 
defaultEgressPolicy, FirewallRule.FirewallRuleType type) {
         this(rule.getId(), guestVlanTag, null, rule.getProtocol(), 
rule.getSourcePortStart(), rule.getSourcePortEnd(), 
rule.getState()==State.Revoke, rule.getState()==State.Active, 
rule.getPurpose(), rule.getSourceCidrList(), rule.getIcmpType(), 
rule.getIcmpCode());
         this.trafficType = trafficType;
+        this.defaultEgressPolicy = defaultEgressPolicy;
+        this.guestCidr = guestCidr;
+        this.type = type;
     }
 
     public FirewallRule.TrafficType getTrafficType(){
@@ -170,4 +176,15 @@ public class FirewallRuleTO implements InternalIdentity {
         return purpose;
     }
 
+    public boolean isDefaultEgressPolicy() {
+        return defaultEgressPolicy;
+    }
+
+    public String getGuestCidr() {
+        return guestCidr;
+    }
+
+    public FirewallRule.FirewallRuleType getType() {
+        return type;
+    }
 }

http://git-wip-us.apache.org/repos/asf/cloudstack/blob/07034b62/plugins/network-elements/juniper-srx/src/com/cloud/network/resource/JuniperSrxResource.java
----------------------------------------------------------------------
diff --git 
a/plugins/network-elements/juniper-srx/src/com/cloud/network/resource/JuniperSrxResource.java
 
b/plugins/network-elements/juniper-srx/src/com/cloud/network/resource/JuniperSrxResource.java
index fd065d5..3d3d797 100644
--- 
a/plugins/network-elements/juniper-srx/src/com/cloud/network/resource/JuniperSrxResource.java
+++ 
b/plugins/network-elements/juniper-srx/src/com/cloud/network/resource/JuniperSrxResource.java
@@ -22,6 +22,7 @@ import java.io.IOException;
 import java.io.InputStreamReader;
 import java.io.PrintWriter;
 import java.io.StringReader;
+import java.lang.String;
 import java.net.Socket;
 import java.net.SocketTimeoutException;
 import java.util.ArrayList;
@@ -321,7 +322,8 @@ public class JuniperSrxResource implements ServerResource {
         STATIC_NAT("staticnat"),
         DESTINATION_NAT("destnat"),
         VPN("vpn"),
-        SECURITYPOLICY_EGRESS("egress");
+        SECURITYPOLICY_EGRESS("egress"),
+        SECURITYPOLICY_EGRESS_DEFAULT("egress-default");
 
         private String identifier;
 
@@ -828,15 +830,37 @@ public class JuniperSrxResource implements ServerResource 
{
             if (rules[0].getTrafficType() == FirewallRule.TrafficType.Egress) {
                 Map<String, ArrayList<FirewallRuleTO>> activeRules = 
getActiveFirewallEgressRules(rules);
                 Set<String> guestVlans = activeRules.keySet();
-                List<String> cidrs = new ArrayList();
+               // List<String> cidrs = new ArrayList();
+                boolean defaultEgressPolicy = rules[0].isDefaultEgressPolicy();
+                FirewallRule.FirewallRuleType type = rules[0].getType();
+                //getting
+                String guestCidr = rules[0].getGuestCidr();
 
                 for (String guestVlan : guestVlans) {
                     List<FirewallRuleTO> activeRulesForGuestNw = 
activeRules.get(guestVlan);
 
-                    
removeEgressSecurityPolicyAndApplications(SecurityPolicyType.SECURITYPOLICY_EGRESS,
 guestVlan, extractCidrs(activeRulesForGuestNw));
-                    if (activeRulesForGuestNw.size() > 0) {
-                        
addEgressSecurityPolicyAndApplications(SecurityPolicyType.SECURITYPOLICY_EGRESS,
 guestVlan, extractApplications(activeRulesForGuestNw), 
extractCidrs(activeRulesForGuestNw));
+                    
removeEgressSecurityPolicyAndApplications(SecurityPolicyType.SECURITYPOLICY_EGRESS,
 guestVlan, extractCidrs(activeRulesForGuestNw), defaultEgressPolicy);
+                    if (activeRulesForGuestNw.size() > 0 && type == 
FirewallRule.FirewallRuleType.User) {
+                        
addEgressSecurityPolicyAndApplications(SecurityPolicyType.SECURITYPOLICY_EGRESS,
 guestVlan, extractApplications(activeRulesForGuestNw), 
extractCidrs(activeRulesForGuestNw), defaultEgressPolicy);
                     }
+
+                    List<Object[]> applications = new ArrayList<Object[]>();
+                    Object[] application = new Object[3];
+                    application[0] = Protocol.all;
+                    application[1] = NetUtils.PORT_RANGE_MIN;
+                    application[2] = NetUtils.PORT_RANGE_MAX;
+                    applications.add(application);
+
+                    List<String> cidrs = new ArrayList<String>();
+                    cidrs.add(guestCidr);
+                    //remove required with out comparing default policy  
because in upgrade network offering we may required to delete
+                    // the previously added rule
+                    
removeEgressSecurityPolicyAndApplications(SecurityPolicyType.SECURITYPOLICY_EGRESS_DEFAULT,
 guestVlan, cidrs, false);
+                    if (defaultEgressPolicy == true) {
+                        //add default egress security policy
+                        
addEgressSecurityPolicyAndApplications(SecurityPolicyType.SECURITYPOLICY_EGRESS_DEFAULT,
 guestVlan, applications, cidrs, false);
+                    }
+
                 }
                 commitConfiguration();
             } else {
@@ -1046,7 +1070,7 @@ public class JuniperSrxResource implements ServerResource 
{
                
                // Delete all security policies
                for (String securityPolicyName : 
getVpnObjectNames(SrxXml.SECURITY_POLICY_GETALL, accountId)) {
-            manageSecurityPolicy(SecurityPolicyType.VPN, SrxCommand.DELETE, 
accountId, null, null, null, null, securityPolicyName);
+            manageSecurityPolicy(SecurityPolicyType.VPN, SrxCommand.DELETE, 
accountId, null, null, null, null, securityPolicyName, false);
                }
                
                // Delete all address book entries 
@@ -1118,7 +1142,7 @@ public class JuniperSrxResource implements ServerResource 
{
                        manageAddressBookEntry(srxCmd, _privateZone , 
guestNetworkCidr, ipsecVpnName);
                        
                        // Security policy
-                manageSecurityPolicy(SecurityPolicyType.VPN, srxCmd, null, 
null, guestNetworkCidr, null, null, ipsecVpnName);
+                manageSecurityPolicy(SecurityPolicyType.VPN, srxCmd, null, 
null, guestNetworkCidr, null, null, ipsecVpnName, false);
                }
                
                commitConfiguration();
@@ -2511,7 +2535,7 @@ public class JuniperSrxResource implements ServerResource 
{
         if (protocol.equals(Protocol.any)) {
             return Protocol.any.toString();
         } else {
-            if (type.equals(SecurityPolicyType.SECURITYPOLICY_EGRESS)) {
+            if (type.equals(SecurityPolicyType.SECURITYPOLICY_EGRESS) || 
type.equals(SecurityPolicyType.SECURITYPOLICY_EGRESS_DEFAULT)) {
                 return genObjectName(type.getIdentifier(), 
protocol.toString(), String.valueOf(startPort), String.valueOf(endPort));
             } else {
                 return genObjectName(protocol.toString(), 
String.valueOf(startPort), String.valueOf(endPort));
@@ -2528,7 +2552,7 @@ public class JuniperSrxResource implements ServerResource 
{
         Integer endPort;
         int offset = 0;
         try {
-            offset = type.equals(SecurityPolicyType.SECURITYPOLICY_EGRESS) ? 1 
: 0;
+            offset = (type.equals(SecurityPolicyType.SECURITYPOLICY_EGRESS) || 
type.equals(SecurityPolicyType.SECURITYPOLICY_EGRESS_DEFAULT))? 1 : 0;
             protocol = getProtocol(applicationComponents[offset + 0]);
             startPort = Integer.parseInt(applicationComponents[offset + 1]);
             endPort = Integer.parseInt(applicationComponents[offset + 2]);
@@ -2694,7 +2718,7 @@ public class JuniperSrxResource implements ServerResource 
{
         }                  
     }
 
-    private boolean manageSecurityPolicy(SecurityPolicyType type, SrxCommand 
command, Long accountId, String username, String privateIp, List<String> 
applicationNames, List<String> cidrs, String ipsecVpnName) throws 
ExecutionException {
+    private boolean manageSecurityPolicy(SecurityPolicyType type, SrxCommand 
command, Long accountId, String username, String privateIp, List<String> 
applicationNames, List<String> cidrs, String ipsecVpnName, boolean 
defaultEgressAction) throws ExecutionException {
         String fromZone = _publicZone;
         String toZone = _privateZone;
         
@@ -2704,7 +2728,7 @@ public class JuniperSrxResource implements ServerResource 
{
         if (type.equals(SecurityPolicyType.VPN) && ipsecVpnName != null) {
             securityPolicyName = ipsecVpnName;
             addressBookEntryName = ipsecVpnName;
-        } else if (type.equals(SecurityPolicyType.SECURITYPOLICY_EGRESS)) {
+        } else if (type.equals(SecurityPolicyType.SECURITYPOLICY_EGRESS) || 
type.equals(SecurityPolicyType.SECURITYPOLICY_EGRESS_DEFAULT)) {
             fromZone = _privateZone;
             toZone = _publicZone;
             securityPolicyName = genSecurityPolicyName(type, accountId, 
username, fromZone, toZone, privateIp);
@@ -2748,7 +2772,7 @@ public class JuniperSrxResource implements ServerResource 
{
             return false;
 
         case ADD:
-            if (!type.equals(SecurityPolicyType.SECURITYPOLICY_EGRESS)) {
+            if (!(type.equals(SecurityPolicyType.SECURITYPOLICY_EGRESS) || 
type.equals(SecurityPolicyType.SECURITYPOLICY_EGRESS_DEFAULT))) {
                 if (!manageAddressBookEntry(SrxCommand.CHECK_IF_EXISTS, 
toZone, privateIp, addressBookEntryName)) {
                     throw new ExecutionException("No address book entry for 
policy: " + securityPolicyName);
                 }
@@ -2756,9 +2780,10 @@ public class JuniperSrxResource implements 
ServerResource {
 
             String srcAddrs = "";
             String dstAddrs = "";
+            String action = "";
             xml = SrxXml.SECURITY_POLICY_ADD.getXml();
             xml = replaceXmlValue(xml, "policy-name", securityPolicyName);
-            if (type.equals(SecurityPolicyType.SECURITYPOLICY_EGRESS)) {
+            if (type.equals(SecurityPolicyType.SECURITYPOLICY_EGRESS) || 
type.equals(SecurityPolicyType.SECURITYPOLICY_EGRESS_DEFAULT)) {
                 xml = replaceXmlValue(xml, "from-zone", _privateZone);
                 xml = replaceXmlValue(xml, "to-zone", _publicZone);
                 if (cidrs == null) {
@@ -2771,6 +2796,13 @@ public class JuniperSrxResource implements 
ServerResource {
                 xml = replaceXmlValue(xml, "src-address", srcAddrs);
                 dstAddrs = "<destination-address>any</destination-address>";
                 xml = replaceXmlValue(xml, "dst-address", dstAddrs);
+                if (defaultEgressAction == true) {
+                    //configure block rules and default allow the traffic
+                    action = "<deny></deny>";
+                } else {
+                    action = "<permit></permit>";
+                }
+                xml = replaceXmlValue(xml, "action", action);
             } else {
                 xml = replaceXmlValue(xml, "from-zone", fromZone);
                 xml = replaceXmlValue(xml, "to-zone", toZone);
@@ -2781,9 +2813,13 @@ public class JuniperSrxResource implements 
ServerResource {
             }
 
             if (type.equals(SecurityPolicyType.VPN) && ipsecVpnName != null) {
-               xml = replaceXmlValue(xml, "tunnel", "<tunnel><ipsec-vpn>" + 
ipsecVpnName + "</ipsec-vpn></tunnel>");
+                xml = replaceXmlValue(xml, "tunnel", 
"<permit><tunnel><ipsec-vpn>" + ipsecVpnName + 
"</ipsec-vpn></tunnel></permit>");
             } else {           
                xml = replaceXmlValue(xml, "tunnel", "");
+                if 
(!(type.equals(SecurityPolicyType.SECURITYPOLICY_EGRESS_DEFAULT) || 
type.equals(SecurityPolicyType.SECURITYPOLICY_EGRESS))) {
+                    action = "<permit></permit>";
+                    xml = replaceXmlValue(xml, "action", action);
+                }
             }
                         
             String applications;
@@ -2805,11 +2841,11 @@ public class JuniperSrxResource implements 
ServerResource {
             }
 
         case DELETE:
-            if (!manageSecurityPolicy(type, SrxCommand.CHECK_IF_EXISTS, null, 
null, privateIp, applicationNames, cidrs, ipsecVpnName)) {
+            if (!manageSecurityPolicy(type, SrxCommand.CHECK_IF_EXISTS, null, 
null, privateIp, applicationNames, cidrs, ipsecVpnName, defaultEgressAction)) {
                 return true;
             }
 
-            if (manageSecurityPolicy(type, SrxCommand.CHECK_IF_IN_USE, null, 
null, privateIp, applicationNames, cidrs, ipsecVpnName)) {
+            if (manageSecurityPolicy(type, SrxCommand.CHECK_IF_IN_USE, null, 
null, privateIp, applicationNames, cidrs, ipsecVpnName, defaultEgressAction)) {
                 return true;
             }
 
@@ -2874,17 +2910,17 @@ public class JuniperSrxResource implements 
ServerResource {
         }
 
         // Add a new security policy
-        manageSecurityPolicy(type, SrxCommand.ADD, null, null, privateIp, 
applicationNames, null, null);
+        manageSecurityPolicy(type, SrxCommand.ADD, null, null, privateIp, 
applicationNames, null, null, false);
 
         return true;
     }
 
     private boolean removeSecurityPolicyAndApplications(SecurityPolicyType 
type, String privateIp) throws ExecutionException {
-        if (!manageSecurityPolicy(type, SrxCommand.CHECK_IF_EXISTS, null, 
null, privateIp, null,null, null)) {
+        if (!manageSecurityPolicy(type, SrxCommand.CHECK_IF_EXISTS, null, 
null, privateIp, null,null, null, false)) {
             return true;
         }
 
-        if (manageSecurityPolicy(type, SrxCommand.CHECK_IF_IN_USE, null, null, 
privateIp, null, null, null)) {
+        if (manageSecurityPolicy(type, SrxCommand.CHECK_IF_IN_USE, null, null, 
privateIp, null, null, null, false)) {
             return true;
         }
 
@@ -2892,7 +2928,7 @@ public class JuniperSrxResource implements ServerResource 
{
         List<String> applications = getApplicationsForSecurityPolicy(type, 
privateIp, _publicZone, _privateZone);
 
         // Remove the security policy
-        manageSecurityPolicy(type, SrxCommand.DELETE, null, null, privateIp, 
null, null, null);
+        manageSecurityPolicy(type, SrxCommand.DELETE, null, null, privateIp, 
null, null, null, false);
 
         // Remove any applications for the removed security policy that are no 
longer in use
         List<String> unusedApplications = getUnusedApplications(applications, 
_publicZone, _privateZone);
@@ -2916,8 +2952,8 @@ public class JuniperSrxResource implements ServerResource 
{
     }
 
 
-    private boolean 
removeEgressSecurityPolicyAndApplications(SecurityPolicyType type, String 
guestVlan, List <String> cidrs) throws ExecutionException {
-        if (!manageSecurityPolicy(type, SrxCommand.CHECK_IF_EXISTS, null, 
null, guestVlan, null, cidrs, null)) {
+    private boolean 
removeEgressSecurityPolicyAndApplications(SecurityPolicyType type, String 
guestVlan, List <String> cidrs, boolean defaultEgressAction) throws 
ExecutionException {
+        if (!manageSecurityPolicy(type, SrxCommand.CHECK_IF_EXISTS, null, 
null, guestVlan, null, cidrs, null, defaultEgressAction)) {
             return true;
         }
         // Get a list of applications for this security policy
@@ -2925,7 +2961,7 @@ public class JuniperSrxResource implements ServerResource 
{
         applications = getApplicationsForSecurityPolicy(type, guestVlan, 
_privateZone, _publicZone);
 
         // Remove the security policy even if it is in use
-        manageSecurityPolicy(type, SrxCommand.DELETE, null, null, guestVlan, 
null, cidrs, null);
+        manageSecurityPolicy(type, SrxCommand.DELETE, null, null, guestVlan, 
null, cidrs, null, defaultEgressAction);
 
         // Remove any applications for the removed security policy that are no 
longer in use
         List<String> unusedApplications;
@@ -2953,7 +2989,7 @@ public class JuniperSrxResource implements ServerResource 
{
         return true;
     }
 
-    private boolean addEgressSecurityPolicyAndApplications(SecurityPolicyType 
type, String guestVlan, List<Object[]> applications, List <String> cidrs) 
throws ExecutionException {
+    private boolean addEgressSecurityPolicyAndApplications(SecurityPolicyType 
type, String guestVlan, List<Object[]> applications, List <String> cidrs, 
boolean defaultEgressAction) throws ExecutionException {
         // Add all necessary applications
         List<String> applicationNames = new ArrayList<String>();
         for (Object[] application : applications) {
@@ -2975,7 +3011,7 @@ public class JuniperSrxResource implements ServerResource 
{
             }
 
         // Add a new security policy
-        manageSecurityPolicy(type, SrxCommand.ADD, null, null, guestVlan, 
applicationNames, cidrs, null);
+        manageSecurityPolicy(type, SrxCommand.ADD, null, null, guestVlan, 
applicationNames, cidrs, null, defaultEgressAction);
         s_logger.debug("Added Egress firewall rule for guest network " + 
guestVlan);
         return true;
     }

http://git-wip-us.apache.org/repos/asf/cloudstack/blob/07034b62/scripts/network/juniper/security-policy-add.xml
----------------------------------------------------------------------
diff --git a/scripts/network/juniper/security-policy-add.xml 
b/scripts/network/juniper/security-policy-add.xml
index 595e026..2e5a7d0 100644
--- a/scripts/network/juniper/security-policy-add.xml
+++ b/scripts/network/juniper/security-policy-add.xml
@@ -32,9 +32,8 @@ under the License.
 %applications%
 </match>
 <then>
-<permit>
+%action%
 %tunnel%
-</permit>
 <count>
 </count>
 </then>

http://git-wip-us.apache.org/repos/asf/cloudstack/blob/07034b62/server/src/com/cloud/network/ExternalFirewallDeviceManagerImpl.java
----------------------------------------------------------------------
diff --git 
a/server/src/com/cloud/network/ExternalFirewallDeviceManagerImpl.java 
b/server/src/com/cloud/network/ExternalFirewallDeviceManagerImpl.java
index 9b190aa..4f5a2d5 100644
--- a/server/src/com/cloud/network/ExternalFirewallDeviceManagerImpl.java
+++ b/server/src/com/cloud/network/ExternalFirewallDeviceManagerImpl.java
@@ -26,6 +26,8 @@ import java.util.Map;
 import javax.inject.Inject;
 import javax.naming.ConfigurationException;
 
+import com.cloud.network.dao.*;
+import com.cloud.offerings.NetworkOfferingVO;
 import org.apache.cloudstack.api.ApiConstants;
 import org.apache.cloudstack.api.response.ExternalFirewallResponse;
 import 
org.apache.cloudstack.network.ExternalNetworkDeviceManager.NetworkDevice;
@@ -65,23 +67,6 @@ import com.cloud.host.HostVO;
 import com.cloud.host.dao.HostDao;
 import com.cloud.host.dao.HostDetailsDao;
 import com.cloud.network.Networks.TrafficType;
-import com.cloud.network.dao.ExternalFirewallDeviceDao;
-import com.cloud.network.dao.ExternalFirewallDeviceVO;
-import com.cloud.network.dao.FirewallRulesDao;
-import com.cloud.network.dao.IPAddressDao;
-import com.cloud.network.dao.IPAddressVO;
-import com.cloud.network.dao.InlineLoadBalancerNicMapDao;
-import com.cloud.network.dao.InlineLoadBalancerNicMapVO;
-import com.cloud.network.dao.LoadBalancerDao;
-import com.cloud.network.dao.NetworkDao;
-import com.cloud.network.dao.NetworkExternalFirewallDao;
-import com.cloud.network.dao.NetworkExternalFirewallVO;
-import com.cloud.network.dao.NetworkServiceMapDao;
-import com.cloud.network.dao.PhysicalNetworkDao;
-import com.cloud.network.dao.PhysicalNetworkServiceProviderDao;
-import com.cloud.network.dao.PhysicalNetworkServiceProviderVO;
-import com.cloud.network.dao.PhysicalNetworkVO;
-import com.cloud.network.dao.VpnUserDao;
 import com.cloud.network.rules.FirewallRule;
 import com.cloud.network.rules.FirewallRule.Purpose;
 import com.cloud.network.rules.FirewallRuleVO;
@@ -538,6 +523,9 @@ public abstract class ExternalFirewallDeviceManagerImpl 
extends AdapterBase impl
         }
 
         List<FirewallRuleTO> rulesTO = new ArrayList<FirewallRuleTO>();
+        NetworkVO networkVO = _networkDao.findById(network.getId());
+        NetworkOfferingVO offering = 
_networkOfferingDao.findById(networkVO.getNetworkOfferingId());
+        Boolean defaultEgressPolicy = offering.getEgressDefaultPolicy();
 
         for (FirewallRule rule : rules) {
             if (rule.getSourceCidrList() == null && (rule.getPurpose() == 
Purpose.Firewall || rule.getPurpose() == Purpose.NetworkACL)) {
@@ -547,7 +535,7 @@ public abstract class ExternalFirewallDeviceManagerImpl 
extends AdapterBase impl
             if (rule.getPurpose() == Purpose.Firewall && rule.getTrafficType() 
== FirewallRule.TrafficType.Egress) {
                 String guestVlanTag = network.getBroadcastUri().getHost();
                 String guestCidr = network.getCidr();
-                ruleTO = new FirewallRuleTO(rule, guestVlanTag, 
rule.getTrafficType());
+                ruleTO = new FirewallRuleTO(rule, guestVlanTag, 
rule.getTrafficType(), guestCidr, defaultEgressPolicy, rule.getType());
             } else {
                 IpAddress sourceIp = 
_networkModel.getIp(rule.getSourceIpAddressId());
                 Vlan vlan = _vlanDao.findById(sourceIp.getVlanId());

Reply via email to