ye~, it's true , i already tried, it's not work at all~~, but thanks for
your help.

i just found something in openvswitch document

http://openvswitch.org/openstack/documentation/

at the last section , they said

OVS is not compatible with iptables + ebtables rules that are applied
directly on VIF ports.  Thus, the existing implementations of Nova security
groups and spoof-prevention aren’t compatible.  We are targeting work for
this in Folsom.

On Fri, Jul 27, 2012 at 6:36 AM, Jesse Gross <je...@nicira.com> wrote:

> On Thu, Jul 26, 2012 at 12:40 PM, Luiz Ozaki <luiz.oz...@locaweb.com.br>
> wrote:
> > On 7/25/12 8:07 PM, pf shineyear wrote:
> >
> >
> > i just want to use ovs + iptables to limit all the input access, like
> drop
> > all request to ip 10.1.0.3 , but only accept all request send from vm,
> like
> > wget www.google.com.
> >
> > i already use ovs-ofctl to drop all input access from outside, like
> > dl_type=0x800,nw_dst=10.1.0.3,action=drop
> >
> > but iptables can not work for the request send from inside.
> >
> > could u please tell me the alternate way to write the rule?
> >
> >
> > dl_type=0x800,nw_src=10.1.0.3,action=normal
> >
> > So, if the source is the 10.1.0.3(which I think it's the VM IP), you do
> the
> > normal action.
> >
> >
> > Hmmm actually I don't know if it's gonna create the flow to accept the
> > response, the packet might go out but get dropped by the
> > nw_dst=10.1.0.3,action=drop.
>
> It won't create flows in response.  OVS (and the NORMAL action in
> particular) is primarily a switch, not a stateful firewall.
>
_______________________________________________
discuss mailing list
discuss@openvswitch.org
http://openvswitch.org/mailman/listinfo/discuss

Reply via email to