You could tell dnsmasq to use your router as the gateway instead of the network 
host and then not allow routing across vlans.

To use an external gateway use a config option like the following:
dnsmasq_config_file=/path/to/config

in that config file you can use:
dhcp_option=3,<ip of router> to force vms to use your router as their gateway.

Vish

On Jun 1, 2012, at 10:30 PM, romizhang1968 wrote:

> Vish,
> 
> Thanks for your replay.
> Yes,I allowed icmp ping from 0.0.0.0/0, but the question is , i think the 
> different instance in different tenant and vlan on the same compute node 
> should not touch each other, admin03(192.168.2.3) in VLAN 200 and 201 should 
> only could get ip touch to the same tenant instance, should not can touch 
> aipu01(192.168.3.3) in VLAN 300 and aipuTenant even on the same compute node.
> I check the route table, openstack creates route item to each bridge on the 
> node, but in admin03,the route table only shows about how to go 192.168.2.0 
> and 192.168.21.0, have no way to touch the net of 192.168.3.0. but in 
> admin03,it could ping aipu01, that means it use the node route table, i did 
> not know why.
> so I want to know is there a way in openstack command to stop this situation, 
> not replay me to delete the compute node route item. and I think, each VM 
> should connect to the "access port" and go through trunk port(eth1 or eth2) 
> to communicate with others.
> here is my wants. 
> regards,
> Romi
> 
> 
> 
> At 2012-06-02 00:47:49,"Vishvananda Ishaya" <vishvana...@gmail.com> wrote:
> Broadcast traffic should be blocked via the vlan separation and direct 
> traffic should be blocked via security groups. Do you have a security group 
> that allows ping traffic from 0.0.0.0/0?
> 
> Vish
> 
> On Jun 1, 2012, at 1:38 AM, romi zhang wrote:
> 
>> Hi,
>>  
>> I use following command to create 2 NICs for the instances of adminTenant 
>> and 1 NICs for aipuTenant:
>>  
>> nova-manage network create --label=admin_web --fixed_range_v4=192.168.2.0/28 
>> --num_networks=1 --vlan=200 --bridge=br200 --bridge_interface=eth1 
>> --network_size=16 --multi_host=T 
>> --project_id=5f9281bca6854fe3974a457d81afd78c
>>  
>> nova-manage network create --label=admin_ssl 
>> --fixed_range_v4=192.168.21.0/28 --num_networks=1 --vlan=201 --bridge=br201 
>> --bridge_interface=eth2 --network_size=16 --multi_host=T 
>> --project_id=5f9281bca6854fe3974a457d81afd78c
>>  
>> nova-manage network create --label=aipu_web --fixed_range_v4=192.168.3.0/28 
>> --num_networks=1 --vlan=300 --bridge=br300 --bridge_interface=eth1 
>> --network_size=16 --multi_host=T 
>> --project_id=ee29f5730caa40958bf4812a0fbec3d9
>>  
>> But the result is:
>> 1.       the instance of admin03(192.168.2.3 192.168.21.3,belong 
>> adminTenant) could successfully ping aipu01(192.168.3.3,belong aipuTenant) 
>> on the same compute node(NC01,network+compute service) .
>> 2.       Of course,admin03 could not ping successfully aipu03(192.168.3.6) 
>> on the another compute node(NC02,network+compute service).
>>  
>> Is there a way or setting to forbid the IP touching between the instances of 
>> different tenant in different bridges and VLANs on the same compute node?
>>  
>> Romi
>>  
>> _______________________________________________
>> Mailing list: https://launchpad.net/~openstack
>> Post to     : openstack@lists.launchpad.net
>> Unsubscribe : https://launchpad.net/~openstack
>> More help   : https://help.launchpad.net/ListHelp
> 
> 
> 

_______________________________________________
Mailing list: https://launchpad.net/~openstack
Post to     : openstack@lists.launchpad.net
Unsubscribe : https://launchpad.net/~openstack
More help   : https://help.launchpad.net/ListHelp

Reply via email to