It says default so that applies only to that network.  Just add a new rule icmp 
all source 0/0 then you can ping in and out. 

Same for  ssh which applies to floating ip as well. In mitaka it works a little 
differently. 

Ciao

Inviato da iPhone

> Il giorno 15 apr 2016, alle ore 10:50, Jorge Luiz Correa <corre...@gmail.com> 
> ha scritto:
> 
> Thank you, Peter and Remo! Your answers guided me to better understand 
> security groups and iptables rules. The problem was that I haven't understood 
> very well the default security group created automatically, mainly the rules 
> that seems to pass all traffic. Explained bellow. 
> 
> DVR is enabled.
> Version is Liberty.
> 1 hypervisor and router is OK on compute nodes and controller (snat).
> I had not assigned an ICMP rule on default security group neither other 
> security group.
> 
> On default security group we can see these rules (dashboard):
> 
> Direction EtherType    IP Protocol Port Range       Remote IP Prefix    
> Remote Security Group Actions
> Egress    IPv6            Any             Any                ::/0             
>            -    
> Egress    IPv4            Any             Any                0.0.0.0/0        
>         -    
> Ingress    IPv6            Any             Any                -               
>             default
> Ingress    IPv4            Any             Any                -               
>             default
> 
> I was thinking that the rule "Ingress IPv4 Any Any" could pass all the 
> traffic, independently if we are using a private IP or a floating IP. But, 
> when this rule is translated to iptables, neutron uses ipset and the 
> configured set has just the private IP addresses. 
> 
> Chain neutron-openvswi-i7a7a669c-3 (1 references)
>  pkts bytes target     prot opt in     out     source               
> destination         
> .....
>     0     0 RETURN     all  --  *      *       0.0.0.0/0            0.0.0.0/0 
>            match-set NIPv43c228055-2735-4339-b9a8- src
> .....
> 
> And:
> 
> $ ipset list
> 
> Name: NIPv43c228055-2735-4339-b9a8-
> Type: hash:net
> Revision: 4
> Header: family inet hashsize 1024 maxelem 65536
> Size in memory: 512
> References: 1
> Members:
> 172.16.0.5
> 172.16.0.10
> 
> Name: NIPv63c228055-2735-4339-b9a8-
> Type: hash:net
> Revision: 4
> Header: family inet6 hashsize 1024 maxelem 65536
> Size in memory: 1152
> References: 1
> Members:
> 
> So, this rule is going to pass just packets that src is in 172.16.0.0/24, the 
> private (tenant) network. 
> 
> Although the rules listed have 'IPv4 Any Any' as if passing anything, theses 
> rules just permit packets from one VM to another in the same private network. 
> 
> To allow packets to a floating IP it's required other rules that pass to a 
> specific floating IP address (or network, or all 0.0.0.0/0). As listed 
> (dashboard), at right column 'Remote Security Group Actions' we shouldn't 
> have 'default'.
> 
> Direction EtherType    IP Protocol Port Range       Remote IP Prefix    
> Remote Security Group Actions
> Ingress   IPv4            Any           Any                   -               
>             default <--- pass for the private network
> and 
> Ingress   IPv4            Any           Any                   0.0.0.0/0       
>          -  <--- pass for floating ips 
> 
> Iptables is something like:
> 
> Chain neutron-openvswi-i7a7a669c-3 (1 references)
>  pkts bytes target     prot opt in     out     source               
> destination         
> .....
>     0     0 RETURN     all  --  *      *       0.0.0.0/0            0.0.0.0/0 
>           match-set NIPv43c228055-2735-4339-b9a8- src
>     0     0 RETURN     all  --  *      *       0.0.0.0/0            0.0.0.0/0 
>           
> .....
> 
> So, what I needed to do was create a new security group for traffic from 
> external networks to internal networks, without use the "default security 
> group" as destination, because this is translated to the ipset match-set 
> rule. 
> 
> Thank you so much!
> 
> - JLC
> 
>> On Fri, Apr 15, 2016 at 11:30 AM, Remo Mattei <r...@italy1.com> wrote:
>> one more thing to know what version (liberty? Mitaka?)
>> 
>> The security rules don’t get set with the new Mitaka so just make sure that 
>> you do set them, I have seen issues where the instance does not behave well 
>> and if you do set the SG make sure you have the ports open as Peter stated 
>> below.
>> 
>> Remo
>> > On Apr 15, 2016, at 10:14, Erdősi Péter <f...@niif.hu> wrote:
>> >
>> > 2016. 04. 15. 15:41 keltezéssel, Jorge Luiz Correa írta:
>> >> I think that in neutron-openvswi-i7a7a669c-3 should exist some RETURN 
>> >> rule using the 172.16.0.5 IP address.
>> > Just a fast thought:
>> > Did you assigned a security group with icmp enabled rule to your VM?
>> >
>> > I think, thats will made your exception to avoid DROP at the end...
>> >
>> > Regards:
>> > Peter
>> >
>> > _______________________________________________
>> > Mailing list: http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack
>> > Post to     : openstack@lists.openstack.org
>> > Unsubscribe : http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack
>> >
>> > 
>> >
> 
> !DSPAM:1,57112b1517039594946585!
_______________________________________________
Mailing list: http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack
Post to     : openstack@lists.openstack.org
Unsubscribe : http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack

Reply via email to