> FORWARD -> proxmoxfw-chain ->jump in tap chain1
>                            <-return or drop
>                            ->jump in tap chain2
>                            <-return or drop
> 
>                            ->ACCEPT
> 
> 
> don't known if it's better than

>>Above would only handle traffic originated from a VM and skip traffic from 
>>outside (eth0)?

maybe. I think we shouldn't filter from ethX, because outside can be also other 
hosts with others vm.
(Or maybe users want to add some custom rules on ethX to protect the host 
itself, like this it doesn't conflict with openstack rules)


also,maybe they are doing like this to add later some custom rules before the 
ACCEPT.


----- Mail original ----- 

De: "Dietmar Maurer" <diet...@proxmox.com> 
À: "Alexandre DERUMIER" <aderum...@odiso.com> 
Cc: "pve-devel" <pve-devel@pve.proxmox.com> 
Envoyé: Mercredi 22 Janvier 2014 17:03:38 
Objet: RE: [pve-devel] RFC : iptables implementation 

> FORWARD -> proxmoxfw-chain ->jump in tap chain1 
> <-return or drop 
> ->jump in tap chain2 
> <-return or drop 
> 
> ->ACCEPT 
> 
> 
> don't known if it's better than 

Above would only handle traffic originated from a VM and skip traffic from 
outside (eth0)? 
_______________________________________________
pve-devel mailing list
pve-devel@pve.proxmox.com
http://pve.proxmox.com/cgi-bin/mailman/listinfo/pve-devel

Reply via email to