|  |  | 
  
    |  |  | 
 
  |   |  | 
  
    |  |  | 
  
    |  |  | 
  
    |   xen-users
RE: [Xen-users] Managed Firewall 
| 
 From: xen-users-bounces@xxxxxxxxxxxxxxxxxxx on 
behalf of Simon Hobson
 Sent: Tue 15/06/2010 17:14
 To: 
xen-users@xxxxxxxxxxxxxxxxxxx
 Subject: RE: [Xen-users] Managed 
Firewall
 
 
 
Dustin Henning wrote:
 >>  >I also have 
another idea, so maybe you could tell me if it would
 >>  >work 
or not (Using physical firewall box):
 >>  >Let's say I have 
just one bridge per Xen host. Could I use
 >>  
>iptabled/ebtables to deny all inter-VM traffic? So only allow 
access
 >>  >from the VM to the physical NIC of the box? Then on 
the physical
 >>  >switch, I could put each port on a separate 
VLAN, but put the port
 >>  >that the firewall is connected to 
on all the VLANs. Then, I assume,
 >>  >the switch would send 
all traffic from the host ports to the
 >>  >firewall port, 
where the firewall could do filtering? I'm not sure
 >>  >if the 
firewall would even need to be VM aware..
 >>
 >>Well the 
firewall will not have to be VM aware anyway - it just sees
 >>traffic 
on VLAN ports.
 >>
 >>As to having one bridge and VLANs, if you 
connect multiple VLANs to
 >>one switch then that's the equivalent of 
trunking (bonding) multiple
 >>links together and won't help.  The 
only other way round it I can see
 >>is to use some fudging with /32 
subnets for the clients so that they
 >>have no concept of there being 
'neighbours' on the local subnet (and
 >>then enforce it with 
iptable/ebtables rules to prevent direct
 >>host-host traffic) - but 
that's beyond my experience and I don't know
 >>how well it works or 
what pitfalls there may be.
 
 >Simon,
 >Primarily out of curiosity, 
are you assuming that the switch is not using
 >VLAN tagging along with 
trunking?  Is that even possible?  Assuming tagged
 >VLANs, I 
don't see what makes you think the switch is going to break that
 >boundary 
and send the data back.  Even if it did, the destination domU
 >should 
ignore it unless the tag was stripped by the switch.  Seems to 
me
 >like the switch would keep the VLANs separate and e firewall would 
have to
 >function as a sort of "VLAN Router," which may or may not be 
possible.
 >Dustin
 
 Well actually I'm not sure I fully understand the 
setup proposed -
 but I think it involved building a bridge per guest, a VLAN 
per
 bridge, and trunking the lot back to the firewall via a switch.
 
 At 
some point, all these VLAns are going to have to be switched
 together - 
unless you futz about with /32 subnets on the clients.
 Once you do that, the 
switches will switch the packets back in the
 shortest manner available - and 
that is unlikely to be via the
 firewall unless that is doing all the 
switching.
 
 It could work if the firewall supports that many interfaces, 
and you
 trunk all the VLANs back to it. Then you could setup intra-zone 
rules
 to control traffic between the VLANs, and hence between the 
guests.
 
 I see no reason why a switch shouldn't support tagged packets 
over a
 bonded trunk. It's just a case of whether you can actually 
get
 anything useful from doing so.
 
 --
 Simon 
Hobson
 ----------------------------------------------------------------------------------
 Hi Simon, You are correct in what you have said, and that is the same 
conclusion I came to. This is why I've chosen to do a simplier solution: Just use 
iptables in each Dom0 to firewall customer VMs. All I have to do is write my own 
vif scripts to make it easy to configure, which shoudn't be too hard. So if a 
customer wants a port blocked/opened, all I have to do is change vif script, 
then restart VM.   What you think?   Thanks 
 _______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-users | 
 |  | 
  
    |  |  |