Return-Path: X-Original-To: apmail-incubator-cloudstack-dev-archive@minotaur.apache.org Delivered-To: apmail-incubator-cloudstack-dev-archive@minotaur.apache.org Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by minotaur.apache.org (Postfix) with SMTP id 13FF0DCDB for ; Tue, 25 Sep 2012 08:48:23 +0000 (UTC) Received: (qmail 53815 invoked by uid 500); 25 Sep 2012 08:48:22 -0000 Delivered-To: apmail-incubator-cloudstack-dev-archive@incubator.apache.org Received: (qmail 53676 invoked by uid 500); 25 Sep 2012 08:48:22 -0000 Mailing-List: contact cloudstack-dev-help@incubator.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: cloudstack-dev@incubator.apache.org Delivered-To: mailing list cloudstack-dev@incubator.apache.org Received: (qmail 53660 invoked by uid 99); 25 Sep 2012 08:48:22 -0000 Received: from nike.apache.org (HELO nike.apache.org) (192.87.106.230) by apache.org (qpsmtpd/0.29) with ESMTP; Tue, 25 Sep 2012 08:48:22 +0000 X-ASF-Spam-Status: No, hits=-2.3 required=5.0 tests=RCVD_IN_DNSWL_MED,SPF_HELO_PASS,SPF_PASS X-Spam-Check-By: apache.org Received-SPF: pass (nike.apache.org: domain of jayapalreddy.uradi@citrix.com designates 203.166.19.134 as permitted sender) Received: from [203.166.19.134] (HELO SMTP.CITRIX.COM.AU) (203.166.19.134) by apache.org (qpsmtpd/0.29) with ESMTP; Tue, 25 Sep 2012 08:48:16 +0000 X-IronPort-AV: E=Sophos;i="4.80,479,1344211200"; d="scan'208";a="12847275" Received: from banpmailmx02.citrite.net ([10.103.128.74]) by SYDPIPO01.CITRIX.COM.AU with ESMTP/TLS/RC4-MD5; 25 Sep 2012 08:47:52 +0000 Received: from BANPMAILBOX01.citrite.net ([10.103.128.71]) by BANPMAILMX02.citrite.net ([10.103.128.74]) with mapi; Tue, 25 Sep 2012 14:17:51 +0530 From: Jayapal Reddy Uradi To: "cloudstack-dev@incubator.apache.org" Date: Tue, 25 Sep 2012 14:17:45 +0530 Subject: RE: Problem with VM private IP Thread-Topic: Problem with VM private IP Thread-Index: Ac2a6r9HB/QN9tB7S7eIbIJ6jEWwFwADo5fA Message-ID: <67EF18FDCA335F489B366120481AB6C5EE499062AA@BANPMAILBOX01.citrite.net> References: <67EF18FDCA335F489B366120481AB6C5EE49906235@BANPMAILBOX01.citrite.net> In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: acceptlanguage: en-US Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 There is no hair pin NAT related rule in the NAT table. Hairpin NAT issue is fixed in 3.0.3. http://bugs.cloudstack.org/browse/CS-13500 Thanks, Jayapal -----Original Message----- From: Hieu Le [mailto:hieulq89@gmail.com]=20 Sent: Tuesday, September 25, 2012 12:24 PM To: cloudstack-dev@incubator.apache.org Subject: Re: Problem with VM private IP Here is VR iptables rules: root@r-17-VRDLAB:~# iptables -nL -v --line-numbers -t filter Chain INPUT (p= olicy DROP 124 packets, 9432 bytes) num pkts bytes target prot opt in out source destination 1 0 0 ACCEPT all -- * * 0.0.0.0/0 224.0.0.18 2 0 0 ACCEPT all -- * * 0.0.0.0/0 225.0.0.50 3 38 3648 ACCEPT all -- eth0 * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 4 11168 1852K ACCEPT all -- eth1 * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 5 5 526 ACCEPT all -- eth2 * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 6 102 8520 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 7 5 293 ACCEPT all -- lo * 0.0.0.0/0 0.0.0.0/0 8 29 9614 ACCEPT udp -- eth0 * 0.0.0.0/0 0.0.0.0/0 udp dpt:67 9 23 1787 ACCEPT udp -- eth0 * 0.0.0.0/0 0.0.0.0/0 udp dpt:53 10 629 37740 ACCEPT tcp -- eth1 * 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:3922 11 0 0 ACCEPT tcp -- eth0 * 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:8080 12 0 0 ACCEPT tcp -- eth0 * 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:80 Chain FORWARD (policy DROP 0 packets, 0 bytes) num pkts bytes target prot opt in out source destination 1 0 0 ACCEPT all -- eth0 eth1 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 2 1 60 ACCEPT all -- eth2 eth0 0.0.0.0/0 10.1.1.118 state NEW 3 3 164 ACCEPT all -- eth2 eth0 0.0.0.0/0 10.1.1.132 state NEW 4 21 9986 ACCEPT all -- eth2 eth0 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 5 29 1600 ACCEPT all -- eth0 eth2 0.0.0.0/0 0.0.0.0/0 Chain OUTPUT (policy ACCEPT 280 packets, 48879 bytes) num pkts bytes target prot opt in out source destination root@r-17-VRDLAB:~# iptables -nL -v --line-numbers -t nat Chain PREROUTING = (policy ACCEPT 143 packets, 10644 bytes) num pkts bytes target prot opt in out source destination 1 1 60 DNAT all -- eth2 * 0.0.0.0/0 192.168.3.120 to:10.1.1.118 2 3 164 DNAT all -- eth2 * 0.0.0.0/0 192.168.3.115 to:10.1.1.132 Chain POSTROUTING (policy ACCEPT 4 packets, 224 bytes) num pkts bytes target prot opt in out source destination 1 2 96 SNAT all -- * eth2 10.1.1.132 0.0.0.0/0 to:192.168.3.115 2 4 192 SNAT all -- * eth2 10.1.1.118 0.0.0.0/0 to:192.168.3.120 3 2 138 SNAT all -- * eth2 0.0.0.0/0 0.0.0.0/0 to:192.168.3.116 Chain OUTPUT (policy ACCEPT 2 packets, 138 bytes) num pkts bytes target prot opt in out source destination root@r-17-VRDLAB:~# iptables -nL -v --line-numbers -t mangle Chain PREROUTI= NG (policy ACCEPT 543 packets, 44292 bytes) num pkts bytes target prot opt in out source destination 1 552 346K VPN_192.168.3.116 all -- * * 0.0.0.0/0 192.168.3.116 2 13 5167 FIREWALL_192.168.3.120 all -- * * 0.0.0.0/0 192.168.3.120 3 22 5571 FIREWALL_192.168.3.115 all -- * * 0.0.0.0/0 192.168.3.115 4 118 5980 FIREWALL_192.168.3.116 all -- * * 0.0.0.0/0 192.168.3.116 5 11705 1887K CONNMARK all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED CONNMARK restore 6 1 60 MARK all -- eth2 * 0.0.0.0/0 192.168.3.120 state NEW MARK set 0x2 7 1 60 CONNMARK all -- eth2 * 0.0.0.0/0 192.168.3.120 state NEW CONNMARK save 8 124 10012 MARK all -- eth0 * 10.1.1.118 0.0.0.0/0 state NEW MARK set 0x2 9 124 10012 CONNMARK all -- eth0 * 10.1.1.118 0.0.0.0/0 state NEW CONNMARK save 10 3 164 MARK all -- eth2 * 0.0.0.0/0 192.168.3.115 state NEW MARK set 0x2 11 3 164 CONNMARK all -- eth2 * 0.0.0.0/0 192.168.3.115 state NEW CONNMARK save 12 17 1445 MARK all -- eth0 * 10.1.1.132 0.0.0.0/0 state NEW MARK set 0x2 13 17 1445 CONNMARK all -- eth0 * 10.1.1.132 0.0.0.0/0 state NEW CONNMARK save Chain INPUT (policy ACCEPT 514 packets, 42811 bytes) num pkts bytes target prot opt in out source destination Chain FORWARD (policy ACCEPT 54 packets, 11810 bytes) num pkts bytes target prot opt in out source destination Chain OUTPUT (policy ACCEPT 231 packets, 42784 bytes) num pkts bytes target prot opt in out source destination Chain POSTROUTING (policy ACCEPT 285 packets, 54594 bytes) num pkts bytes target prot opt in out source destination 1 27 9270 CHECKSUM udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:68 CHECKSUM fill Chain FIREWALL_192.168.3.115 (1 references) num pkts bytes target prot opt in out source destination 1 15 5203 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 2 0 0 RETURN udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpts:1:65535 3 5 248 RETURN tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpts:1:65535 4 2 120 RETURN icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmp type 255 5 0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 Chain FIREWALL_192.168.3.116 (1 references) num pkts bytes target prot opt in out source destination 1 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 2 118 5980 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 Chain FIREWALL_192.168.3.120 (1 references) num pkts bytes target prot opt in out source destination 1 8 4903 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 2 2 120 RETURN icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmp type 255 3 3 144 RETURN tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpts:1:65535 4 0 0 RETURN udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpts:1:65535 5 0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 Chain VPN_192.168.3.116 (1 references) num pkts bytes target prot opt in out source destination 1 434 340K ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 2 118 5980 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 root@r-17-VRDLAB:~# On Tue, Sep 25, 2012 at 12:37 PM, Jayapal Reddy Uradi < jayapalreddy.uradi@= citrix.com> wrote: > Debug the traffic flow ... whether the traffic sent to VR guest=20 > network interface then public interface . > Please share the VR iptables rules. > > Thanks, > Jayapal > > -----Original Message----- > From: Hieu Le [mailto:hieulq89@gmail.com] > Sent: Tuesday, September 25, 2012 8:42 AM > To: cloudstack-dev@incubator.apache.org > Subject: Re: Problem with VM private IP > > Yep, I have read the admin guide and setup firewall rule + enable=20 > static NAT for all tested VM and still facing this problem. > > On Tue, Sep 25, 2012 at 10:01 AM, Ahmad Emneina=20 > >wrote: > > > Have you looked at the Administration Guide[1]? See page 75 and see=20 > > if that solves your connectivity issue. You still need to poke the=20 > > hole in the firewal and setup a NAT rule from within cloudstack. > > > > [1]: > > http://download.cloud.com/releases/3.0.0/CloudStack3.0AdminGuide.pdf > > > > On 9/24/12 7:56 PM, "Hieu Le" wrote: > > > > >Hi, > > > > > >The telnet packets are not reaching the telnet server VM. > > > > > >I'm using CS 3.0.2. > > > > > >Thanks for replying ! > > > > > >On Mon, Sep 24, 2012 at 5:52 PM, Jayapal Reddy Uradi <=20 > > >jayapalreddy.uradi@citrix.com> wrote: > > > > > >> Using firewall and port forwarding rules only we can access the=20 > > >>VM services from the public network also from the VMs using the=20 > > >>Public > IPs. > > >> For you telnet from outside network success but from failed from=20 > > >>VM to VM using public IP. > > >> Seems hair pin NAT got failed ... > > >> > > >> Please capture the packets on the telnet server VM to see whether=20 > > >> telnet packets are reaching or not ? > > >> > > >> Which version of cloudstack Is it ? > > >> > > >> Thanks, > > >> Jayapal > > >> > > >> -----Original Message----- > > >> From: Hieu Le [mailto:hieulq89@gmail.com] > > >> Sent: Monday, September 24, 2012 3:39 PM > > >> To: cloudstack-dev@incubator.apache.org > > >> Subject: Problem with VM private IP > > >> > > >> Hi everyone, > > >> > > >> I have a problem while working with VM private IP. My Cloud=20 > > >>system run 2 VMs in advance zone with private IP is 10.1.1.20 and > > >>10.1.1.21 and VM NAT IP is 192.168.50.160 and 192.168.50.165.=20 > > >>From outside network, I can ping and telnet port 80 to both VMs=20 > > >>with public IPs. But from VM 10.1.1.21, I can't telnet to other=20 > > >>VM with its public IP. > > >> > > >> For details: > > >> From VM1: 10.1.1.20 and 192.168.50.160. > > >> ping 192.168.50.165 and ping 10.1.1.21 success telnet 10.1.1.21=20 > > >>80 success telnet 192.168.50.165 80 fail > > >> > > >> From VM2: 10.1.1.21 and 192.168.50.165 ping 192.168.50.160 and=20 > > >> ping > > >> 10.1.1.20 success telnet 10.1.1.20 success telnet 192.168.50.160=20 > > >> 80 fail > > >> > > >> And I can't telnet another ports with public IP. > > >> > > >> Can you suggest some solutions for me to telnet VM from another=20 > > >> VM via public IP. > > >> > > >> Thank ! > > >> > > > > > > > > > > > >-- > > >..:: Hieu LE ::.. > > > > > >Class: Information System - Course 52 School of Information and=20 > > >Communication Technology Hanoi University of Technology No 1, Dai=20 > > >Co Viet street - Hai Ba Trung district - Hanoi > > > > > >High Performance Computing Center > > >Cloud Computing Group > > >Gmail: hieulq89@gmail.com > > > > > > > > > -- > > =C6 > > > > > > > > > > > -- > ..:: Hieu LE ::.. > > Class: Information System - Course 52 > School of Information and Communication Technology Hanoi University of=20 > Technology No 1, Dai Co Viet street - Hai Ba Trung district - Hanoi > > High Performance Computing Center > Cloud Computing Group > Gmail: hieulq89@gmail.com > -- ..:: Hieu LE ::.. Class: Information System - Course 52 School of Information and Communication Technology Hanoi University of Tech= nology No 1, Dai Co Viet street - Hai Ba Trung district - Hanoi High Performance Computing Center Cloud Computing Group Gmail: hieulq89@gmail.com