<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.openvz.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Josh-A</id>
	<title>OpenVZ Virtuozzo Containers Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.openvz.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Josh-A"/>
	<link rel="alternate" type="text/html" href="https://wiki.openvz.org/Special:Contributions/Josh-A"/>
	<updated>2026-05-15T17:46:53Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.31.1</generator>
	<entry>
		<id>https://wiki.openvz.org/index.php?title=Virtual_Environment&amp;diff=3781</id>
		<title>Virtual Environment</title>
		<link rel="alternate" type="text/html" href="https://wiki.openvz.org/index.php?title=Virtual_Environment&amp;diff=3781"/>
		<updated>2007-12-20T11:33:52Z</updated>

		<summary type="html">&lt;p&gt;Josh-A: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Virtual Environment (VE, otherwise also known as Virtual Private Server, or VPS) is one of the main concepts of OpenVZ.&lt;br /&gt;
&lt;br /&gt;
VE is an isolated entity which performs and executes exactly like a stand-alone server. VE can be rebooted independently and have root access, users/groups, IP address(es), memory, processes, files, applications, system libraries and configuration files.&lt;br /&gt;
&lt;br /&gt;
OpenVZ allows to have multiple VEs (up to as many as several hundreds) on a single [[Hardware Node]].&lt;br /&gt;
&lt;br /&gt;
Learn more about [http://www.webhosting.uk.com/web-hosting/faq/what-is-vps-technology/ VPS] Technologly&lt;br /&gt;
&lt;br /&gt;
[[Category: Definitions]]&lt;/div&gt;</summary>
		<author><name>Josh-A</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.openvz.org/index.php?title=VPS_vs_Dedicated&amp;diff=3485</id>
		<title>VPS vs Dedicated</title>
		<link rel="alternate" type="text/html" href="https://wiki.openvz.org/index.php?title=VPS_vs_Dedicated&amp;diff=3485"/>
		<updated>2007-10-05T09:45:11Z</updated>

		<summary type="html">&lt;p&gt;Josh-A: /* Advantages of VPS */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Although I am somewhat of a new user to the VPS world I thought I'd write a short article giving an overview of why use VPS instead of dedicated servers for those of you who are involved in the hosting business or people thinking about leasing a VPS server. Here I will address misconceptions I had about VPS and talk about how my perspective on VPS is changing.&lt;br /&gt;
&lt;br /&gt;
Who am I? This article originally written by [http://www.perkel.com Marc Perkel] - a new VPS user - expressing my overview of OpenVZ from my perspective as a new user talking to other new users about my experience in learning this new environment. I am not an OpenVZ expert and I want to write this while I'm still new to OpenVZ so I can express my view from a new user's perspective. If you are just reading about VPS for the first time I am not that far ahead of you. This article is an attempt by me to give back a little to those who created this free software and give you new people an overview of the big picture as I learn this myself.&lt;br /&gt;
&lt;br /&gt;
= Why use Virtual Private Servers instead of Dedicated Servers =&lt;br /&gt;
&lt;br /&gt;
Like many of you when I first heard of the idea of VPS I pictured it is some small lame server that is sold to 12 year olds trying to start hosting companies on the cheap. It had never quite caught my attention until I decided I needed a remote name server and all I needed was enough of a server to run bind, but didn't want to buy a dedicated box just to do that. So I got a VPS based on Virtuozzo for $80/year and it worked great.&lt;br /&gt;
&lt;br /&gt;
In the process however I started understanding the VPS concept and it became apparent that this is more than just a tool to create little servers. The way I see it VPS can replace dedicated servers in many situations in a data center and do a better job than dedicated. You can actually give the customer more horsepower and better hosting than selling them a small dedicated box. (Of course big customers will still need their own server.)&lt;br /&gt;
&lt;br /&gt;
I don't own a data center business myself but I have a friend who does and I colo several servers there. He has several racks of some old Celeron boxes with 512 mgs of ram and one or two 80 gig drives depending on if the customer has any concept of backups, which most of them don't. I'm looking at the racks of Celerons and P4s thinking that each rack could be consolidated into a single modern server and that the customers would actually have a better server than the one they are on now. And the cost saving is tremendous.&lt;br /&gt;
&lt;br /&gt;
= Advantages of VPS =&lt;br /&gt;
&lt;br /&gt;
Most small dedicated servers are a waste of resources. People buy bigger servers than they need and the excess capacity is wasted. These servers take both space and power which is expensive in a data center and you have hardware costs associated with each server that you have to recoup. People often don't do any backups so after several years the hard drive fails and they lose everything. And it's your fault for not backing them up in the first place.&lt;br /&gt;
&lt;br /&gt;
Imagine a rack of 16 Celeron boxes with 80 gig drives being replaced by a Dual Core Athlox X2 with 8 gigs of ram and 4 500gb SATA 2 drives running in a raid 10 configuration. (Writing this in Feb of 2007 for future historians who will read this and laugh at the old days when computers had just gigabytes.) The above server would cost about $2000 to build and only take 2U of space and use far less power than the 16 machines that are being replaced.&lt;br /&gt;
&lt;br /&gt;
Note that I'm suggesting in this example only a 16 to 1 consolidation. Everyone has the same amount of ram. In reality the consolidation is many times higher because most of those using the Celerons are not using all the memory. Many are using only 1/5 of what they have and a lot of that is used by the individual kernels running. In OpenVZ there is one kernel for everyone.&lt;br /&gt;
&lt;br /&gt;
Note also that many of these servers have idle time where the processor is doing nothing and they have lots of extra hard drive space that isn't being used. By consolidating these systems the free resources are combined allowing you to run many more logical servers that each have more resources than the individual servers.&lt;br /&gt;
&lt;br /&gt;
On a dedicated computer the user is stuck with an old slow 32 bit processor, a limited amount of ram, and an old slow hard drive with no backups. In a VPS that same user is running on a shared dual core 64 bit CPU sharing 8 gigs of ram with fast modern large hard drives with raid backup. That is a significant improvement over having their own dedicated box. So this is a better deal for the customer. [http://www.webhosting.uk.com/knowledgebase/advantages-of-a-vps/ VPS Hosting Advantage]&lt;br /&gt;
&lt;br /&gt;
== Administration Advantages ==&lt;br /&gt;
&lt;br /&gt;
If a customer needs you to fix something on their dedicated server you have to either know the root password or take the server down and boot from a rescue CD to get in and fix it. You also can't access the customer's files without logging in to their server as root. In a VPS you as host can enter their server at any time without a password. (Keeping the host environment very secure of course.) That allows you to do maintenance without having to look up the person's root password.&lt;br /&gt;
&lt;br /&gt;
== Ease of Setup ==&lt;br /&gt;
&lt;br /&gt;
Setup couldn't be easier as compared to building a dedicated server. All you have to do is type a few commands and the new virtual server is ready to go. You can have the customer running while you are still on the phone taking the order. A dedicated box requires setup, installation, and often has to be scheduled. This involves cost and time. VPS is ready instantly and easily. Any distro you want with all the latest updates installed. When a customer places an order they want it now. With VPS you can deliver it now.&lt;br /&gt;
&lt;br /&gt;
== Backup Advantages ==&lt;br /&gt;
&lt;br /&gt;
Additionally you can access the customers files directly from the host environment. This allows you to run rsync scripts to back up all the virtual servers to external storage or backup servers without the customer being aware that you are doing sophisticated backups. Then when the customer calls you up in a panic and says, &amp;quot;I totally screwed up my server and deleted a bunch of files by accident. Can you get it back?&amp;quot; You can magically restore their lost data and you are forever their hero.&lt;br /&gt;
&lt;br /&gt;
== IP Allocation Advantages ==&lt;br /&gt;
&lt;br /&gt;
Tired of allocating 4 IP addresses just to give the customer 1 usable? Or giving them 8 so they have 5 usable and most of them only use one? How inefficient is that? With OpenVZ you can allocate IP addresses individually so that if a customer only needs one IP then they get only 1 IP. But if they need 9 IP addresses you can give them exactly 9 of them. They can call you up and say I need one more IP and you can give it to them in seconds. On a dedicated server if you gave them a /29 vlan and they are using all 5 IPs and they need another one - that is a huge hassle.&lt;br /&gt;
&lt;br /&gt;
== Disk Space Allocation ==&lt;br /&gt;
&lt;br /&gt;
On dedicated servers you have to install a big hard drive that is mostly wasted. If the customer wants backups then it's two hard drives. In OpenVZ you just allocate space in the raid array based on what the customer actually needs and they only use the space that they use rather than what's allocated. The &amp;quot;allocation&amp;quot; is really just a software limit and that is a line in a text file that you can instantly change the moment the customer needs more space. On a dedicatd box if the customer needs a bigger drive then it's a trip to the data center with a new drive and a few hours time to copy everything over and replacing the drive, not to mention the down time.&lt;br /&gt;
&lt;br /&gt;
== Memory Upgrades ==&lt;br /&gt;
&lt;br /&gt;
Memory upgrades are as easy as hard drive upgrades. Just one command than the user has more ram. But what if the server is full and you don't have any more ram? No problem. Just copy the user's VE (virtual environment) over to another physical server with rsync and start them up there. In only a few minutes you've migrated them to a new box and they are up and running.&lt;br /&gt;
&lt;br /&gt;
== Migration ==&lt;br /&gt;
&lt;br /&gt;
Suppose a customer just needs a bigger server. Migration is easy in the VPS environment because the VE is consistent between servers. You just copy over the files and start it up. You don't have to build a new server, install an OS, copy it all over, and then mess with it for an hour getting everything to work.&lt;br /&gt;
&lt;br /&gt;
== Emergency Procedures ==&lt;br /&gt;
&lt;br /&gt;
Let's say that a server fries. With VPS and good backups you have more options. You can copy the backup of the VPS onto another server and restore it as of the last (nightly) backup. (I'm a backup freak - but it pays.) That gets the customers up instantly if they need that while a tech can go down there and fox the server with less pressure. This give you more options when bad things happen.&lt;br /&gt;
&lt;br /&gt;
== Load Balancing ==&lt;br /&gt;
&lt;br /&gt;
OpenVZ allows you to migrate servers live from one physical server to another. I haven't yet done that but I have done a shutdown, copy, and restart of the VE on another server and it's so easy to do that. So suppose you have a server that's a little crowded and some user starts hogging some resources. No problem. You just move a few users to another box and problem solved. This could probably be done automatically with some well configured cluster and I would love it if someone wrote a wiki page telling us how to do it.&lt;br /&gt;
&lt;br /&gt;
== Protecting your Customers ==&lt;br /&gt;
&lt;br /&gt;
Since you are managing the host system you can create IP filters and port blocking policies that help keep users from exploiting you or keep hackers from exploiting your users. Instead of a separate box that is all theirs you have them in a more managed shell allowing you to keep the inexperienced out of trouble. This provides them with a service that watched it more closely allowing them to do their own thing, but keeping you closer by to keep them out of trouble.&lt;br /&gt;
&lt;br /&gt;
= Cost =&lt;br /&gt;
&lt;br /&gt;
The cost savings are rather obvious. An entire rack compressed into one or two computers. Picture the space and power savings. The greenhouse gas not being generated by the power you're not using. The number of computers that you are not buying. The hours you are saving in setup time and administrative time. When it comes to saving money this is definitely a winner. You can take that extra money and pass some on to customers and keep some extra for yourself.&lt;br /&gt;
&lt;br /&gt;
= The Down Side =&lt;br /&gt;
&lt;br /&gt;
Any time you add another layer then you have another layer of things that can go wrong. It takes some learning to understand the process and there is the possibility that one person can screw up the system for everyone. As virtualization develops it will get better. OpenVZ is very stable in that it is far less intrusive than other virtualization methods. It is limited to Linux only so BSD and Windows users will have to do something else.&lt;br /&gt;
&lt;br /&gt;
= Conclusion =&lt;br /&gt;
&lt;br /&gt;
I believe that VPS represents the future of computing. The space, power, and cost savings are too great to ignore. I see data centers that are massive clusters running tens of thousands of logical servers that transparently migrate around the physical resources and are up 100% of the time. Customers no longer will have to deal with issues of backups the way they have to now, and it will simplify the hosting process. I think that every data center should be looking into virtualization technology now with the idea that you are going to be doing this and it's time to at least start thinking about it and exploring it with an eye towards the future.&lt;br /&gt;
&lt;br /&gt;
I have to say that my view of VPS has radically changed and that I now see this as a solution not just for people wanting little servers but for most everyone who is looking for dedicated service. VPS is a different way of looking at the computing world and it takes some significant mental adjustment and education to grasp the big picture.&lt;br /&gt;
&lt;br /&gt;
[[Category: Technology]]&lt;br /&gt;
[[Category: Concepts]]&lt;/div&gt;</summary>
		<author><name>Josh-A</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.openvz.org/index.php?title=Setting_up_an_iptables_firewall&amp;diff=3484</id>
		<title>Setting up an iptables firewall</title>
		<link rel="alternate" type="text/html" href="https://wiki.openvz.org/index.php?title=Setting_up_an_iptables_firewall&amp;diff=3484"/>
		<updated>2007-10-05T09:39:25Z</updated>

		<summary type="html">&lt;p&gt;Josh-A: /* See also */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This document consists of two parts. The first is setting up a firewall (using iptables) on the HN, which will restrict traffic to the VEs. The effect would emulate, as far as the VEs and their customers are concerned, an external hardware firewall controlled by the sysadmin. The second is setting up a firewall that protects the HN itself but still allows traffic to the VEs, thus allowing individual VEs to define their own iptables.&lt;br /&gt;
&lt;br /&gt;
While the firewalls shown here can be accomplished using iptables manually (or using Fedora core's iptables service), the methods presented here are especially modular and easy to modify. This is important when you have 20+ VEs and a lot of other things to be doing...&lt;br /&gt;
&lt;br /&gt;
The scripts and pathnames given here are for Fedora Core 6, though they can probably be applied to most similar SysV-like systems with little modification.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== A little background ==&lt;br /&gt;
&lt;br /&gt;
On our systems, we use the HN to provide privileged services which are not appropriate for access by the VEs. For example, the HN acts as a backup server, runs Nagios for health monitoring, has a webserver for managing the 3ware RAID controller, etc. The VEs are leased to customers, who can't entirely be trusted, especially if they get hacked. As such, our scenario is one in which the HN must be protected from all access (even from the VEs) except for a few trusted hosts (e.g. my home-office).&lt;br /&gt;
&lt;br /&gt;
The exception to this is the nameserver, which we want open to the world. We use it as a caching nameserver for our VEs and also to host DNS for a few customer domain.&lt;br /&gt;
&lt;br /&gt;
== Setting up a HN-based firewall ==&lt;br /&gt;
&lt;br /&gt;
This setup emulates (to the VEs anyway) an external hardware firewall. It protects the HN from any access and then defines what services and ports are allowed/banned for individual VEs. This leaves the firewall controlled by the site administrator, not be individual VEs and the hackers who've gotten into them. ;)&lt;br /&gt;
&lt;br /&gt;
First off, let's disable Fedora's existing &amp;lt;code&amp;gt;iptables&amp;lt;/code&amp;gt; service:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
service iptables stop&lt;br /&gt;
chkconfig iptables off&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Now create the new &amp;lt;code&amp;gt;firewall&amp;lt;/code&amp;gt; service. This code should be &amp;lt;code&amp;gt;/etc/init.d/firewall&amp;lt;/code&amp;gt; and then should be chmod'd 755.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
#!/bin/sh&lt;br /&gt;
# firewall      Start iptables firewall&lt;br /&gt;
# chkconfig: 2345 08 92&lt;br /&gt;
# description:  Starts, stops and saves iptables firewall&lt;br /&gt;
# This script sets up the firewall for the INPUT chain (which is for the HN itself)&lt;br /&gt;
# and then processes the config files under /etc/firewall.d to set up additional rules&lt;br /&gt;
# in the FORWARD chain to allow access to VEs' services.&lt;br /&gt;
&lt;br /&gt;
. /etc/init.d/functions&lt;br /&gt;
&lt;br /&gt;
# the IP block allocated to this server&lt;br /&gt;
SEGMENT=&amp;quot;192.168.0.0/24&amp;quot;&lt;br /&gt;
# the IP used by the hosting server itself&lt;br /&gt;
THISHOST=&amp;quot;192.168.0.1&amp;quot;&lt;br /&gt;
# services that should be allowed to the HN; services for VEs are configured in /etc/firewall.d/*&lt;br /&gt;
OKPORTS=&amp;quot;53&amp;quot;&lt;br /&gt;
# hosts allowed full access through the firewall, to all VEs and to this server&lt;br /&gt;
DMZS=&amp;quot;12.34.56.78 90.123.45.67&amp;quot;&lt;br /&gt;
&lt;br /&gt;
purge() {&lt;br /&gt;
  echo -n &amp;quot;Firewall: Purging and allowing all traffic&amp;quot;&lt;br /&gt;
  iptables -P OUTPUT ACCEPT&lt;br /&gt;
  iptables -P FORWARD ACCEPT&lt;br /&gt;
  iptables -P INPUT ACCEPT&lt;br /&gt;
  iptables -F&lt;br /&gt;
  success ; echo&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
setup() {&lt;br /&gt;
  echo -n &amp;quot;Firewall: Setting default policies to DROP&amp;quot;&lt;br /&gt;
  iptables -P INPUT DROP&lt;br /&gt;
  iptables -P FORWARD DROP&lt;br /&gt;
  iptables -I INPUT   -j ACCEPT -m state --state ESTABLISHED,RELATED&lt;br /&gt;
  iptables -I FORWARD -j ACCEPT -m state --state ESTABLISHED,RELATED&lt;br /&gt;
  iptables -I INPUT -j ACCEPT -i lo&lt;br /&gt;
  iptables -I FORWARD -j ACCEPT --source $SEGMENT&lt;br /&gt;
  success ; echo&lt;br /&gt;
&lt;br /&gt;
  echo &amp;quot;Firewall: Allowing access to HN&amp;quot;&lt;br /&gt;
  for port in $OKPORTS ; do&lt;br /&gt;
    echo -n &amp;quot;          port $port&amp;quot;&lt;br /&gt;
    iptables -I INPUT -j ACCEPT -s $SEGMENT -d $THISHOST --protocol tcp --destination-port $port&lt;br /&gt;
    iptables -I INPUT -j ACCEPT -s $SEGMENT -d $THISHOST --protocol udp --destination-port $port&lt;br /&gt;
    success ; echo&lt;br /&gt;
  done&lt;br /&gt;
  for ip in $DMZS ; do&lt;br /&gt;
    echo -n &amp;quot;          DMZ $ip&amp;quot;&lt;br /&gt;
    iptables -I INPUT   -i eth0 -j ACCEPT -s $ip&lt;br /&gt;
    iptables -I FORWARD -i eth0 -j ACCEPT -s $ip&lt;br /&gt;
    success ; echo&lt;br /&gt;
  done&lt;br /&gt;
&lt;br /&gt;
  VESETUPS=`echo /etc/firewall.d/*`&lt;br /&gt;
  if [ &amp;quot;$VESETUPS&amp;quot; != &amp;quot;/etc/firewall.d/*&amp;quot; ] ; then&lt;br /&gt;
  echo &amp;quot;Firewall: Setting up VE firewalls&amp;quot;&lt;br /&gt;
  for i in $VESETUPS ; do&lt;br /&gt;
    . $i&lt;br /&gt;
    echo -n &amp;quot;          $VENAME VE$VEID&amp;quot;&lt;br /&gt;
    if [ -n &amp;quot;$BANNED&amp;quot; ]; then&lt;br /&gt;
      for source in $BANNED ;  do iptables -I FORWARD -j DROP --destination $VEIP --source $source ; done&lt;br /&gt;
    fi&lt;br /&gt;
    if [ -n &amp;quot;$OPENPORTS&amp;quot; ]; then&lt;br /&gt;
      for port in $OPENPORTS ; do iptables -I FORWARD -j ACCEPT --protocol tcp --destination $VEIP --destination-port $port ; done&lt;br /&gt;
      for port in $OPENPORTS ; do iptables -I FORWARD -j ACCEPT --protocol udp --destination $VEIP --destination-port $port ; done&lt;br /&gt;
    fi&lt;br /&gt;
    if [ -n &amp;quot;$DMZS&amp;quot; ]; then&lt;br /&gt;
      for source in $DMZS ; do iptables -I FORWARD -j ACCEPT --protocol tcp --destination $VEIP --source $source ; done&lt;br /&gt;
      for source in $DMZS ; do iptables -I FORWARD -j ACCEPT --protocol udp --destination $VEIP --source $source ; done&lt;br /&gt;
    fi&lt;br /&gt;
    [ $? -eq 0 ] &amp;amp;&amp;amp; success || failure&lt;br /&gt;
    echo&lt;br /&gt;
  done&lt;br /&gt;
  fi&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
case &amp;quot;$1&amp;quot; in&lt;br /&gt;
  start)&lt;br /&gt;
    echo &amp;quot;Starting firewall...&amp;quot;&lt;br /&gt;
    purge&lt;br /&gt;
    setup&lt;br /&gt;
    ;;&lt;br /&gt;
  stop)&lt;br /&gt;
    echo &amp;quot;Stopping firewall...&amp;quot;&lt;br /&gt;
    purge&lt;br /&gt;
    ;;&lt;br /&gt;
  restart)&lt;br /&gt;
    $0 stop&lt;br /&gt;
    $0 start&lt;br /&gt;
    ;;&lt;br /&gt;
  status)&lt;br /&gt;
    iptables -n -L&lt;br /&gt;
    ;;&lt;br /&gt;
  *)&lt;br /&gt;
    echo &amp;quot;Usage: $0 &amp;lt;start|stop|restart|status&amp;gt;&amp;quot;&lt;br /&gt;
    ;;&lt;br /&gt;
esac&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The above script can be called like this:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
service firewall start&lt;br /&gt;
service firewall stop&lt;br /&gt;
service firewall restart&lt;br /&gt;
service firewall status&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
It will set up the firewall for the HN according to the parameters you specified for OKPORTS, DMZs, etc. and then it will call each file under /etc/firewall.d and process  its configuration.&lt;br /&gt;
&lt;br /&gt;
So create a file under /etc/firewall.d The exact filename isn't important, as long as it's meaningful to you, e.g. &amp;lt;code&amp;gt;ExampleCompany&amp;lt;/code&amp;gt; or &amp;lt;code&amp;gt;ve12&amp;lt;/code&amp;gt; and give it content like this:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# This file is processed by /etc/init.d/firewall&lt;br /&gt;
VEID=&amp;quot;1&amp;quot;                      # the VE's ID#&lt;br /&gt;
VENAME=&amp;quot;Customer1&amp;quot;            # A human-friendly label for the VE&lt;br /&gt;
VEIP=&amp;quot;192.168.1.34&amp;quot;           # the IP address for this VE&lt;br /&gt;
OPENPORTS=&amp;quot;80 443&amp;quot;            # ports that should be universally opened to the entire Internet&lt;br /&gt;
DMZS=&amp;quot;1.2.3.0/24 5.6.7.8/32&amp;quot;  # IPs and blocks that should have full access to the VE's services&lt;br /&gt;
BANNED=&amp;quot;&amp;quot;                     # IPs and blocks that should be entirely blocked from the VE's services&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
And there you go. Go ahead and start the firewall and check its status:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
service firewall restart&lt;br /&gt;
service firewall status&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
As you can see, you can now add and edit the configurations for individual VEs very easily. This method proves a lot easier to manage than Fedora's iptables-config mechamism!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Setting up a firewall that allows per-VE configuration ==&lt;br /&gt;
&lt;br /&gt;
This setup configures iptables on the HN to disallow access to all hosts, including the VEs. However, it allows all traffic into the VEs so they may define their own iptables rules and therefore manage their own firewall.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;This content is missing. You are invited to fill it in, if you get to it before I do. :)&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
&lt;br /&gt;
* [[Traffic accounting with iptables]]&lt;br /&gt;
* [http://blog.webhosting.uk.com/2006/06/08/some-thing-about-iptables/ More info on iptables]&lt;br /&gt;
&lt;br /&gt;
[[ Category: Networking ]]&lt;br /&gt;
[[ Category: Firewalls ]]&lt;/div&gt;</summary>
		<author><name>Josh-A</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.openvz.org/index.php?title=Control_panels&amp;diff=3470</id>
		<title>Control panels</title>
		<link rel="alternate" type="text/html" href="https://wiki.openvz.org/index.php?title=Control_panels&amp;diff=3470"/>
		<updated>2007-09-28T11:44:48Z</updated>

		<summary type="html">&lt;p&gt;Josh-A: /* Free software */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page contains links to different control panels for OpenVZ, written by third parties. If you know the project that's missing here, please add it.&lt;br /&gt;
&lt;br /&gt;
== Free software ==&lt;br /&gt;
* EasyVZ: [http://easyvz.sourceforge.net/ screenshots] | [http://sourceforge.net/projects/easyvz sf.net project page]&lt;br /&gt;
* Webmin: [http://www.webmin.com/index8.html homepage] | [http://webadminmodules.sourceforge.net/?page=Search&amp;amp;action=search OpenVZ plugin] (search for OpenVZ)&lt;br /&gt;
* Webhosting.UK.com: [http://www.webhosting.uk.com/forums/showthread.php?t=77 List of free and paid hosting control panels]&lt;br /&gt;
&lt;br /&gt;
== Non-free ==&lt;br /&gt;
* VZ-Manager: [http://vzmanager.de/ homepage (German)]&lt;br /&gt;
* HyperVM: [http://lxlabs.com/software/hypervm/ homepage]&lt;br /&gt;
* vzAdmin: [http://www.vzAdmin.info/ homepage (German)]&lt;br /&gt;
&lt;br /&gt;
== Unknown license ==&lt;br /&gt;
* OpenVZ Control panel for Windows(r): {{forum|1491}} | [http://downloads.qmailrocks.ru/vz/ downloads] ''unknown license''&lt;br /&gt;
&lt;br /&gt;
== Frozen projects ==&lt;br /&gt;
* VZAdmin: [http://www.ronny-goerner.de/ homepage] ''seems not available now''&lt;br /&gt;
* WVZ: [http://homaly.dunanet.hu/wvz/ homepage] ''seems frozen''&lt;br /&gt;
* New OpenVZ Web Based Control Panel by rsailor: {{forum|230}} ''seems not available now''&lt;/div&gt;</summary>
		<author><name>Josh-A</name></author>
		
	</entry>
</feed>