Editing Setting up an iptables firewall

Jump to: navigation, search

Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision Your text
Line 1: Line 1:
This document consists of two parts. The first is setting up a firewall (using iptables) on the [[HN]], which will restrict traffic to the containers. The effect would emulate, as far as the containers and their customers are concerned, an external hardware firewall controlled by the sysadmin. The second is setting up a firewall that protects the HN itself but still allows traffic to the containers, thus allowing individual containers to define their own iptables.
+
This document consists of two parts. The first is setting up a firewall (using iptables) on the HN, which will restrict traffic to the containers. The effect would emulate, as far as the containers and their customers are concerned, an external hardware firewall controlled by the sysadmin. The second is setting up a firewall that protects the [[HN]] itself but still allows traffic to the containers, thus allowing individual containers to define their own iptables.
  
 
While the firewalls shown here can be accomplished using iptables manually (or using Fedora core's iptables service), the methods presented here are especially modular and easy to modify. This is important when you have 20+ containers and a lot of other things to be doing...
 
While the firewalls shown here can be accomplished using iptables manually (or using Fedora core's iptables service), the methods presented here are especially modular and easy to modify. This is important when you have 20+ containers and a lot of other things to be doing...
Line 10: Line 10:
  
 
The exception to this is the nameserver, which we want open to the world. We use it as a caching nameserver for our containers and also to host DNS for a few customer domain.
 
The exception to this is the nameserver, which we want open to the world. We use it as a caching nameserver for our containers and also to host DNS for a few customer domain.
 
== Simple firewall configuration independent of IP addresses: vzfirewall ==
 
 
<code>Vzfirewall</code> tool allows you to open/close ports for incoming connections with no dependencies to foreign IP addresses. E.g. you may allow a hostname <code>release.prod.example.com</code> to connect to port 5432 of VE 1234 and leave all other ports closed by modifying <code>1234.conf</code> file adding multiline <code>FIREWALL</code> directives into it:
 
 
<pre>
 
...
 
PRIVVMPAGES="300000:300000"
 
HOSTNAME="example.com"
 
...
 
FIREWALL="
 
    ...
 
    # Allow access to PostgreSQL port only from release.prod
 
    # and release.test machines. You may use domain names here.
 
    [5432]
 
    release.prod.example.com
 
    release.test.example.com
 
    ...
 
"
 
</pre>
 
 
You must then run <code>vzfirewall -a</code> on your hardware node to apply changes made in <code>*.conf</code>.
 
 
Note that it is recommended to use hostnames instead of IP addresses here, so the configuration is persistent for VE movements to different IP-address: you just need to run <code>vzfirewall -a</code> again after movement. It is also reboot-safe, as the rules are applied to <code>/etc/sysconfig/iptables</code> (at RHEL systems).
 
 
Vzfirewall and its documentation are available at [http://en.dklab.ru/lib/dklab_vzfirewall/ http://en.dklab.ru/lib/dklab_vzfirewall/].
 
  
 
== An alternative from the author of Shorewall ==
 
== An alternative from the author of Shorewall ==
Line 59: Line 33:
 
#!/bin/sh
 
#!/bin/sh
 
# firewall      Start iptables firewall
 
# firewall      Start iptables firewall
# chkconfig: 2345 97 87
+
# chkconfig: 2345 08 92
 
# description:  Starts, stops and saves iptables firewall
 
# description:  Starts, stops and saves iptables firewall
 
# This script sets up the firewall for the INPUT chain (which is for
 
# This script sets up the firewall for the INPUT chain (which is for
Line 65: Line 39:
 
# /etc/firewall.d to set up additional rules in the FORWARD chain
 
# /etc/firewall.d to set up additional rules in the FORWARD chain
 
# to allow access to containers' services.
 
# to allow access to containers' services.
# http://wiki.openvz.org/Setting_up_an_iptables_firewall
 
  
 
. /etc/init.d/functions
 
. /etc/init.d/functions
Line 191: Line 164:
 
</pre>
 
</pre>
  
And there you go.  
+
And there you go. Go ahead and start the firewall and check its status:
 
 
Note: You can only put one IP address inside the CTIP variable, but if your container has multiple IP addresses you can create a copy of the file for each IP address.
 
 
 
Go ahead and start the firewall and check its status:
 
 
<pre>
 
<pre>
 
service firewall restart
 
service firewall restart
Line 240: Line 209:
  
 
If you do not, you will get an error like this: "iptables: No chain/target/match by that name"
 
If you do not, you will get an error like this: "iptables: No chain/target/match by that name"
* Note: xt_tcpudp module seem to be included in the kernel packages of Debian 6, but not of CentOS 6.
 
  
 
If you want to use stateful firewall rules (and you should!) you will also need to make sure that 'ipt_state' is in the 'IPTABLES' option in your vz.conf file:
 
If you want to use stateful firewall rules (and you should!) you will also need to make sure that 'ipt_state' is in the 'IPTABLES' option in your vz.conf file:
Line 253: Line 221:
 
modprobe xt_state
 
modprobe xt_state
 
</pre>
 
</pre>
 
 
Above information is outdated, to enable iptables you need to make sure that CT.conf(CT - id of your container, 100 for example) contains following line:
 
 
<pre>
 
NETFILTER="full"
 
</pre>
 
 
When this done, you should reboot your container and iptables should work properly.
 
  
 
== See also ==
 
== See also ==
  
 
* [[Traffic accounting with iptables]]
 
* [[Traffic accounting with iptables]]
* [http://www.readymakers.com/blog/how-to-enable-iptables-in-openvz-container/ How to enable IPtables in OpenVZ container] (Frank Taveras) - Lack of modprobe modules on HN.
 
  
 
[[Category: Networking]]
 
[[Category: Networking]]

Please note that all contributions to OpenVZ Virtuozzo Containers Wiki may be edited, altered, or removed by other contributors. If you don't want your writing to be edited mercilessly, then don't submit it here.
If you are going to add external links to an article, read the External links policy first!

To edit this page, please answer the question that appears below (more info):

Cancel Editing help (opens in new window)