Merge "Fix some Openvswitch firewall doc typos"
This commit is contained in:
commit
3af84208ed
@ -113,10 +113,10 @@ packets are left to be normally switched by the integration bridge.
|
|||||||
.. note::
|
.. note::
|
||||||
|
|
||||||
There is a new config option ``explicitly_egress_direct``, if it is set
|
There is a new config option ``explicitly_egress_direct``, if it is set
|
||||||
to True, it will direct egress unicast traffic to local port directly
|
to True, it will direct egress unicast traffic to the local port directly
|
||||||
or to patch bridge port if destination is in remote host. So there is
|
or to the patch bridge port if the destination is in a remote host. So there
|
||||||
no NORMAL for egress in such scenario. This option is used to overcome
|
is no NORMAL for egress in such scenario. This option is used to overcome
|
||||||
the egress packet flooding when openflow firewall is enabled.
|
the egress packet flooding when the openflow firewall is enabled.
|
||||||
|
|
||||||
Connections that are not matched by the above rules are sent to either the
|
Connections that are not matched by the above rules are sent to either the
|
||||||
ingress or egress filtering table, depending on its direction. The reason the
|
ingress or egress filtering table, depending on its direction. The reason the
|
||||||
@ -182,8 +182,8 @@ Rules example with explanation:
|
|||||||
-------------------------------
|
-------------------------------
|
||||||
|
|
||||||
The following example presents two ports on the same host. They have different
|
The following example presents two ports on the same host. They have different
|
||||||
security groups and there is ICMP traffic allowed from first security group to
|
security groups and there is ICMP traffic allowed from the first security group
|
||||||
the second security group. Ports have following attributes:
|
to the second security group. Ports have the following attributes:
|
||||||
|
|
||||||
::
|
::
|
||||||
|
|
||||||
@ -208,7 +208,7 @@ the second security group. Ports have following attributes:
|
|||||||
Port 3
|
Port 3
|
||||||
- patch bridge port (e.g. patch-tun) in OVS bridge
|
- patch bridge port (e.g. patch-tun) in OVS bridge
|
||||||
|
|
||||||
|table_0| - |table_59| contain some low priority rules to continue packets
|
|table_0| - |table_59| contain some low priority rules to continue packet
|
||||||
processing in |table_60| aka TRANSIENT table. |table_0| - |table_59| is
|
processing in |table_60| aka TRANSIENT table. |table_0| - |table_59| is
|
||||||
left for use to other features that take precedence over firewall, e.g.
|
left for use to other features that take precedence over firewall, e.g.
|
||||||
DVR, ARP poison/spoofing prevention, MAC spoof filtering and packet rate
|
DVR, ARP poison/spoofing prevention, MAC spoof filtering and packet rate
|
||||||
@ -234,20 +234,20 @@ match rule to do such identifying work as well.
|
|||||||
table=60, priority=0 actions=NORMAL
|
table=60, priority=0 actions=NORMAL
|
||||||
|
|
||||||
The following table, |table_71| implements ARP spoofing protection, IP spoofing
|
The following table, |table_71| implements ARP spoofing protection, IP spoofing
|
||||||
protection, allows traffic related to IP address allocations (dhcp, dhcpv6,
|
protection, allows traffic related to IP address allocations (DHCP, DHCPv6,
|
||||||
slaac, ndp) for egress traffic, and allows ARP replies. Also identifies not
|
SLAAC, NDP) for egress traffic, and allows ARP replies. Also identifies not
|
||||||
tracked connections which are processed later with information obtained from
|
tracked connections which are processed later with information obtained from
|
||||||
conntrack. Notice the ``zone=NXM_NX_REG6[0..15]`` in ``actions`` when obtaining
|
conntrack. Notice the ``zone=NXM_NX_REG6[0..15]`` in ``actions`` when obtaining
|
||||||
information from conntrack. It says every port has its own conntrack zone
|
information from conntrack. It says every port has its own conntrack zone
|
||||||
defined by the value in ``register 6`` (OVSDB port tag identifying the network).
|
defined by the value in ``register 6`` (OVSDB port tag identifying the network).
|
||||||
It's there to avoid accepting established traffic that belongs to different
|
It's there to avoid accepting established traffic that belongs to a different
|
||||||
port with same conntrack parameters.
|
port with the same conntrack parameters.
|
||||||
|
|
||||||
The very first rule in |table_71| is a rule removing conntrack information
|
The very first rule in |table_71| is a rule removing conntrack information for
|
||||||
for a use-case where Neutron logical port is placed directly to the hypervisor.
|
a use-case where a Neutron logical port is placed directly to the hypervisor.
|
||||||
In such case kernel does conntrack lookup before packet reaches Open vSwitch
|
In such cases the kernel does conntrack lookup before the packet reaches the
|
||||||
bridge. Tracked packets are sent back for processing by the same table after
|
Open vSwitch bridge. Tracked packets are sent back for processing by the same
|
||||||
conntrack information is cleared.
|
table after conntrack information is cleared.
|
||||||
|
|
||||||
::
|
::
|
||||||
|
|
||||||
@ -292,7 +292,7 @@ instances.
|
|||||||
table=71, priority=70,udp,reg5=0x2,in_port=2,tp_src=67,tp_dst=68 actions=resubmit(,93)
|
table=71, priority=70,udp,reg5=0x2,in_port=2,tp_src=67,tp_dst=68 actions=resubmit(,93)
|
||||||
table=71, priority=70,udp6,reg5=0x2,in_port=2,tp_src=547,tp_dst=546 actions=resubmit(,93)
|
table=71, priority=70,udp6,reg5=0x2,in_port=2,tp_src=547,tp_dst=546 actions=resubmit(,93)
|
||||||
|
|
||||||
Flowing rules obtain conntrack information for valid IP and MAC address
|
Following rules obtain conntrack information for valid IP and MAC address
|
||||||
combinations. All other packets are dropped.
|
combinations. All other packets are dropped.
|
||||||
|
|
||||||
::
|
::
|
||||||
@ -344,9 +344,9 @@ allowed.
|
|||||||
table=72, priority=50,ct_state=-new-est+rel-inv,ct_zone=644,ct_mark=0,reg5=0x1 actions=resubmit(,94)
|
table=72, priority=50,ct_state=-new-est+rel-inv,ct_zone=644,ct_mark=0,reg5=0x1 actions=resubmit(,94)
|
||||||
table=72, priority=50,ct_state=-new-est+rel-inv,ct_zone=644,ct_mark=0,reg5=0x2 actions=resubmit(,94)
|
table=72, priority=50,ct_state=-new-est+rel-inv,ct_zone=644,ct_mark=0,reg5=0x2 actions=resubmit(,94)
|
||||||
|
|
||||||
In the following, flows are marked established connections that weren't matched
|
In the following, flows are marked established for connections that weren't
|
||||||
in the previous flows, which means they don't have accepting security group
|
matched in the previous flows, which means they don't have an accepting
|
||||||
rule anymore.
|
security group rule anymore.
|
||||||
|
|
||||||
::
|
::
|
||||||
|
|
||||||
@ -356,10 +356,10 @@ rule anymore.
|
|||||||
table=72, priority=40,ct_state=+est,reg5=0x2 actions=ct(commit,zone=NXM_NX_REG6[0..15],exec(load:0x1->NXM_NX_CT_MARK[]))
|
table=72, priority=40,ct_state=+est,reg5=0x2 actions=ct(commit,zone=NXM_NX_REG6[0..15],exec(load:0x1->NXM_NX_CT_MARK[]))
|
||||||
table=72, priority=0 actions=drop
|
table=72, priority=0 actions=drop
|
||||||
|
|
||||||
In following |table_73| are all detected ingress connections sent to ingress
|
In the following |table_73| are all detected ingress connections sent to the
|
||||||
pipeline. Since the connection was already accepted by egress pipeline, all
|
ingress pipeline. Since the connection was already accepted by the egress
|
||||||
remaining egress connections are sent to normal flood'n'learn switching
|
pipeline, all remaining egress connections are sent to the normal flood'n'learn
|
||||||
in |table_94|.
|
switching in |table_94|.
|
||||||
|
|
||||||
::
|
::
|
||||||
|
|
||||||
@ -374,7 +374,7 @@ in |table_94|.
|
|||||||
table=73, priority=0 actions=drop
|
table=73, priority=0 actions=drop
|
||||||
|
|
||||||
|table_81| is similar to |table_71|, allows basic ingress traffic for
|
|table_81| is similar to |table_71|, allows basic ingress traffic for
|
||||||
obtaining IP address and ARP queries. Note that vlan tag must be removed by
|
obtaining IP address and ARP queries. Note that the VLAN tag must be removed by
|
||||||
adding ``strip_vlan`` to actions list, prior to injecting packet directly to
|
adding ``strip_vlan`` to actions list, prior to injecting packet directly to
|
||||||
port. Not tracked packets are sent to obtain conntrack information.
|
port. Not tracked packets are sent to obtain conntrack information.
|
||||||
|
|
||||||
@ -447,7 +447,7 @@ rules are:
|
|||||||
|
|
||||||
Only dimension 2/2 flows are shown here, as the other are similar to
|
Only dimension 2/2 flows are shown here, as the other are similar to
|
||||||
the previous ICMP example. There are many more flows but only the port
|
the previous ICMP example. There are many more flows but only the port
|
||||||
ranges that covers from 64 to 127 are shown for brevity.
|
ranges that cover from 64 to 127 are shown for brevity.
|
||||||
|
|
||||||
The conjunction IDs 14 and 15 correspond to packets from the security
|
The conjunction IDs 14 and 15 correspond to packets from the security
|
||||||
group 1, and the conjunction IDs 22 and 23 correspond to those from
|
group 1, and the conjunction IDs 22 and 23 correspond to those from
|
||||||
@ -506,9 +506,9 @@ same as in |table_72|.
|
|||||||
a port is plugged in. That makes a difference between traffic on hypervisor
|
a port is plugged in. That makes a difference between traffic on hypervisor
|
||||||
only and east-west traffic. For example, if a port has a VIP that was
|
only and east-west traffic. For example, if a port has a VIP that was
|
||||||
migrated to a port on a different node, then the new port won't contain
|
migrated to a port on a different node, then the new port won't contain
|
||||||
conntrack information about previous traffic that happened with VIP.
|
conntrack information about previous traffic that happened with that VIP.
|
||||||
|
|
||||||
By default the |table_94| will have one single flow like this:
|
By default |table_94| will have one single flow like this:
|
||||||
|
|
||||||
::
|
::
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user