Back to top
 
 
 

Security group rules are not effective with KVM

Problem

Security group rules are not effective with KVM 

We have noticed that in certain deployments, the security group rules configured in CP not blocking the traffic as expected eventhough the corresponding rules are programmed at the KVM host by CloudPlatform. 

Response

Issue is a result of a known bug of enic driver, more precisely the cisco card firmware.

 

Some firmwares of these cards are marking non VLAN traffic as VLAN traffic with VLAN ID==0.

 

This is not a problem further in the OS networking stack since such VLAN ID=0 is automatically stripped with no harm.

 

Essentially, the NIC tags incoming traffic with no dot1q tag internally with tag 0, which is stripped again later. This is due to the fixed RX VLAN offloading configured by the NIC. Consequently, the traffic is marked as VLAN tagged (even though the tag is 0) and hence the brnf_filter_vlan_tagged sysctl is required.

https://bugzilla.redhat.com/show_bug.cgi?id=1434533

Only fix is by enabling brnf_filter_vlan_tagged sysctl.

sysctl -w net.bridge.bridge-nf-filter-vlan-tagged=1

To persist the change across reboot add "net.bridge.bridge-nf-filter-vlan-tagged=1" to /etc/sysctl.conf

http://ebtables.netfilter.org/documentation/bridge-nf.html

 

 

 

 

Document ID:
360004662791

Product:
CloudPlatform

Version:
4.7.1

Operating System:
Linux

Zendesk Ticket ID:
63378

 
この記事は役に立ちましたか?
0人中0人がこの記事が役に立ったと言っています

コメント