Routed VR: accept packets from related and established connections#12986
Routed VR: accept packets from related and established connections#12986sureshanaparti merged 1 commit intoapache:4.20from
Conversation
There was a problem hiding this comment.
Copilot wasn't able to review any files in this pull request.
💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.
|
@blueorangutan package |
|
@weizhouapache a [SL] Jenkins job has been kicked to build packages. It will be bundled with KVM, XenServer and VMware SystemVM templates. I'll keep you posted as I make progress. |
Codecov Report✅ All modified and coverable lines are covered by tests. Additional details and impacted files@@ Coverage Diff @@
## 4.20 #12986 +/- ##
============================================
- Coverage 16.26% 16.26% -0.01%
Complexity 13434 13434
============================================
Files 5665 5665
Lines 500530 500530
Branches 60787 60787
============================================
- Hits 81411 81410 -1
Misses 410028 410028
- Partials 9091 9092 +1
Flags with carried forward coverage won't be shown. Click here to find out more. ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
|
Packaging result [SF]: ✔️ el8 ✔️ el9 ✔️ el10 ✔️ debian ✔️ suse15. SL-JID 17409 |
|
@blueorangutan test |
|
@weizhouapache a [SL] Trillian-Jenkins test job (ol8 mgmt + kvm-ol8) has been kicked to run smoke tests |
|
[SF] Trillian Build Failed (tid-15829) |
There was a problem hiding this comment.
Copilot wasn't able to review any files in this pull request.
💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.
|
@blueorangutan test |
|
@sureshanaparti a [SL] Trillian-Jenkins test job (ol8 mgmt + kvm-ol8) has been kicked to run smoke tests |
|
[SF] Trillian test result (tid-15831)
|
|
@khumps |
There was a problem hiding this comment.
LGTM
Tested manually on a routed mode isolated network
-
Created a zone with dynamic routing enabled and an IP subnet pool configured
-
Created a network offering with routing mode = Dynamic and default egress policy = Deny
-
Deploy an isolated routed network using that offering
In the network's IPv4 Routing Firewall, add:
Ingress rule: TCP port 22 from 0.0.0.0/0
Egress rule: TCP port 22 to 0.0.0.0/0 -
Deploy a VM in the network
-
Able to SSH to the VM from an external host > works
Rules on the router
chain fw_chain_egress {
ip saddr 0.0.0.0/0 ip daddr 0.0.0.0/0 tcp dport 22 accept
counter packets 3 bytes 228 drop
}
chain fw_chain_ingress {
ip saddr 0.0.0.0/0 ip daddr 0.0.0.0/0 tcp dport 22 accept
counter packets 0 bytes 0 drop
}
-
Remove the egress rule from the network
-
SSH to the VM from an external host > works
chain fw_chain_egress {
counter packets 0 bytes 0 drop
}
chain fw_chain_ingress {
ip saddr 0.0.0.0/0 ip daddr 0.0.0.0/0 tcp dport 22 accept
counter packets 0 bytes 0 drop
}
Description
This PR fixes #12962
the change is similar to #10970
Tested with Routed network and Routed VPC with Dynamic routing
Types of changes
Feature/Enhancement Scale or Bug Severity
Feature/Enhancement Scale
Bug Severity
Screenshots (if appropriate):
How Has This Been Tested?
How did you try to break this feature and the system with this change?