D
das7002
Guest
I've spent days trying to figure this out. I can't for the life of me figure out why exactly this is happening...
If I create a VM with NAT networking it'll boot up and seem to work fine. Gets an IP address and everything from the internal DHCP (Proxmox default is apparently 10.0.2.0/24 as I never changed that).
I can even do DNS lookups on the (probably) passthrough 10.0.2.3. And the 10.0.2.2 shows the Proxmox web interface if I go to it in a browser.
IP Forwarding is one
I currently have not a single rule in IPTables
I've even tried using a slightly modified IPTables ruleset that I use on my non proxmox KVM systems to get NAT working
Also, no dice.
I don't use the standard network setup though, my host uses eth0 for the internal datacenter network for server<=> server connections and eth1 is public. So my /etc/network/interfaces is like so
What exactly am I missing here? I really have no idea what is wrong here...
If I create a VM with NAT networking it'll boot up and seem to work fine. Gets an IP address and everything from the internal DHCP (Proxmox default is apparently 10.0.2.0/24 as I never changed that).
I can even do DNS lookups on the (probably) passthrough 10.0.2.3. And the 10.0.2.2 shows the Proxmox web interface if I go to it in a browser.
Code:
cat /proc/sys/net/ipv4/ip_forward
1
IP Forwarding is one
I currently have not a single rule in IPTables
Code:
# Generated by iptables-save v1.4.8 on Mon Jun 11 23:21:06 2012
*nat
:PREROUTING ACCEPT [616:32473]
:POSTROUTING ACCEPT [395:24316]
:OUTPUT ACCEPT [346:21251]
COMMIT
# Completed on Mon Jun 11 23:21:06 2012
# Generated by iptables-save v1.4.8 on Mon Jun 11 23:21:06 2012
*mangle
:PREROUTING ACCEPT [21897:4212794]
:INPUT ACCEPT [13500:2312159]
:FORWARD ACCEPT [8365:1899091]
:OUTPUT ACCEPT [12401:4403267]
:POSTROUTING ACCEPT [20766:6302358]
COMMIT
# Completed on Mon Jun 11 23:21:06 2012
# Generated by iptables-save v1.4.8 on Mon Jun 11 23:21:06 2012
*filter
:INPUT ACCEPT [13271:2280773]
:FORWARD ACCEPT [8324:1896152]
:OUTPUT ACCEPT [12173:4364814]
:fail2ban-ssh - [0:0]
:fail2ban-ssh-ddos - [0:0]
-A INPUT -p tcp -m multiport --dports 22 -j fail2ban-ssh
-A INPUT -p tcp -m multiport --dports 22 -j fail2ban-ssh-ddos
-A fail2ban-ssh -j RETURN
-A fail2ban-ssh-ddos -j RETURN
COMMIT
# Completed on Mon Jun 11 23:21:06 2012
I've even tried using a slightly modified IPTables ruleset that I use on my non proxmox KVM systems to get NAT working
Code:
*nat
:PREROUTING ACCEPT [661:21364]
:POSTROUTING ACCEPT [58069:3670258]
:OUTPUT ACCEPT [58069:3670258]
-A POSTROUTING -s 10.0.2.0/24 ! -d 10.0.2.0/24 -j MASQUERADE
COMMIT
*filter
:INPUT ACCEPT [1212620:674141323]
:FORWARD ACCEPT [0:0]
:OUTPUT ACCEPT [1518464:780474182]
-A INPUT -i vmbr0 -p udp -m udp --dport 53 -j ACCEPT
-A INPUT -i vmbr0 -p tcp -m tcp --dport 53 -j ACCEPT
-A INPUT -i vmbr0 -p udp -m udp --dport 67 -j ACCEPT
-A INPUT -i vmbr0 -p tcp -m tcp --dport 67 -j ACCEPT
-A FORWARD -d 10.0.2.0/24 -o vmbr0 -m state --state RELATED,ESTABLISHED -j ACCEPT
-A FORWARD -s 10.0.2.0/24 -i vmbr0 -j ACCEPT
-A FORWARD -i vmbr0 -o vmbr0 -j ACCEPT
-A FORWARD -o vmbr0 -j REJECT --reject-with icmp-port-unreachable
-A FORWARD -i vmbr0 -j REJECT --reject-with icmp-port-unreachable
COMMIT
Also, no dice.
I don't use the standard network setup though, my host uses eth0 for the internal datacenter network for server<=> server connections and eth1 is public. So my /etc/network/interfaces is like so
Code:
auto eth0
iface eth0 inet static
address 172.24.112.130
netmask 255.255.255.128
broadcast 172.24.112.255
auto lo
iface lo inet loopback
auto vmbr0
iface vmbr0 inet static
address XXX.XXX.XXX.XXX
netmask 255.255.255.248
gateway XXX.XXX.XXX.XXX
bridge_ports eth1
bridge_stp off
bridge_fd 0
What exactly am I missing here? I really have no idea what is wrong here...