On Wednesday, September 19, 2012 08:42:57 PM lee wrote:
> Neal Murphy <neal.p.mur...@alum.wpi.edu> writes:
> > On Tuesday, September 18, 2012 05:59:47 PM lee wrote:
> >> Neal Murphy <neal.p.mur...@alum.wpi.edu> writes:
> >> > So yes, if you want 'real' networking, you'll need bridges and taps.
> >> 
> >> Thank you, I'll have to look into taps then.
> >> 
> >> Do you think it's a good idea to just create a bridge device with the
> >> unused eth0 for this?  I could leave eth1 as is and would basically only
> >> have to add a zone and appropriate policy and rules in the shorewall
> >> configuration.
> > 
> > If that is the only firewall method you have then yes, enable forwarding,
> > add the bridge to a second shorewall zone, and add iptables rules that
> > drop, reject, allow and deny traffic as you desire. All of your VMs can
> > easily be tapped into the bridge.
> 
> The router has a firewall and I'm running shorewall on the host behind
> that.  It should be save enough, and it gives me some things like
> traffic shaping which the router doesn't do.  I'm not doing firewall
> testing and like to keep things simple.
> 
> So now I know which way to go and what to read about, thanks :)

  o Remember to put the bridge and VMs in a LAN different from your NIC.
    And be sure there's a route to the bridge LAN on your router/FW so
    it knows where to send reply packets; if you wanted to be fancy, you
    could NAT the bridge from ethX, but that's a lot more work (port
    forwarding, SNAT, DNAT, et alia.)
  o The bridge's IP addr (on the host) is the default gateway for all VMs
    on that bridge.


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/201209192159.27665.neal.p.mur...@alum.wpi.edu

Reply via email to