All of lore.kernel.org
 help / color / mirror / Atom feed
* Virtual Guest MAC-Address Isolation
       [not found] <962329130.12101281190847485.JavaMail.root@mail>
@ 2010-08-07 14:24   ` Robert Rebstock
  0 siblings, 0 replies; 2+ messages in thread
From: Robert Rebstock @ 2010-08-07 14:24 UTC (permalink / raw)
  To: kvm, qemu-devel, vde-users

(Partially reposted, as I screwed up while copy and pasting my configs; sorry for the noise.)

Hello all,

can anyone recommend a better way to achive (guest agnostic) MAC-address
isolation in qemu/kvm than with usermodes/slirp networking? It's too slow. 

I have multiple guests on the same host, all requiring identical MAC-addresses.

My current debian setup is as follows:

/etc/network/interfaces:

auto lo
iface lo inet loopback

auto br0
iface br0 inet static
        address 192.168.0.1
        netmask 255.255.255.0
        gateway 192.168.0.254
        metric 1
        bridge_ports eth0 eth1
        bridge_stp off
        bridge_fd 0
        bridge_maxwait 0
        post-up echo 600 > /proc/sys/net/ipv4/tcp_keepalive_time
        post-up echo 50 > /proc/sys/net/ipv4/tcp_keepalive_probes
        post-up echo 10 > /proc/sys/net/ipv4/tcp_keepalive_intvl

auto natbr0
iface natbr0 inet static
        address 10.0.2.2
        netmask 255.255.255.0
        metric 1
        bridge_ports eth0
        bridge_stp off
        bridge_fd 0
        bridge_maxwait 0
        pre-up modprobe ip_conntrack_tftp
        pre-up modprobe ip_conntrack_ftp
        pre-up modprobe ip_nat_tftp
        pre-up modprobe ip_nat_ftp
        up echo "`route -n | sed -n 's/^0\.0\.0\.0 .* \(.*\)$/\1/p'`" > /var/run/${IFACE}_route
        up /usr/sbin/dnsmasq --interface=${IFACE}  --except-interface=lo --bind-interfaces --user=nobody \
        --dhcp-range=natbr0,10.0.2.15,10.0.2.15,255.255.255.0,10.0.2.255,72h \
        --domain=localnet --pid-file=/var/run/${IFACE}_dnsmasq.pid --conf-file
        up echo 1 > /proc/sys/net/ipv4/ip_forward
        up iptables -A FORWARD -s 10.0.2.0/24 -j ACCEPT
        up iptables -A FORWARD -d 10.0.2.0/24 -j ACCEPT
        post-up iptables -t nat -A POSTROUTING -o natbr0 -j MASQUERADE
        post-up echo 600 > /proc/sys/net/ipv4/tcp_keepalive_time
        post-up echo 50 > /proc/sys/net/ipv4/tcp_keepalive_probes
        post-up echo 10 > /proc/sys/net/ipv4/tcp_keepalive_intvl
        down iptables -D FORWARD -s 10.0.2.0/24 -j ACCEPT
        down iptables -D FORWARD -d 10.0.2.0/24 -j ACCEPT
        down iptables -t nat -D POSTROUTING -o natbr0 -j MASQUERADE
        post-down kill -s TERM `cat /var/run/${IFACE}_dnsmasq.pid` && rm -f /var/run/${IFACE}_dnsmasq.pid
        post-down rm -f /var/run/${IFACE}_route

where my "server boxes" are connected as:

/etc/qemu-kvm/qemu-ifup-br:
#!/bin/sh
BRIDGE=br0
/sbin/ifconfig $1 0.0.0.0 up
/usr/sbin/brctl addif $BRIDGE $1

if they need full connectivity,

or as:

/etc/qemu-kvm/qemu-ifup-natbr:

#!/bin/sh
BRIDGE=natbr0
/sbin/ifconfig $1 0.0.0.0 up
/usr/sbin/brctl addif $BRIDGE $1
/sbin/iptables -t nat -A POSTROUTING -o "`route -n | sed -n 's/^0\.0\.0\.0 .* \(.*\)$/\1/p'`" -j MASQUERADE || :

"hidden" behind NAT.

Only my "client boxes" (multiple virtual client boxes on the same server - currently setup using usermode networking) need identical MACs.
They don't need to "talk" to one another, but they do need to be able to talk to the servers and the "outside world".
 
I'm hoping that maybe someone that's a little more "network savvy" can give me a tip in the right direction.

vlans, ebtables, iptables, ppp, funky NAT setups, etc...

Thanks, and best regards,

Robert

PS. Please BCC me, as I am not on the list.

^ permalink raw reply	[flat|nested] 2+ messages in thread

* [Qemu-devel] Virtual Guest MAC-Address Isolation
@ 2010-08-07 14:24   ` Robert Rebstock
  0 siblings, 0 replies; 2+ messages in thread
From: Robert Rebstock @ 2010-08-07 14:24 UTC (permalink / raw)
  To: kvm, qemu-devel, vde-users

(Partially reposted, as I screwed up while copy and pasting my configs; sorry for the noise.)

Hello all,

can anyone recommend a better way to achive (guest agnostic) MAC-address
isolation in qemu/kvm than with usermodes/slirp networking? It's too slow. 

I have multiple guests on the same host, all requiring identical MAC-addresses.

My current debian setup is as follows:

/etc/network/interfaces:

auto lo
iface lo inet loopback

auto br0
iface br0 inet static
        address 192.168.0.1
        netmask 255.255.255.0
        gateway 192.168.0.254
        metric 1
        bridge_ports eth0 eth1
        bridge_stp off
        bridge_fd 0
        bridge_maxwait 0
        post-up echo 600 > /proc/sys/net/ipv4/tcp_keepalive_time
        post-up echo 50 > /proc/sys/net/ipv4/tcp_keepalive_probes
        post-up echo 10 > /proc/sys/net/ipv4/tcp_keepalive_intvl

auto natbr0
iface natbr0 inet static
        address 10.0.2.2
        netmask 255.255.255.0
        metric 1
        bridge_ports eth0
        bridge_stp off
        bridge_fd 0
        bridge_maxwait 0
        pre-up modprobe ip_conntrack_tftp
        pre-up modprobe ip_conntrack_ftp
        pre-up modprobe ip_nat_tftp
        pre-up modprobe ip_nat_ftp
        up echo "`route -n | sed -n 's/^0\.0\.0\.0 .* \(.*\)$/\1/p'`" > /var/run/${IFACE}_route
        up /usr/sbin/dnsmasq --interface=${IFACE}  --except-interface=lo --bind-interfaces --user=nobody \
        --dhcp-range=natbr0,10.0.2.15,10.0.2.15,255.255.255.0,10.0.2.255,72h \
        --domain=localnet --pid-file=/var/run/${IFACE}_dnsmasq.pid --conf-file
        up echo 1 > /proc/sys/net/ipv4/ip_forward
        up iptables -A FORWARD -s 10.0.2.0/24 -j ACCEPT
        up iptables -A FORWARD -d 10.0.2.0/24 -j ACCEPT
        post-up iptables -t nat -A POSTROUTING -o natbr0 -j MASQUERADE
        post-up echo 600 > /proc/sys/net/ipv4/tcp_keepalive_time
        post-up echo 50 > /proc/sys/net/ipv4/tcp_keepalive_probes
        post-up echo 10 > /proc/sys/net/ipv4/tcp_keepalive_intvl
        down iptables -D FORWARD -s 10.0.2.0/24 -j ACCEPT
        down iptables -D FORWARD -d 10.0.2.0/24 -j ACCEPT
        down iptables -t nat -D POSTROUTING -o natbr0 -j MASQUERADE
        post-down kill -s TERM `cat /var/run/${IFACE}_dnsmasq.pid` && rm -f /var/run/${IFACE}_dnsmasq.pid
        post-down rm -f /var/run/${IFACE}_route

where my "server boxes" are connected as:

/etc/qemu-kvm/qemu-ifup-br:
#!/bin/sh
BRIDGE=br0
/sbin/ifconfig $1 0.0.0.0 up
/usr/sbin/brctl addif $BRIDGE $1

if they need full connectivity,

or as:

/etc/qemu-kvm/qemu-ifup-natbr:

#!/bin/sh
BRIDGE=natbr0
/sbin/ifconfig $1 0.0.0.0 up
/usr/sbin/brctl addif $BRIDGE $1
/sbin/iptables -t nat -A POSTROUTING -o "`route -n | sed -n 's/^0\.0\.0\.0 .* \(.*\)$/\1/p'`" -j MASQUERADE || :

"hidden" behind NAT.

Only my "client boxes" (multiple virtual client boxes on the same server - currently setup using usermode networking) need identical MACs.
They don't need to "talk" to one another, but they do need to be able to talk to the servers and the "outside world".
 
I'm hoping that maybe someone that's a little more "network savvy" can give me a tip in the right direction.

vlans, ebtables, iptables, ppp, funky NAT setups, etc...

Thanks, and best regards,

Robert

PS. Please BCC me, as I am not on the list.

^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2010-08-08 17:22 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
     [not found] <962329130.12101281190847485.JavaMail.root@mail>
2010-08-07 14:24 ` Virtual Guest MAC-Address Isolation Robert Rebstock
2010-08-07 14:24   ` [Qemu-devel] " Robert Rebstock

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.