Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases now! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Learning OpenStack Networking (Neutron), Second Edition

You're reading from   Learning OpenStack Networking (Neutron), Second Edition Wield the power of OpenStack Neutron networking to bring network infrastructure and capabilities to your cloud

Arrow left icon
Product type Paperback
Published in Nov 2015
Publisher Packt
ISBN-13 9781785287725
Length 462 pages
Edition 1st Edition
Languages
Arrow right icon
Author (1):
Arrow left icon
James Denton James Denton
Author Profile Icon James Denton
James Denton
Arrow right icon
View More author details
Toc

Table of Contents (16) Chapters Close

Preface 1. Preparing the Network for OpenStack FREE CHAPTER 2. Installing OpenStack 3. Installing Neutron 4. Building a Virtual Switching Infrastructure 5. Creating Networks with Neutron 6. Managing Security Groups 7. Creating Standalone Routers with Neutron 8. Router Redundancy Using VRRP 9. Distributed Virtual Routers 10. Load Balancing Traffic to Instances 11. Firewall as a Service 12. Virtual Private Network as a Service A. Additional Neutron Commands B. Virtualizing the Environment Index

Demonstrating traffic flow through a firewall

To see how firewall policies are applied to a Neutron router, take note of the following firewall rule, which allows HTTP traffic from any source to any destination on TCP port 80:

Demonstrating traffic flow through a firewall

Figure 11.10

The firewall rule was applied to the policy named MyFirewallPolicy as shown in the following screenshot:

Demonstrating traffic flow through a firewall

Figure 11.11

As the final step, the policy is associated with a firewall, MyFirewall, as shown in the following screenshot:

Demonstrating traffic flow through a firewall

Figure 11.12

Examining the chains

Once a firewall is created, the rules within the firewall policy are implemented on the associated router. Running iptables -L -t filter or iptables-save within a router namespace reveals the iptables rules that are implemented by the L3 agent. For readability, only the filter table is shown in the following screenshot:

Examining the chains

Figure 11.13

As with security groups, the FORWARD chain is used as the traffic is forwarded through the namespace rather than directed at it:

-A FORWARD -j neutron-filter-top
-A FORWARD...
lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime