-
Notifications
You must be signed in to change notification settings - Fork 254
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
When ACL is applied to a subnet, the action allow-related affects the other actions,such as drop #241
Comments
ovn : 21.12.3 The acl rule applies to the ls。 |
@BigCousin-z thanks for the report! However, this is expected behavior, as allow-related ACLs rely on conntrack to allow reply traffic for sessions allowed in the original direction. For this ICMP exchange, in the first case (no "allow-related" ACL): In the second case ("allow-related" ACL): I'm not completely sure what policy you're trying to implement with these ACLs. If you share that we might be able to help you figure out the correct way of defining the ACLs. Regards, |
@dceara thanks for your answer. For this result, ACL has a "allow-related" ,but why is it not based on the action “conntrack entry created at step "a" ” , but rather on the action drop rule of “0.0.0.0/0”? |
That's because the traffic that initiates the connection (ICMP request 100.100.100.2 -> 100.100.200.2) doesn't match the "allow-related" ACL, it actually matches the drop rule ("3"). So in this case the ICMP request doesn't even reach the destination. |
Yes, this statement is understandable to me,but if the ACL rules in the subnet cannot take effect after establishing the conntrack tab,what tool or commands can be used to configure them to take effect in the conntrack table? |
I have a question, the establishment of conntrack initiates needs to be bidirectional, the request 100.100.100.2->100.100.200.2 passed, but relpy 100.100.200.2->100.100.100.2 did not come back, how does conntrack deal with it at this time? |
If the reply doesn't come back (doesn't get sent to conntrack in the same zones as the request) then the conntrack entry stays in state UNREPLIED. But the reason why the reply doesn't get sent to conntrack is what should be investigated. Do you have a NB database we can have a look at? |
configure as:
ovn-nbctl acl-list subnet
1:to-lport 2000 (ip4.src == 100.100.200.0/24) drop
when I modify the configure ,as:
ovn-nbctl acl-list subnet
1:to-lport 2000 (ip4.src == 100.100.200.0/24) drop
2:to-lport 2000 (ip4.src == 1.2.3.4/24) allow-related
Will allow related-affect the correctness of other rule actions?
The text was updated successfully, but these errors were encountered: