On 07/28/2016 02:55 AM, Erwin Straver
wrote:
A libvirt "isolated" virtual network is intended for situations where you want communication between guests and the host, but not beyond. It will have iptables rules automatically loaded that prevent any traffic on that network from "escaping" to the outside. That's not what you want though - you want the traffic to get out, but only via the virtual machine named "dmz". The most straightforward way to do this is to: 1) create a libvirt virtual network with *no IP* address on the host (so that it's impossible for any traffic from this network to get out directly via the host) then setup your "dmz" guest just as you would a real hardware firewall: 2) manually assign an IP address (probably 10.0.0.1) in the "dmz" guest's network config for eth1 3) enable ip_forwarding on dmz 4) enable dnsmasq service on dmz's eth1 (rather than relying on a dnsmasq on the host) to provide each additional guest on the "local" network with a) an IP address b) a DNS proxy listening on dmz's eth1 c) a default route pointing to 10.0.0.1 (i.e. dmz's eth1) The libvirt virtual network definition is as simple as it gets: <network> <name>local</name> </network> |
_______________________________________________ libvirt-users mailing list libvirt-users@xxxxxxxxxx https://www.redhat.com/mailman/listinfo/libvirt-users