Brian, thanks for having the time and look into my problem. I have set my VMs by using virt-manager but here is how it looks the qemu/kvm process running for my client: [root@kvm1 ~]# ps -efl | grep qemu 6 S qemu 3532 1 1 80 0 - 2834530 poll_s 11:38 ? 00:03:20 /usr/libexec/qemu-kvm -S -M rhel6.3.0 -enable-kvm -m 8192 -smp 2,sockets=2,cores=1,threads=1 -name jacobi -uuid 740569a2-613f-ee1b-14fd-02772e28b211 -nodefconfig -nodefaults -chardev socket,id=charmonitor,path=/var/lib/libvirt/qemu/jacobi.monitor,server,nowait -mon chardev=charmonitor,id=monitor,mode=control -rtc base=utc -no-shutdown -boot order=cd,menu=on -device piix3-usb-uhci,id=usb,bus=pci.0,addr=0x1.0x2 -drive if=none,media=cdrom,id=drive-ide0-1-0,readonly=on,format=raw -device ide-drive,bus=ide.1,unit=0,drive=drive-ide0-1-0,id=ide0-1-0 -drive file=/ifs/virt/vm3/jacobi.img,if=none,id=drive-virtio-disk0,format=raw,cache=none -device virtio-blk-pci,scsi=off,bus=pci.0,addr=0x5,drive=drive-virtio-disk0,id=virtio-disk0 -netdev tap,fd=24,id=hostnet0,vhost=on,vhostfd=25 -device virtio-net-pci,netdev=hostnet0,id=net0,mac=52:54:00:ea:44:67,bus=pci.0,addr=0x3 -chardev pty,id=charserial0 -device isa-serial,chardev=charserial0,id=serial0 -device usb-tablet,id=input0 -vnc 127.0.0.1:0 -vga cirrus -device intel-hda,id=sound0,bus=pci.0,addr=0x4 -device hda-duplex,id=sound0-codec0,bus=sound0.0,cad=0 -incoming fd:22 -device virtio-balloon-pci,id=balloon0,bus=pci.0,addr=0x6 I'm using a standard way for setting up networking as assigning a static IP for iface eth0 52:54:00:ea:44:67. I have changed my firewall rules to use only this as from documentation and by having in mind what you said about having the VM on same network as the KVM host: iptables -I FORWARD -m physdev --physdev-is-bridged -j ACCEPT I'm not sure if the problem is because a port blocking on the network switch or a misconfiguration from my side. Anyways, I have tried to route VM by using the same default gateway used by the KVM host, or to use the KVM host as gateway but any of these two options work in my case. Thoughts? Regards, -Hugo -- Hugo R Hernández-Mora "Se seus esforços foram vistos com indeferença, não desanime que o sol faze um espectacolo maravilhoso todas as manhãs enquanto a maioria das pessoas ainda estão dormindo" - Anónimo brasileiro On Tue, Jan 29, 2013 at 4:37 PM, Brian Jackson <iggy@xxxxxxxxxxx> wrote: > On Tue, 29 Jan 2013 12:53:21 -0500 > Hugo R Hernández-Mora <hdezmora@xxxxxxxxx> wrote: > >> Hello there, >> we are experiencing a problem by configuring a KVM bridged networking >> to share a public network interface between the KVM host and the VMs. >> Currently, our KVM server has set three network interfaces as follows: >> >> * eth0: 192.168.10.101/23 (main interface for public network - no >> bridge) >> * eth1 <--> br1: 192.168.10.201/23 (KVM VMs connected to public >> network) >> * eth3 <--> br3: 10.7.10.201/23 (KVM VMs connected to LAN) >> >> We have followed instructions as from Red Hat as well as from >> diferrent web sites and we are not able to get the VMs to get access >> into/from the public network. Here is a more detailed configuration >> for the KVM host: >> >> ifcfg-eth0 >> DEVICE=eth0 >> ONBOOT=yes >> HWADDR=AC:80:B2:14:C5:EE >> BOOTPROTO=none >> IPADDR=192.168.10.101 >> NETMASK=255.255.254.0 >> >> ifcfg-eth1 >> DEVICE=eth1 >> ONBOOT=yes >> HWADDR=AC:80:B2:4E:D3:28 >> BRIDGE=br1 >> >> ifcfg-br1 >> DEVICE=br1 >> ONBOOT=yes >> TYPE=Bridge >> BOOTPROTO=none >> IPADDR=192.168.10.201 >> NETMASK=255.255.254.0 >> STP=off >> DELAY=0 >> >> ifcfg-eth3 >> DEVICE=eth3 >> ONBOOT=yes >> HWADDR=AC:80:B2:4E:D3:2A >> BRIDGE=br3 >> >> ifcfg-br3 >> DEVICE=br3 >> ONBOOT=yes >> TYPE=Bridge >> BOOTPROTO=static >> IPADDR=10.7.10.201 >> NETMASK=255.255.254.0 >> STP=off >> DELAY=0 >> >> network >> NETWORKING=yes >> HOSTNAME=kvm1.public-lan.net >> GATEWAY=192.168.10.1 >> >> For iptables/routing, we have followed instructions as explained on >> http://www.linux-kvm.org/page/Networking#public_bridge >> *nat >> :POSTROUTING ACCEPT [0:0] >> -A POSTROUTING --out-interface br1 -j MASQUERADE >> COMMIT >> :FORWARD ACCEPT [0:0] >> -A FORWARD --in-interface br1 -j ACCEPT >> >> Hostside: >> Allow IPv4 forwarding and add route to client (could be put in a >> script >> - route has to be added after the client has started): >> sysctl -w net.ipv4.ip_forward=1 # allow forwarding of IPv4 >> route add -host <ip-of-client> dev <tap-device> # add route to the >> client >> >> Clientside: >> Default GW of the client is of course then the host (<ip-of-host> has >> to be in same subnet as <ip-of-client> ...): >> route add default gw <ip-of-host> > > > What do the client configs look like? What network options are you > passing to qemu/kvm (or just the whole command line)? If your guests > and host are in the same subnet, why are you masquerading/routing? Why > not just use standard bridging? > > >> >> But it doesn't seem to work. My assumption the problem is related >> with a wrong setting of the firewall on the iptables. Could you >> please advice? Your help will be greatly appreciated! >> >> We are running Scientific Linux 6.2 on the KVM server as well as on >> the VMs. There is no network issue by accessing the LAN between VMs >> but only to face the public network. >> >> Thanks in advance, >> -Hugo >> -- >> To unsubscribe from this list: send the line "unsubscribe kvm" in >> the body of a message to majordomo@xxxxxxxxxxxxxxx >> More majordomo info at http://vger.kernel.org/majordomo-info.html > -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html