Ask Your Question
0

How to delete "--reject-with icmp-host-prohibited" firewall rule using firewalld?

asked 2014-10-22 03:03:19 -0500

t.goto gravatar image

Hello, all.
This is rather a RHEL7/CentOS7 question than a openstack one..

I've installed OpenStack Icehouse on CentOS7 in typical 3 role manner(controller/NetworkGateway/Compute).
In order for a virtual instance to get address from DHCP server in NetworkGateway, I have to delete the following iptables rule from NetworkGateway.

-A FORWARD -j REJECT --reject-with icmp-host-prohibited

At least, removing above firewall rule worked for RHEL6/CentOS6.

Now, I don't know how to remove this rule.
Yes, using iptables instead of firewalld is easier.., but how can you remove it using firewalld? Or are you using iptables in CentOS7/RHEL7?

edit retag flag offensive close merge delete

2 answers

Sort by ยป oldest newest most voted
1

answered 2014-10-22 06:05:51 -0500

dbaxps gravatar image

View http://ktaraghi.blogspot.com/2013/10/...
Personally, I am using iptables.

edit flag offensive delete link more

Comments

thank you ! Web page you showed REALLY helped :)

t.goto gravatar imaget.goto ( 2014-10-22 21:54:10 -0500 )edit
0

answered 2014-10-22 21:53:29 -0500

t.goto gravatar image

Thanks dbaxps,
I managed to enable DHCP with firewalld, barely..

I successfully allowd dhcp request from virtual instance, and dhcp offer between tenantRouter and tenantDHCPd with following rules.

firewall-cmd             --direct --add-rule ipv4 filter INPUT   0 -s 0.0.0.0/32 -d 255.255.255.255/32 -p udp --sport 68 --dport 67 -j ACCEPT
firewall-cmd             --direct --add-rule ipv4 filter FORWARD 0 -s 0.0.0.0/32 -d 255.255.255.255/32 -p udp --sport 68 --dport 67 -j ACCEPT
firewall-cmd             --direct --add-rule ipv4 filter FORWARD 1                                     -p udp --sport 67 --dport 68 -j ACCEPT

firewall-cmd --permanent --direct --add-rule ipv4 filter INPUT   0 -s 0.0.0.0/32 -d 255.255.255.255/32 -p udp --sport 68 --dport 67 -j ACCEPT
firewall-cmd --permanent --direct --add-rule ipv4 filter FORWARD 0 -s 0.0.0.0/32 -d 255.255.255.255/32 -p udp --sport 68 --dport 67 -j ACCEPT
firewall-cmd --permanent --direct --add-rule ipv4 filter FORWARD 1                                     -p udp --sport 67 --dport 68 -j ACCEPT

I tried to implement rich rules, but its gonna take a while due to its complexity. So far, those rules work :), Thanks!

edit flag offensive delete link more

Your Answer

Please start posting anonymously - your entry will be published after you log in or create a new account.

Add Answer

Get to know Ask OpenStack

Resources for moderators

Question Tools

1 follower

Stats

Asked: 2014-10-22 03:03:19 -0500

Seen: 3,228 times

Last updated: Oct 22 '14