Openstack Security Groups/Arp Spoof Protection
Everything is blocked by default, open up the ports you want to allow.
On the Controller
1
2
3nova secgroup-add-rule default tcp 1 65535 0.0.0.0/0
nova secgroup-add-rule default udp 1 65535 0.0.0.0/0
nova secgroup-add-rule default icmp -1 -1 0.0.0.0/0
-1 signfies all ranges
On the compute
/etc/neutron/plugins/ml2/linuxbridge_agent.ini1
2
3
4
5
6
7
8
9
10
11
12[linux_bridge]
physical_interface_mappings = public:bond0
[vxlan]
enable_vxlan = False
[agent]
prevent_arp_spoofing = True
[securitygroup]
enable_security_group = True
firewall_driver = neutron.agent.linux.iptables_firewall.IptablesFirewallDriver