Libvirt hook for setting up iptables port-forwarding rules when using NAT-ed networking.
To install the hook script and it's configuration files, simply use the :file:`Makefile`:
$ sudo make install
Afterwards customize :file:`/etc/libvirt/hooks/qemu.json` to your needs. This Makefile target can be invoked multiple times, already installed configuration files won't be touched. The files can be removed again with:
$ sudo make clean
python -m unittest discover
This section describes the theory behind the generated iptables statements.
Packets arriving on the public interface are DNATed to the virtual machine. This implements the actual port-forwarding. Due to the way iptables is implemented, the DNAT must occur in two chains: nat:PREROUTING for packets arriving on the public interface, and nat:OUTPUT for packets originating on the host.
We also add rules to the FORWARD chain to ensure the repsonses return.
Finally, packets originating on the guest and sent to the host's public IP address need special handling. They are DNATed back to the guest like all other packets but, because the destination is now the same as the source, the reply never leaves the guest. Therefore, the host SNATs these packets to ensure the reply returns over the bridge.
To see a real-world example, the test_setup
function in test_qemu.py
demonstrates a simple JSON configuration and the iptables rules that it produces.
- Sascha Peilicke
- Scott Bronson