[lxc-devel] [lxd/master] doc/networks: Adds note about firewalld and DHCP/DNS

tomponline on Github lxc-bot at linuxcontainers.org
Wed Apr 8 11:04:59 UTC 2020


A non-text attachment was scrubbed...
Name: not available
Type: text/x-mailbox
Size: 376 bytes
Desc: not available
URL: <http://lists.linuxcontainers.org/pipermail/lxc-devel/attachments/20200408/795e4cc4/attachment.bin>
-------------- next part --------------
From c8c1f4ba2e769abdd1f06babe64370e30633ab90 Mon Sep 17 00:00:00 2001
From: Thomas Parrott <thomas.parrott at canonical.com>
Date: Wed, 8 Apr 2020 12:01:53 +0100
Subject: [PATCH] doc/networks: Adds note about firewalld and DHCP/DNS

Fixes #7150

Signed-off-by: Thomas Parrott <thomas.parrott at canonical.com>
---
 doc/networks.md | 35 +++++++++++++++++++++++++++--------
 1 file changed, 27 insertions(+), 8 deletions(-)

diff --git a/doc/networks.md b/doc/networks.md
index bb221bf575..af5b7a5dc2 100644
--- a/doc/networks.md
+++ b/doc/networks.md
@@ -15,13 +15,13 @@ currently supported:
 ## Bridges
 
 As one of the possible network configuration types under LXD,
-LXD supports creating and managing network bridges. LXD bridges 
-can leverage underlying native Linux bridges and Open vSwitch. 
+LXD supports creating and managing network bridges. LXD bridges
+can leverage underlying native Linux bridges and Open vSwitch.
 
 Creation and management of LXD bridges is performed via the `lxc network`
-command. A bridge created by LXD is by default "managed" which 
-means that LXD also will additionally set up a local `dnsmasq` 
-DHCP server and if desired also perform NAT for the bridge (this 
+command. A bridge created by LXD is by default "managed" which
+means that LXD also will additionally set up a local `dnsmasq`
+DHCP server and if desired also perform NAT for the bridge (this
 is the default.)
 
 When a bridge is managed by LXD, configuration values
@@ -46,9 +46,9 @@ devices:
 A complete list of configuration settings for LXD networks can
 be found below.
 
-It is expected that IP addresses and subnets are given using CIDR 
-notation (`1.1.1.1/24` or `fd80:1234::1/64`). The exception being 
-tunnel local and remote addresses which are just plain addresses 
+It is expected that IP addresses and subnets are given using CIDR
+notation (`1.1.1.1/24` or `fd80:1234::1/64`). The exception being
+tunnel local and remote addresses which are just plain addresses
 (`1.1.1.1` or `fd80:1234::1`).
 
 Key                             | Type      | Condition             | Default                   | Description
@@ -145,3 +145,22 @@ This resolved configuration will persist as long as the bridge
 exists, so you must repeat this command each reboot and after
 LXD is restarted.  Also note this only works if the bridge
 `dns.mode` is not `none`.
+
+## Allow DHCP, DNS with Firewalld
+
+In order to allow instances to access the DHCP and DNS server that LXD runs on the host when using firewalld
+you need to add the host's bridge interface to the `trusted` zone in firewalld.
+
+To do this permanently (so that it persists after a reboot) run the following command:
+
+```
+firewall-cmd --zone=trusted --change-interface=<LXD network name> --permanent
+```
+
+E.g. for a bridged network called `lxdbr0` run the command:
+
+```
+firewall-cmd --zone=trusted --change-interface=lxdbr0 --permanent
+```
+
+This will then allow LXD's own firewall rules to take effect.


More information about the lxc-devel mailing list