From ed29505f67f1d83fe11abb95629c00fa94e2ecb4 Mon Sep 17 00:00:00 2001 From: Tom Eastep Date: Thu, 18 Feb 2016 15:50:48 -0800 Subject: [PATCH] Update the OpenVZ article for 5.0 Signed-off-by: Tom Eastep --- docs/OpenVZ.xml | 49 ++++++++++++++++++++++--------------------------- 1 file changed, 22 insertions(+), 27 deletions(-) diff --git a/docs/OpenVZ.xml b/docs/OpenVZ.xml index f49363422..2439930d3 100644 --- a/docs/OpenVZ.xml +++ b/docs/OpenVZ.xml @@ -141,17 +141,16 @@ server:~ # /etc/shorewall/zones: ############################################################################### -#ZONE TYPE OPTIONS IN OUT -# OPTIONS OPTIONS +#ZONE TYPE OPTIONS IN_OPTION OUT_OPTIONS net ipv4 vz ipv4 /etc/shorewall/interfaces: ############################################################################### -#ZONE INTERFACE BROADCAST OPTIONS -net eth0 - proxyarp=1 -vz venet0 - routeback,arp_filter=0 +#ZONE INTERFACE OPTIONS +net eth0 proxyarp=1 +vz venet0 routeback,arp_filter=0
@@ -159,8 +158,8 @@ vz venet0 - routeback,arp_f If you run Shorewall Multi-ISP support on the host, you should arrange for traffic to your containers to use the main routing table. In - the configuration shown here, this entry in /etc/shorewall/rtrules - is appropriate: + the configuration shown here, this entry in /etc/shorewall/rtrules is + appropriate: #SOURCE DEST PROVIDER PRIORITY - 206.124.146.178 main 1000 @@ -290,7 +289,7 @@ done. The network diagram is shown below. - + The two systems shown in the green box are OpenVZ Virtual Environments (containers). @@ -457,8 +456,7 @@ NAME="server" /etc/shorewall/zones: - #ZONE TYPE OPTIONS IN OUT -# OPTIONS OPTIONS + #ZONE TYPE OPTIONS IN_OPTIONS OUT_OPTIONS fw firewall net ipv4 #Internet loc ipv4 #Local wired Zone @@ -472,11 +470,11 @@ INT_IF=eth1 VPS_IF=venet0 ... - /etc/shorewall/interfaces:#ZONE INTERFACE BROADCAST OPTIONS -net $NET_IF detect dhcp,blacklist,tcpflags,optional,routefilter=0,nosmurfs,logmartions=0,/etc/shorewall/interfaces:#ZONE INTERFACE OPTIONS +net $NET_IF dhcp,blacklist,tcpflags,optional,routefilter=0,nosmurfs,logmartions=0,proxyarp=1 -loc $INT_IF detect dhcp,logmartians=1,routefilter=1,nets=(172.20.1.0/24),tcpflags -dmz $VPS_IF detect logmartians=0,routefilter=0,nets=(206.124.146.177,206.124.146.178),routeback +loc $INT_IF dhcp,logmartians=1,routefilter=1,nets=(172.20.1.0/24),tcpflags +dmz $VPS_IF logmartians=0,routefilter=0,nets=(206.124.146.177,206.124.146.178),routeback ...This is a multi-ISP configuration so entries are required in /etc/shorewall/rtrules: @@ -501,8 +499,7 @@ loc $INT_IF detect dhcp,logmartians=1,routefilter=1 /etc/shorewall/zones: - #ZONE TYPE OPTIONS IN OUT -# OPTIONS OPTIONS + #ZONE TYPE OPTIONS IN_OPTIONS OUT_OPTIONS fw firewall net ipv4 @@ -526,7 +523,7 @@ net venet0 detect dhcp,tc The network diagram is shown below. - + The two systems shown in the green box are OpenVZ Virtual Environments (containers). @@ -768,8 +765,7 @@ NAME="server" /etc/shorewall/zones: - #ZONE TYPE OPTIONS IN OUT -# OPTIONS OPTIONS + #ZONE TYPE OPTIONS IN_OPTIONS OUT_OPTIONS fw firewall net ipv4 #Internet loc ipv4 #Local wired Zone @@ -783,10 +779,10 @@ INT_IF=eth1 VPS_IF=vzbr0 ... - /etc/shorewall/interfaces:#ZONE INTERFACE BROADCAST OPTIONS -net $NET_IF detect dhcp,blacklist,tcpflags,optional,routefilter=0,nosmurfs,logmartions=0 -loc $INT_IF detect dhcp,logmartians=1,routefilter=1,nets=(172.20.1.0/24),tcpflags -dmz $VPS_IF detect logmartians=0,routefilter=0,nets=(206.124.146.177,206.124.146.178),routeback + /etc/shorewall/interfaces:#ZONE INTERFACE OPTIONS +net $NET_IF dhcp,blacklist,tcpflags,optional,routefilter=0,nosmurfs,logmartions=0 +loc $INT_IF dhcp,logmartians=1,routefilter=1,nets=(172.20.1.0/24),tcpflags +dmz $VPS_IF logmartians=0,routefilter=0,nets=(206.124.146.177,206.124.146.178),routeback ... /etc/shorewall/proxyarp: @@ -813,15 +809,14 @@ dmz $VPS_IF detect logmartians=0,routefilter=0,nets /etc/shorewall/zones: - #ZONE TYPE OPTIONS IN OUT -# OPTIONS OPTIONS + #ZONE TYPE OPTIONS IN_OPTIONS OUT_OPTIONS fw firewall net ipv4 /etc/shorewall/interfaces: - #ZONE INTERFACE BROADCAST OPTIONS -net eth0 detect dhcp,tcpflags,logmartians,nosmurfs + #ZONE INTERFACE OPTIONS +net eth0 dhcp,tcpflags,logmartians,nosmurfs