[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] Firewalling hvm domU's from Dom0


  • To: "Xen devel list" <xen-devel@xxxxxxxxxxxxxxxxxxx>
  • From: "Brian Hays" <brian.hays@xxxxxxxxx>
  • Date: Thu, 14 Feb 2008 14:37:48 -0500
  • Delivery-date: Thu, 14 Feb 2008 11:38:15 -0800
  • Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=message-id:date:from:to:subject:mime-version:content-type; b=M3C15fm5X+QNuMSkjpU4ObRvvwEonN0aD328n4QFV/mBf2njAI9b92hMlJT1PbYYsUhY8M/E9G6Rxo+PjbCfazmyRJzdXS5b/y/bJIx5Oa9Onr5Y0Z7ZitfFUXBqHeInscSPK+Mm3DZ7iBwV8axQMenFaDyTqvvqGQS7NvKI6l0=
  • List-id: Xen developer discussion <xen-devel.lists.xensource.com>

Hello,

I am trying to firewall (block) netbios packets between windows hvm domU's but have not been successful. I've tried adding block rules to the INPUT, OUTPUT, and FORWARD chains with no success. Does anyone know if this is possible and what the procedure is for blocking domU packets (source and dest) from within Dom0?

Thank you,
Brian
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.