OpenVZ Forum


Home » General » Support » Hosting Company setup .....
Hosting Company setup ..... [message #35087] Wed, 25 February 2009 20:25
schjeall is currently offline  schjeall
Messages: 27
Registered: February 2009
Location: Denmark
Junior Member
I was thinking about how hosting companies setup OpenVZ when it comes to providing access to a VE with a public ip-address. How do they configure networking (using veth or venet), security (if using veth, how do they avoid sniffing of traffic) etc.

Can anyone come with an explanation?


My idea is to use venet. Each VE is assigned an ip-address in the range 192.168.2.1/24. ip-masquerade is setup on the HN.

Internet  (Public ip's are mapped to e.g. 192.168.1.1/24)
    |
 +--+---+  xxx.yyy.xxx.yy1 -> 192.168.1.1
 |ROUTER|  xxx.yyy.xxx.yy2 -> 192.168.1.2
 +-+----+  xxx.yyy.xxx.yyn -> 192.168.1.n
  D| 
  M|
  Z|
+--+------------+
| Hardware node | Listenens for 192.168.1.x/24:[1..n] and 
|               | dnat any port + ip to 192.168.2.x:[1..n]
+---------------+
| IP tables     | 192.168.1.x:any port dnat 192.168.2.x:any port
|               | 
+---------------+ 
| N1 | N2 | N3  | venet 192.168.2.1/24
+---------------+


My idea is probably not correct and I need some guidance on how to make this work. I want all ports on any VE to be available, when doing something on the corresponding public IP. Therefore I map all public ip's to 192.168.1.x:[1..n] and dnat this to each VE assigned ip address 192.168.2.x:[1..n].

How can dnat be used even smarter or can this be solved more elegantly?










[Updated on: Thu, 26 February 2009 07:20]

Report message to a moderator

Previous Topic: Missing CPU Cores
Next Topic: Vps Destroy error
Goto Forum:
  


Current Time: Mon Jul 14 12:11:12 GMT 2025

Total time taken to generate the page: 0.01674 seconds