Book Image

OpenStack Networking Essentials

By : James Denton, Derek Chamorro
Book Image

OpenStack Networking Essentials

By: James Denton, Derek Chamorro

Overview of this book

The OpenStack Networking API offers users the ability to create and manage both basic and complex network architectures that blend the virtual and physical network infrastructure. This book kicks off by describing various components of Openstack Neutron and installing Ubuntu OpenStack based on Canonical's process. Further on, you will use various methods to interface with Neutron to create and manage network resources. You will also get to grips with the relationship between ports, networks, and subnets through diagrams and explanations, and see how the logical components are implemented via plugins and agents. Moving forward, you will learn how virtual switches are implemented and how to build Neutron routers. You will also configure networks, subnets, and routers to provide connectivity to instances using simple examples. At the end, you will configure and manage security groups, and will observe how these rules translate to iptables rules on the host machines. By the end of the book, you will be able to build basic network architectures using Neutron networks and routers in no time.
Table of Contents (15 chapters)
OpenStack Networking Essentials
Credits
About the Author
www.PacktPub.com
Preface
Index

Managing security groups


Security groups can be managed using the Neutron CLI or the Horizon dashboard. From within the Neutron command-line client, a number of commands can be used to manage security groups, including:

  • security-group-create

  • security-group-delete

  • security-group-list

  • security-group-rule-create

  • security-group-rule-delete

  • security-group-rule-list

  • security-group-rule-show

  • security-group-show

  • security-group-update

From the Horizon dashboard, security groups and rules are managed from the Compute | Access & Security panel.

Using CIDR to control traffic

Understanding how to properly subnet networks using the Classless Inter-Domain Routing (CIDR) notation is important for controlling access to instances. Using the wrong CIDR notation in a security group rule can expose your application and your environment to the Bad Guys™, a situation we'd like to prevent.

The following are some examples of networks using CIDR notation:

  • 0.0.0.0/0 – This would allow traffic from all IP...