OpenVMS x86-64 Guest Instances and Host Firewalls

Running OpenVMS x86-64 on a virtual machine requires careful attention to network connectivity between the OpenVMS instance(s) and the outside network as well as the virtual machine host.

Many hosts have integral firewalls. Default firewall settings can make seemingly obvious actions problematic. This is particularly true when local mobiles, desktops, or servers to host the underlying virtual machine. Local machines hosting virtual instances is particularly common in development, testing, and hobbyist environments.

It is unusual to configure an OpenVMS virtual instance without a network connection. Simulated serial interfaces are used to bootstrap the OpenVMS system. Once startup has completed, most communications, e.g., ssh and sftp, are done over the network connection. Once TCP/IP comes online, the OpenVMS instance appears to most local machines as just another system on the local area network. Host machine configuration settings and defaults affect connectivity. Choices and defaults have consequences.

Virtualized OpenVMS instances work as intended if one verifies that there are no firewall settings on the virtual machine host that interfere with IP connectivity. Microsoft Windows comes with an integral firewall, Microsoft Defender, whose default connection rules prohibit incoming ICMP messages. ICMP is the protocol used to support the PING and TRACEROUTE functions.

The other day, I provisioned a fresh OpenVMS virtual instance from scratch, following the instructions in the OpenVMS Installation Guide.1 It has been about a year since I created an OpenVMS virtual instance from scratch. For the last year or so, I have recycled the virtual machine I had used for previous OpenVMS field test versions. The steps seem straightforward:

Bootstrap the virtual machine from the ISO-DVD image and perform a standard OpenVMS installation.

Once the OpenVMS system was running, configure TCP/IP services. In the summary below, the IP addresses are:

Testing network connectivity:

The failure to PING the Windows systems was disquiting. After some thought, it became clear that Microsoft Defender could be the source of the problem. Microsoft Defender includes a local firewall. The default configuration for Microsoft Defender disables Incoming ICMP. To make it particularly unobvious, Microsoft labeled the relevant rule as part of Microsoft File and Printer Sharing, Figure 1.

Screenshot of Microsoft Defender Inbound rules
Figure 1 Microsoft Defender Inbound Filtering Rules

The local firewall blocking ICMP is an easily resolvable annoyance. However, it illuminates a more fundamental issue.

An OpenVMS x86-64 guest instance on a virtual machine is both simpler and more complex than running on physical hardware. Many hardware issues are dealt with by the virtual machine monitor. However, the underlying virtual machine environment must still be maintained and managed. Many will be managing both their OpenVMS environment and the underlying virtual machine monitor. Running OpenVMS on a personal system or workstation most often implies serving in both roles.

In the case at hand, the Microsoft Defender default settings allowed both ssh and sftp access to the OpenVMS instance from the host system, but did not allow ICMP access from the virtual instance to the host system. This would have escaped notice had I not used OpenVMS PING to check connectivity. A similar unconsidered default protection rule on the hosting system's firewall could have more significant impact had it gone unnoticed.

The larger lesson is that one needs to consider both the host system and the virtual instance settings when verifying virtual system functionality and troubleshooting problems.

This is especially true when running one or more virtualized OpenVMS instances as part of an OpenVMScluster. A single x86-64 system may be hosting one or more virtualized OpenVMScluster members.

Notes

[1] VSI (2023, April) VSI OpenVMS x86-64 V 9.2-1 Installation Guide, Chapter 2
[2] Oracle (2023, April 18) Oracle® VirtualBox® User Manual Version 7.0.8, Chapter 7

References

URLs for referencing this entry

 
 
Picture of Robert Gezelter, CDP
RSS Feed Icon RSS Feed Icon
Follow us on Twitter
Bringing Details into Focus, Focused Innovation, Focused Solutions
Robert Gezelter Software Consultant Logo
http://www.rlgsc.com
+1 (718) 463 1079