[prev in list] [next in list] [prev in thread] [next in thread]
List: openvswitch-discuss
Subject: [ovs-discuss] Re : Re : Re : ip_gre_mod.ko module
From: darkbls () yahoo ! com (DarkBls)
Date: 2010-06-29 6:43:18
Message-ID: 855089.4905.qm () web23705 ! mail ! ird ! yahoo ! com
[Download RAW message or body]
Hi.
My need is more complex than that.
I have several set of VM per hypervisor with several VLAN per VM set (data, app, \
admin, cluster ...).
What I plan to do :
Having a central server with a bridge.
Each hypervisor own two bridges per VM set (for primary and secondary links path in \
VM through kernel bonding like on ther physical counterpart). Each of thoses bridges \
are GRE connected to the central bridge with their own GRE key.
With this "star" topology, a physical server need exactly 2 hop to reach any other \
physical servers.
I tried for now with just two servers with 802.1Q and GRE with key and it works. Need \
to try a full star architecture now.
________________________________
De : Dan Wendlandt <dan at nicira.com>
? : DarkBls <darkbls at yahoo.com>
Cc : discuss <discuss at openvswitch.org>
Envoy? le : Mar 29 juin 2010, 1h 53min 49s
Objet : Re: [ovs-discuss] Re : Re : ip_gre_mod.ko module
On Fri, Jun 25, 2010 at 6:03 AM, DarkBls <darkbls at yahoo.com> wrote:
Il fix the problem, thank you for your help. I gave another IP / physical interface \
for the tunnel.
>
> I still have some questions about GRE Tunneling.
>
> For now I have:
>
> On phosphorus (eth0:192.168.93.201 / eth1:172.16.0.201)
> br0 (tap0 + gre0 -> 172.16.0.202)
>
> On sulphur: (eth0:192.168.93.202 / eth1:172.16.0.202)
> br0 (tap0 + gre0 -> 172.16.0.201)
>
> A VM on phosphorus can ping a Vm on sulphur through the GRE tunnel.
>
> What if I want to make several br (br1, br2 and br3) on phosphorus and I want them \
> to be connected through their own GRE tunnel on their sulphur counterpart (br1, br2 \
> and br3) only ?
Do you want to have multiple bridges on each server just to isolate one set of VMs \
from another set of VMs? If so, you could just have a single bridge on each server \
joined by a single tunnel (like your initial example) but place each set of VMs on a \
different VLAN for isolation. The GRE tunnel will carry the VLAN tagged traffic \
between the two bridges and the switch at either end will enforce the VLAN isolation.
dan
>
>
>
>
>
________________________________
De : Jesse Gross <jesse at nicira.com>
>
> ? : DarkBls <darkbls at yahoo.com>
> Cc : Justin Pettit <jpettit at nicira.com>; discuss at openvswitch.org
> Envoy? le : Mar 22 juin 2010, 0h 01min 22s
> Objet : Re: [ovs-discuss] Re : ip_gre_mod.ko module
>
>
>
> On Mon, Jun 21, 2010 at 3:47 AM, DarkBls <darkbls at yahoo.com> wrote:
> > >
> >
> > ovs-vsctl --db=tcp:192.168.93.201:1977 create interface name=gre0 type=gre \
> > options:remote_ip=192.168.93.204
> > > > e29c391b-2e07-4a2e-95de-99cf6f23158d
> > > > ovs-vsctl --db=tcp:192.168.93.201:1977 create port name=gre0 \
> > > > interfaces=[e29c391b-2e07-4a2e-95de-99cf6f23158d] \
> > > > 01c689e2-ecab-4ee6-8902-6aba2efe2deb ovs-vsctl --db=tcp:192.168.93.201:1977 \
> > > > add bridge br0 ports 01c689e2-ecab-4ee6-8902-6aba2efe2deb
> >
>
>
> All this looks fine.
> >
>
> > > > I must have missed something since I don't see any port 47 opened on any \
> > > > server
> >
>
>
> GRE runs over IP protocol 47, not TCP or UDP port 47 so you won't see it listed in \
> netstat -l.
>
> Since a flow is being setup that is sending traffic to the GRE port the \
> configuration should be fine. Can you do a tcpdump on the physical interface to \
> see if there is GRE traffic? Is it possible that something like iptables is \
> blocking GRE traffic?
> _______________________________________________
> > discuss mailing list
> discuss at openvswitch.org
> http://openvswitch.org/mailman/listinfo/discuss_openvswitch.org
>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://openvswitch.org/pipermail/discuss/attachments/20100629/8cb124ae/attachment.htm>
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic