On Friday, 10/09/2020 at 10:37 GMT, "van Sleeuwen, Berry" <[email protected]> wrote: > Correct. When a guest connects to another guest on the same vswitch/vlan then > the traffic will not go outside of the LPAR. There is simply no need to go > outside as the two machine can talk to each other directly. The same is true > for a LAN inside VM. Both give you a virtual network within VM, for outside > communication the VSWITCH requires an OSA, the LAN a connection to a TCPIP > stack. > > Obviously when one guest is in a different VLAN and/or in a different LPAR then > they require the network as communication has to go outside of the LPAR.
Traffic between two hosts in the same VLAN on the same VSWITCH in the same z/VM LPAR will not leave the LPAR unless with VSWITCH is configured with VEPA (SET/MODIFY VSWITCH). Traffic between two hosts in the same VLAN communicating across two VSWITCHes sharing an OSA (same LPAR or not) will not leave the OSA unless the sending VSWITCH is configured with VEPA. Alan Altmark Senior Managing z/VM and Linux Consultant IBM Systems Lab Services IBM Z Delivery Practice ibm.com/systems/services/labservices office: 607.429.3323 mobile; 607.321.7556 [email protected] IBM Endicott ---------------------------------------------------------------------- For LINUX-390 subscribe / signoff / archive access instructions, send email to [email protected] with the message: INFO LINUX-390 or visit http://www2.marist.edu/htbin/wlvindex?LINUX-390
