On Wed, 2005-03-09 at 12:33, Steve Iribarne wrote:
> -> Your blades --> VLANX/SubnetX
> ->      --> [some L3 switch]
> 
> umm.. I have a L2 switch... not L3 switch.
> 

Lets go over this slowly so we can hopefully resolve why we dont see eye
to eye. I am not sure why i am spending all this energy on this.

Lets get the diagrams better:

1) your case:
    Your blades <--> VLANX/SubnetX
      <--> [some L2 switch]
           <--> VLANY/SubnetY <--> outside world

You probably have redundancy etc in some ATCA||2.16 setup with links going to 
two internal switches - but lets also ignore that - just assume the simple 
switch for now for sake of clarity. You may also have many VLANs in/out  like 
you 
said "signaling traffic, bearer traffic  and network mgmt traffic", but the 
two internal vs external interfaces  i showed above should suffice to indicate 
the general picture. Agreed?

To sumarize, for you to get to/from the outside world to your blades you go 
via L2 switch with a "few" interfaces to the ouside world.
In your case the "internal" interface is the VLANX port(s) facing the switch.
The "external" interface is the port(s) on VLANY facing the outside.

2) Note this is slightly different from Zdenek, which is:

  Outside <->one or more interfaces <->  [LinecardX] <-->[swicth/fabric]
  Outside <->one or more interfaces <->  [LinecardY] <-->[swicth/fabric]   
  .
  .

In other words each line card  has many interfaces that come into the box. 
It is not unusual to find 12-48 interface line cards.  The "switch" aka 
"fabric"  
connects these line cards (and perhaps some  control plane blade(s)). Typically 
such 
a switch will not run IP but rather some other internal thing like CSIX or 
SPI-x etc.

In both setups, if you do run IP internally, it does make sense not "leak" 
internal 
traffic to the outside world with such addresses. 
In both cases you both try hard (and i am sure succeed) to not leak those 
packets 
out - In your case its a simple separation of collision domains. The only way 
you can
get from internal to external is if infact you have L2 connectivity between the 
two
(since you said you dont have L3 switching in your chasis). 

By making the 127.x routable in linux of all places - which is where i started 
disagreeing, you introduce some challenges with hope that 127.x obscurity is
going to help.

To avoid confusion and have Zdenek respond when i am talking to you or viceversa
lets make the two as separate issues:

1) In your case i saw no reason for you to use 127.x - you could have achieved 
the 
same with 10.x. Your internal packets will never leak out. You say you will 
have collisions
with customer; but then if i understood correctly you said these internal 
packets never 
the box.  So my conclusion was you didnt need the hack.

2)Zdenek's case 

Just avoiding the leak is not good enough if the 127.x is routable and someone 
else
is using it and he has to route such packets. In such a case, even if Zdenek  
hides 
the internal network at some point  he will have to route a  packet coming into 
linecardX, port A to linecardY, port B. 
And for this reason he cant totaly avoid collision. This is why i called it 
survival 
via obscurity.

Note: I am not questioning his technique but i would never use it
myself. Lets say we can achieve the same goal in a different way.

> Again, if you can show me a way of doing this, I'm all ears, but so far,
> you haven't shown me any other way around it.  Believe me.  I've tried
> and tried to find another solution to this problem.  
> 

Lets talk about this when we are clear what the problem is. Fix up the
diagram above if it is wrong, then we can talk.

cheers,
jamal

-
To unsubscribe from this list: send the line "unsubscribe linux-net" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to