Thanks Serge!
What I was wondering is how this veth (tunnel or endpoints) is implemented
in code? Is it like a TCP/IP socket connection over which packets are sent
from one endpoint to other? Can you point me to this code?

On 1/31/15, 11:26 PM, "Serge Hallyn" <[email protected]> wrote:

>Quoting Anjali Kulkarni ([email protected]):
>> Since there is no real device emulation, I am wondering how network
>
>You can pass in real or fake nics, including eth0, macvlan, or veth
>devices.  veth devices are a tunnel device exactly for this use case.
>When you create a veth you get two endpoints.  One goes into the
>container, the other goes onto the bridge in another namespace.  Packets
>go in one end and out the other.
>
>veths can be attached to an ovs bridge.
>_______________________________________________
>lxc-users mailing list
>[email protected]
>http://lists.linuxcontainers.org/listinfo/lxc-users

_______________________________________________
lxc-users mailing list
[email protected]
http://lists.linuxcontainers.org/listinfo/lxc-users

Reply via email to