Thanks Serge! What I was wondering is how this veth (tunnel or endpoints) is implemented in code? Is it like a TCP/IP socket connection over which packets are sent from one endpoint to other? Can you point me to this code?
On 1/31/15, 11:26 PM, "Serge Hallyn" <[email protected]> wrote: >Quoting Anjali Kulkarni ([email protected]): >> Since there is no real device emulation, I am wondering how network > >You can pass in real or fake nics, including eth0, macvlan, or veth >devices. veth devices are a tunnel device exactly for this use case. >When you create a veth you get two endpoints. One goes into the >container, the other goes onto the bridge in another namespace. Packets >go in one end and out the other. > >veths can be attached to an ovs bridge. >_______________________________________________ >lxc-users mailing list >[email protected] >http://lists.linuxcontainers.org/listinfo/lxc-users _______________________________________________ lxc-users mailing list [email protected] http://lists.linuxcontainers.org/listinfo/lxc-users
