Re: [vpp-dev] VLAN to VLAN
See if “git clean -fdx” before building might help, I think I have seen something similar when moving between the far apart versions. --a > On 10 May 2018, at 02:17, carlito nuenowrote: > > First Question: > Tried to do “make test TEST=acl_plugin_macip”, but I got this error: > > Using /vpp/build-root/python/virtualenv/lib/python2.7/site-packages > Finished processing dependencies for vpp-papi==1.4 > make -C ext > make[1]: Entering directory '/vpp/test/ext' > make[1]: *** No rule to make target > '/vpp/vpp-api/vapi/.libs/libvapiclient.so', needed by > '/vapi_test/vapi_c_test'. Stop. > make[1]: Leaving directory '/vpp/test/ext' > Makefile:129: recipe for target 'ext' failed > make: *** [ext] Error 2 > > ubuntu 16.04 > python2.7 > downloaded vpp src to /vpp > export VPP_PYTHON_PREFIX=/vpp/build-root/python > export WS_ROOT=/vpp > Second question: > When using govpp to load acl, how to maintain persistence when vpp is > restarted? > - does the go app need to be re-run? > > Thanks >
Re: [vpp-dev] VLAN to VLAN
forget to mention, upgraded to vpp v18.04-rc2~26-gac2b736~b45 Current setup: GigabitEthernet0/14/0.1, Idx 9, ip 192.168.0.0/24, vlan 1 GigabitEthernet0/14/0.2, Idx 12, ip 192.168.2.0/24, vlan 2 I don't want devices on vlan1 and vlan2 to communicate with each other. I tried to use macip via VAT vat# macip_acl_add ipv4 deny ip 192.168.2.0/24 vat# macip_acl_interface_add_del sw_if_index 9 add acl 0 But, devices under 192.168.0.0/24 can't communicate with each other. Thanks
Re: [vpp-dev] VLAN to VLAN
First Question: Tried to do “make test TEST=acl_plugin_macip”, but I got this error: Using /vpp/build-root/python/virtualenv/lib/python2.7/site-packages Finished processing dependencies for vpp-papi==1.4 make -C ext make[1]: Entering directory '/vpp/test/ext' make[1]: *** No rule to make target '/vpp/vpp-api/vapi/.libs/libvapiclient.so', needed by '/vapi_test/vapi_c_test'. Stop. make[1]: Leaving directory '/vpp/test/ext' Makefile:129: recipe for target 'ext' failed make: *** [ext] Error 2 ubuntu 16.04 python2.7 downloaded vpp src to /vpp export VPP_PYTHON_PREFIX=/vpp/build-root/python export WS_ROOT=/vpp Second question: When using govpp to load acl, how to maintain persistence when vpp is restarted? - does the go app need to be re-run? Thanks
Re: [vpp-dev] VLAN to VLAN
Carlito, Seems like my mail didn’t make it to the list... Your release doesn’t have yet the support for subinterfaces. Do “make test TEST=acl_plugin_macip” and the very scenario you are setting up is the first unit test in the supported version, so you can compare the logs. I suggest giving a whirl to a 18.04rc2, since the release will be out in just a couple of days. --a > On 24 Apr 2018, at 04:02, carlito nuenowrote: > > any suggestions? > > Thanks >
Re: [vpp-dev] VLAN to VLAN
any suggestions? Thanks
Re: [vpp-dev] VLAN to VLAN
index 14 dst ff:ff:ff:ff:ff:ff src 74:da:38:0d:43:59 bd_index 3 18:47:56:729556: l2-flood l2-flood: sw_if_index 14 dst ff:ff:ff:ff:ff:ff src 74:da:38:0d:43:59 bd_index 3 18:47:56:729557: l2-output l2-output: sw_if_index 15 dst ff:ff:ff:ff:ff:ff src 74:da:38:0d:43:59 data 08 00 45 00 01 38 4b 0b 00 00 40 11 18:47:56:729557: tap-2-output tap-2 IP4: 74:da:38:0d:43:59 -> ff:ff:ff:ff:ff:ff UDP: 192.168.3.16 -> 192.168.3.255 tos 0x00, ttl 64, length 312, checksum 0xa64a fragment id 0x4b0b UDP: 17500 -> 17500 length 292, checksum 0x5510 18:47:56:729581: l2-flood l2-flood: sw_if_index 14 dst 45:00:01:38:4b:0b src 00:00:40:11:a6:4a bd_index 3 18:47:56:729582: ip4-input UDP: 192.168.3.16 -> 192.168.3.255 tos 0x00, ttl 64, length 312, checksum 0xa64a fragment id 0x4b0b UDP: 17500 -> 17500 length 292, checksum 0x5510 18:47:56:729583: nat44-in2out NAT44_IN2OUT_FAST_PATH: sw_if_index 13, next index 3, session -1 18:47:56:729584: nat44-in2out-slowpath NAT44_IN2OUT_SLOW_PATH: sw_if_index 13, next index 0, session -1 18:47:56:729586: ip4-lookup fib 0 dpo-idx 0 flow hash: 0x UDP: 192.168.3.16 -> 192.168.3.255 tos 0x00, ttl 64, length 312, checksum 0xa64a fragment id 0x4b0b UDP: 17500 -> 17500 length 292, checksum 0x5510 18:47:56:729587: ip4-drop UDP: 192.168.3.16 -> 192.168.3.255 tos 0x00, ttl 64, length 312, checksum 0xa64a fragment id 0x4b0b UDP: 17500 -> 17500 length 292, checksum 0x5510 18:47:56:729588: error-drop ip4-input: ip4 adjacency drop On Thu, Apr 19, 2018 at 11:47 PM, Andrew Yourtchenko <ayour...@gmail.com> wrote: > Hi Carlito, > > What does the packet trace (as per > https://wiki.fd.io/view/VPP/How_To_Use_The_Packet_Generator_and_Packet_Tracer) > look like and which version of VPP are you running ? > > --a > > On 20 Apr 2018, at 05:00, Carlito Nueno <carlitonu...@gmail.com> wrote: > > Thanks John. > > Routing between VLANs is working. But I can't get the ACLs quite > right. I am trying to block all communication between device A > (192.168.3.16) on VLAN 3 and device B (192.168.2.181) on VLAN 2. > > vat# acl_add_replace ipv4 deny src 192.168.3.16/32 dst 192.168.2.181/32 > vat# acl_dump > vl_api_acl_details_t_handler:194: acl_index: 1, count: 1 > tag {} > ipv4 action 0 src 192.168.3.16/32 dst 192.168.2.181/32 proto 0 > sport 0-65535 dport 0-65535 tcpflags 0 mask 0 > > # VLAN on subinterface GigabitEthernet0/14/0.2 > vat# acl_interface_set_acl_list sw_if_index 11 input 1 output 1 > > # VLAN on subinterface GigabitEthernet0/14/0.3 > vat# acl_interface_set_acl_list sw_if_index 14 input 1 output 1 > > vat# acl_interface_list_dump > vl_api_acl_interface_list_details_t_handler:153: sw_if_index: 11, > count: 2, n_input: 1 > input 1 > output 1 > vl_api_acl_interface_list_details_t_handler:153: sw_if_index: 14, > count: 2, n_input: 1 > input 1 > output 1 > > I am still able to ping from 192.168.3.16 to 192.168.2.181 after above > commands. > > Thanks > > On Thu, Apr 19, 2018 at 3:55 PM, John Lo (loj) <l...@cisco.com> wrote: > > One more comment - unless there are more VLAN 1 and VLAN 2 sub-interfaces > you need to put into BDs 1 and 2, then you may just configure IP addresses > on the sub-interfaces to route directly, as suggested by Andrew. It would be > a lot more efficient than going through two BDs and route via BVIs. -John > > > -Original Message- > > From: vpp-dev@lists.fd.io <vpp-dev@lists.fd.io> On Behalf Of John Lo (loj) > > Sent: Thursday, April 19, 2018 4:48 PM > > To: carlito nueno <carlitonu...@gmail.com>; Andrew Yourtchenko > <ayour...@gmail.com> > > Cc: vpp-dev@lists.fd.io > > Subject: Re: [vpp-dev] VLAN to VLAN > > > The config looks correct and should work, assuming the following: > > 1. The devices connected to GigabitEthernet0/14/0.2 have IP addresses in the > 192.168.2.1/24 subnet with default gateway set to that of the BVI IP address > of 192.168.2.1. > > 2. The devices connected to GigabitEthernet0/14/0.3 have IP addresses in the > 192.168.3.1/24 subnet with default gateway set to that of the BVI IP address > of 192.168.3.1. > > > One improvement is to put the BVI interfaces into their own VRF by setting > loop0 and loop1 into a specific ip table to not use the global routing > table. For example, set the following before assigning IP address to loop0 > and loop1: > > set int ip table loop0 4 > > set int ip table loop1 4 > > This will make the routing between BD-VLANs 2 and 3 private and more secure. > > > Regards, > > John > > > -Original Message- > > From: vpp-dev@lists.fd.io <vpp-dev@lists.fd.io> On Behalf Of ca
Re: [vpp-dev] VLAN to VLAN
Hi Carlito, What does the packet trace (as per https://wiki.fd.io/view/VPP/How_To_Use_The_Packet_Generator_and_Packet_Tracer) look like and which version of VPP are you running ? --a > On 20 Apr 2018, at 05:00, Carlito Nueno <carlitonu...@gmail.com> wrote: > > Thanks John. > > Routing between VLANs is working. But I can't get the ACLs quite > right. I am trying to block all communication between device A > (192.168.3.16) on VLAN 3 and device B (192.168.2.181) on VLAN 2. > > vat# acl_add_replace ipv4 deny src 192.168.3.16/32 dst 192.168.2.181/32 > vat# acl_dump > vl_api_acl_details_t_handler:194: acl_index: 1, count: 1 > tag {} > ipv4 action 0 src 192.168.3.16/32 dst 192.168.2.181/32 proto 0 > sport 0-65535 dport 0-65535 tcpflags 0 mask 0 > > # VLAN on subinterface GigabitEthernet0/14/0.2 > vat# acl_interface_set_acl_list sw_if_index 11 input 1 output 1 > > # VLAN on subinterface GigabitEthernet0/14/0.3 > vat# acl_interface_set_acl_list sw_if_index 14 input 1 output 1 > > vat# acl_interface_list_dump > vl_api_acl_interface_list_details_t_handler:153: sw_if_index: 11, > count: 2, n_input: 1 > input 1 > output 1 > vl_api_acl_interface_list_details_t_handler:153: sw_if_index: 14, > count: 2, n_input: 1 > input 1 > output 1 > > I am still able to ping from 192.168.3.16 to 192.168.2.181 after above > commands. > > Thanks > >> On Thu, Apr 19, 2018 at 3:55 PM, John Lo (loj) <l...@cisco.com> wrote: >> One more comment - unless there are more VLAN 1 and VLAN 2 sub-interfaces >> you need to put into BDs 1 and 2, then you may just configure IP addresses >> on the sub-interfaces to route directly, as suggested by Andrew. It would be >> a lot more efficient than going through two BDs and route via BVIs. -John >> >> -Original Message- >> From: vpp-dev@lists.fd.io <vpp-dev@lists.fd.io> On Behalf Of John Lo (loj) >> Sent: Thursday, April 19, 2018 4:48 PM >> To: carlito nueno <carlitonu...@gmail.com>; Andrew Yourtchenko >> <ayour...@gmail.com> >> Cc: vpp-dev@lists.fd.io >> Subject: Re: [vpp-dev] VLAN to VLAN >> >> The config looks correct and should work, assuming the following: >> 1. The devices connected to GigabitEthernet0/14/0.2 have IP addresses in the >> 192.168.2.1/24 subnet with default gateway set to that of the BVI IP address >> of 192.168.2.1. >> 2. The devices connected to GigabitEthernet0/14/0.3 have IP addresses in the >> 192.168.3.1/24 subnet with default gateway set to that of the BVI IP address >> of 192.168.3.1. >> >> One improvement is to put the BVI interfaces into their own VRF by setting >> loop0 and loop1 into a specific ip table to not use the global routing >> table. For example, set the following before assigning IP address to loop0 >> and loop1: >> set int ip table loop0 4 >> set int ip table loop1 4 >> This will make the routing between BD-VLANs 2 and 3 private and more secure. >> >> Regards, >> John >> >> -Original Message- >> From: vpp-dev@lists.fd.io <vpp-dev@lists.fd.io> On Behalf Of carlito nueno >> Sent: Thursday, April 19, 2018 4:15 PM >> To: Andrew Yourtchenko <ayour...@gmail.com> >> Cc: vpp-dev@lists.fd.io >> Subject: Re: [vpp-dev] VLAN to VLAN >> >> My current VLAN config: >> >> loopback create >> set int l2 bridge loop1 2 bvi >> set int ip address loop1 192.168.2.1/24 >> set int state loop1 up >> >> create sub GigabitEthernet0/14/0 2 >> set int l2 bridge GigabitEthernet0/14/0.2 2 set int l2 tag-rewrite >> GigabitEthernet0/14/0.2 pop 1 set int state GigabitEthernet0/14/0.2 up >> >> >> loopback create >> set int l2 bridge loop2 3 bvi >> set int ip address loop2 192.168.3.1/24 >> set int state loop2 up >> >> create sub GigabitEthernet0/14/0 3 >> set int l2 bridge GigabitEthernet0/14/0.3 3 set int l2 tag-rewrite >> GigabitEthernet0/14/0.3 pop 1 set int state GigabitEthernet0/14/0.3 up >> >> >> So this should route traffic between VLAN 2 and VLAN 3, correct? >> >> Thanks >> >>> On Thu, Apr 19, 2018 at 12:52 PM, Andrew Yourtchenko <ayour...@gmail.com> >>> wrote: >>> >>> hi Carlito, >>> >>> you can configure subinterfaces with tags and assign the ip addresses >>> so the VPP does routing and then either use vnet ACLs or acl plugin to >>> restrict the traffic. >>> >>> —a >>> >>> On 19 Apr 2018, at 21:07, Dave Barach <dbar...@cisco.com> wrote: >>> >>> Begin forwarded message: >>> >>> From: Carlito Nueno <carlitonu...@gmail.com> >>> Date: April 19, 2018 at 9:03:51 AM HST >>> To: dbar...@cisco.com >>> Subject: VLAN to VLAN >>> >>> Hi Dave, >>> >>> How can I enable VLAN to VLAN communication? I want to have devices on >>> one VLAN talk to devices on another VLAN, if possible constrain the >>> devices by MAC or IP address. >>> >>> For example, only device with MAC (aa:aa:bb:80:90) or IP address >>> (192.168.2.20) on VLAN 100 can talk to devices on VLAN 200 >>> (192.168.3.0/24). >>> >>> Thanks >>> >>> >> >> >> >> >> >>
Re: [vpp-dev] VLAN to VLAN
Thanks John. Routing between VLANs is working. But I can't get the ACLs quite right. I am trying to block all communication between device A (192.168.3.16) on VLAN 3 and device B (192.168.2.181) on VLAN 2. vat# acl_add_replace ipv4 deny src 192.168.3.16/32 dst 192.168.2.181/32 vat# acl_dump vl_api_acl_details_t_handler:194: acl_index: 1, count: 1 tag {} ipv4 action 0 src 192.168.3.16/32 dst 192.168.2.181/32 proto 0 sport 0-65535 dport 0-65535 tcpflags 0 mask 0 # VLAN on subinterface GigabitEthernet0/14/0.2 vat# acl_interface_set_acl_list sw_if_index 11 input 1 output 1 # VLAN on subinterface GigabitEthernet0/14/0.3 vat# acl_interface_set_acl_list sw_if_index 14 input 1 output 1 vat# acl_interface_list_dump vl_api_acl_interface_list_details_t_handler:153: sw_if_index: 11, count: 2, n_input: 1 input 1 output 1 vl_api_acl_interface_list_details_t_handler:153: sw_if_index: 14, count: 2, n_input: 1 input 1 output 1 I am still able to ping from 192.168.3.16 to 192.168.2.181 after above commands. Thanks On Thu, Apr 19, 2018 at 3:55 PM, John Lo (loj) <l...@cisco.com> wrote: > One more comment - unless there are more VLAN 1 and VLAN 2 sub-interfaces you > need to put into BDs 1 and 2, then you may just configure IP addresses on the > sub-interfaces to route directly, as suggested by Andrew. It would be a lot > more efficient than going through two BDs and route via BVIs. -John > > -Original Message- > From: vpp-dev@lists.fd.io <vpp-dev@lists.fd.io> On Behalf Of John Lo (loj) > Sent: Thursday, April 19, 2018 4:48 PM > To: carlito nueno <carlitonu...@gmail.com>; Andrew Yourtchenko > <ayour...@gmail.com> > Cc: vpp-dev@lists.fd.io > Subject: Re: [vpp-dev] VLAN to VLAN > > The config looks correct and should work, assuming the following: > 1. The devices connected to GigabitEthernet0/14/0.2 have IP addresses in the > 192.168.2.1/24 subnet with default gateway set to that of the BVI IP address > of 192.168.2.1. > 2. The devices connected to GigabitEthernet0/14/0.3 have IP addresses in the > 192.168.3.1/24 subnet with default gateway set to that of the BVI IP address > of 192.168.3.1. > > One improvement is to put the BVI interfaces into their own VRF by setting > loop0 and loop1 into a specific ip table to not use the global routing table. > For example, set the following before assigning IP address to loop0 and > loop1: >set int ip table loop0 4 >set int ip table loop1 4 > This will make the routing between BD-VLANs 2 and 3 private and more secure. > > Regards, > John > > -Original Message- > From: vpp-dev@lists.fd.io <vpp-dev@lists.fd.io> On Behalf Of carlito nueno > Sent: Thursday, April 19, 2018 4:15 PM > To: Andrew Yourtchenko <ayour...@gmail.com> > Cc: vpp-dev@lists.fd.io > Subject: Re: [vpp-dev] VLAN to VLAN > > My current VLAN config: > > loopback create > set int l2 bridge loop1 2 bvi > set int ip address loop1 192.168.2.1/24 > set int state loop1 up > > create sub GigabitEthernet0/14/0 2 > set int l2 bridge GigabitEthernet0/14/0.2 2 set int l2 tag-rewrite > GigabitEthernet0/14/0.2 pop 1 set int state GigabitEthernet0/14/0.2 up > > > loopback create > set int l2 bridge loop2 3 bvi > set int ip address loop2 192.168.3.1/24 > set int state loop2 up > > create sub GigabitEthernet0/14/0 3 > set int l2 bridge GigabitEthernet0/14/0.3 3 set int l2 tag-rewrite > GigabitEthernet0/14/0.3 pop 1 set int state GigabitEthernet0/14/0.3 up > > > So this should route traffic between VLAN 2 and VLAN 3, correct? > > Thanks > > On Thu, Apr 19, 2018 at 12:52 PM, Andrew Yourtchenko <ayour...@gmail.com> > wrote: >> >> hi Carlito, >> >> you can configure subinterfaces with tags and assign the ip addresses >> so the VPP does routing and then either use vnet ACLs or acl plugin to >> restrict the traffic. >> >> —a >> >> On 19 Apr 2018, at 21:07, Dave Barach <dbar...@cisco.com> wrote: >> >> Begin forwarded message: >> >> From: Carlito Nueno <carlitonu...@gmail.com> >> Date: April 19, 2018 at 9:03:51 AM HST >> To: dbar...@cisco.com >> Subject: VLAN to VLAN >> >> Hi Dave, >> >> How can I enable VLAN to VLAN communication? I want to have devices on >> one VLAN talk to devices on another VLAN, if possible constrain the >> devices by MAC or IP address. >> >> For example, only device with MAC (aa:aa:bb:80:90) or IP address >> (192.168.2.20) on VLAN 100 can talk to devices on VLAN 200 >> (192.168.3.0/24). >> >> Thanks >> >> > > > > > > -=-=-=-=-=-=-=-=-=-=-=- Links: You receive all messages sent to this group. View/Reply Onlin
Re: [vpp-dev] VLAN to VLAN
One more comment - unless there are more VLAN 1 and VLAN 2 sub-interfaces you need to put into BDs 1 and 2, then you may just configure IP addresses on the sub-interfaces to route directly, as suggested by Andrew. It would be a lot more efficient than going through two BDs and route via BVIs. -John -Original Message- From: vpp-dev@lists.fd.io <vpp-dev@lists.fd.io> On Behalf Of John Lo (loj) Sent: Thursday, April 19, 2018 4:48 PM To: carlito nueno <carlitonu...@gmail.com>; Andrew Yourtchenko <ayour...@gmail.com> Cc: vpp-dev@lists.fd.io Subject: Re: [vpp-dev] VLAN to VLAN The config looks correct and should work, assuming the following: 1. The devices connected to GigabitEthernet0/14/0.2 have IP addresses in the 192.168.2.1/24 subnet with default gateway set to that of the BVI IP address of 192.168.2.1. 2. The devices connected to GigabitEthernet0/14/0.3 have IP addresses in the 192.168.3.1/24 subnet with default gateway set to that of the BVI IP address of 192.168.3.1. One improvement is to put the BVI interfaces into their own VRF by setting loop0 and loop1 into a specific ip table to not use the global routing table. For example, set the following before assigning IP address to loop0 and loop1: set int ip table loop0 4 set int ip table loop1 4 This will make the routing between BD-VLANs 2 and 3 private and more secure. Regards, John -Original Message- From: vpp-dev@lists.fd.io <vpp-dev@lists.fd.io> On Behalf Of carlito nueno Sent: Thursday, April 19, 2018 4:15 PM To: Andrew Yourtchenko <ayour...@gmail.com> Cc: vpp-dev@lists.fd.io Subject: Re: [vpp-dev] VLAN to VLAN My current VLAN config: loopback create set int l2 bridge loop1 2 bvi set int ip address loop1 192.168.2.1/24 set int state loop1 up create sub GigabitEthernet0/14/0 2 set int l2 bridge GigabitEthernet0/14/0.2 2 set int l2 tag-rewrite GigabitEthernet0/14/0.2 pop 1 set int state GigabitEthernet0/14/0.2 up loopback create set int l2 bridge loop2 3 bvi set int ip address loop2 192.168.3.1/24 set int state loop2 up create sub GigabitEthernet0/14/0 3 set int l2 bridge GigabitEthernet0/14/0.3 3 set int l2 tag-rewrite GigabitEthernet0/14/0.3 pop 1 set int state GigabitEthernet0/14/0.3 up So this should route traffic between VLAN 2 and VLAN 3, correct? Thanks On Thu, Apr 19, 2018 at 12:52 PM, Andrew Yourtchenko <ayour...@gmail.com> wrote: > > hi Carlito, > > you can configure subinterfaces with tags and assign the ip addresses > so the VPP does routing and then either use vnet ACLs or acl plugin to > restrict the traffic. > > —a > > On 19 Apr 2018, at 21:07, Dave Barach <dbar...@cisco.com> wrote: > > Begin forwarded message: > > From: Carlito Nueno <carlitonu...@gmail.com> > Date: April 19, 2018 at 9:03:51 AM HST > To: dbar...@cisco.com > Subject: VLAN to VLAN > > Hi Dave, > > How can I enable VLAN to VLAN communication? I want to have devices on > one VLAN talk to devices on another VLAN, if possible constrain the > devices by MAC or IP address. > > For example, only device with MAC (aa:aa:bb:80:90) or IP address > (192.168.2.20) on VLAN 100 can talk to devices on VLAN 200 > (192.168.3.0/24). > > Thanks > > -=-=-=-=-=-=-=-=-=-=-=- Links: You receive all messages sent to this group. View/Reply Online (#9003): https://lists.fd.io/g/vpp-dev/message/9003 View All Messages In Topic (5): https://lists.fd.io/g/vpp-dev/topic/17639114 Mute This Topic: https://lists.fd.io/mt/17639114/21656 New Topic: https://lists.fd.io/g/vpp-dev/post Change Your Subscription: https://lists.fd.io/g/vpp-dev/editsub/21656 Group Home: https://lists.fd.io/g/vpp-dev Contact Group Owner: vpp-dev+ow...@lists.fd.io Terms of Service: https://lists.fd.io/static/tos Unsubscribe: https://lists.fd.io/g/vpp-dev/unsub -=-=-=-=-=-=-=-=-=-=-=-
Re: [vpp-dev] VLAN to VLAN
The config looks correct and should work, assuming the following: 1. The devices connected to GigabitEthernet0/14/0.2 have IP addresses in the 192.168.2.1/24 subnet with default gateway set to that of the BVI IP address of 192.168.2.1. 2. The devices connected to GigabitEthernet0/14/0.3 have IP addresses in the 192.168.3.1/24 subnet with default gateway set to that of the BVI IP address of 192.168.3.1. One improvement is to put the BVI interfaces into their own VRF by setting loop0 and loop1 into a specific ip table to not use the global routing table. For example, set the following before assigning IP address to loop0 and loop1: set int ip table loop0 4 set int ip table loop1 4 This will make the routing between BD-VLANs 2 and 3 private and more secure. Regards, John -Original Message- From: vpp-dev@lists.fd.io <vpp-dev@lists.fd.io> On Behalf Of carlito nueno Sent: Thursday, April 19, 2018 4:15 PM To: Andrew Yourtchenko <ayour...@gmail.com> Cc: vpp-dev@lists.fd.io Subject: Re: [vpp-dev] VLAN to VLAN My current VLAN config: loopback create set int l2 bridge loop1 2 bvi set int ip address loop1 192.168.2.1/24 set int state loop1 up create sub GigabitEthernet0/14/0 2 set int l2 bridge GigabitEthernet0/14/0.2 2 set int l2 tag-rewrite GigabitEthernet0/14/0.2 pop 1 set int state GigabitEthernet0/14/0.2 up loopback create set int l2 bridge loop2 3 bvi set int ip address loop2 192.168.3.1/24 set int state loop2 up create sub GigabitEthernet0/14/0 3 set int l2 bridge GigabitEthernet0/14/0.3 3 set int l2 tag-rewrite GigabitEthernet0/14/0.3 pop 1 set int state GigabitEthernet0/14/0.3 up So this should route traffic between VLAN 2 and VLAN 3, correct? Thanks On Thu, Apr 19, 2018 at 12:52 PM, Andrew Yourtchenko <ayour...@gmail.com> wrote: > > hi Carlito, > > you can configure subinterfaces with tags and assign the ip addresses so the > VPP does routing and then either use vnet ACLs or acl plugin to restrict the > traffic. > > —a > > On 19 Apr 2018, at 21:07, Dave Barach <dbar...@cisco.com> wrote: > > Begin forwarded message: > > From: Carlito Nueno <carlitonu...@gmail.com> > Date: April 19, 2018 at 9:03:51 AM HST > To: dbar...@cisco.com > Subject: VLAN to VLAN > > Hi Dave, > > How can I enable VLAN to VLAN communication? I want to have devices on > one VLAN talk to devices on another VLAN, if possible constrain the > devices by MAC or IP address. > > For example, only device with MAC (aa:aa:bb:80:90) or IP address > (192.168.2.20) on VLAN 100 can talk to devices on VLAN 200 > (192.168.3.0/24). > > Thanks > > -=-=-=-=-=-=-=-=-=-=-=- Links: You receive all messages sent to this group. View/Reply Online (#9002): https://lists.fd.io/g/vpp-dev/message/9002 View All Messages In Topic (4): https://lists.fd.io/g/vpp-dev/topic/17639114 Mute This Topic: https://lists.fd.io/mt/17639114/21656 New Topic: https://lists.fd.io/g/vpp-dev/post Change Your Subscription: https://lists.fd.io/g/vpp-dev/editsub/21656 Group Home: https://lists.fd.io/g/vpp-dev Contact Group Owner: vpp-dev+ow...@lists.fd.io Terms of Service: https://lists.fd.io/static/tos Unsubscribe: https://lists.fd.io/g/vpp-dev/unsub -=-=-=-=-=-=-=-=-=-=-=-
Re: [vpp-dev] VLAN to VLAN
My current VLAN config: loopback create set int l2 bridge loop1 2 bvi set int ip address loop1 192.168.2.1/24 set int state loop1 up create sub GigabitEthernet0/14/0 2 set int l2 bridge GigabitEthernet0/14/0.2 2 set int l2 tag-rewrite GigabitEthernet0/14/0.2 pop 1 set int state GigabitEthernet0/14/0.2 up loopback create set int l2 bridge loop2 3 bvi set int ip address loop2 192.168.3.1/24 set int state loop2 up create sub GigabitEthernet0/14/0 3 set int l2 bridge GigabitEthernet0/14/0.3 3 set int l2 tag-rewrite GigabitEthernet0/14/0.3 pop 1 set int state GigabitEthernet0/14/0.3 up So this should route traffic between VLAN 2 and VLAN 3, correct? Thanks On Thu, Apr 19, 2018 at 12:52 PM, Andrew Yourtchenkowrote: > > hi Carlito, > > you can configure subinterfaces with tags and assign the ip addresses so the > VPP does routing and then either use vnet ACLs or acl plugin to restrict the > traffic. > > —a > > On 19 Apr 2018, at 21:07, Dave Barach wrote: > > Begin forwarded message: > > From: Carlito Nueno > Date: April 19, 2018 at 9:03:51 AM HST > To: dbar...@cisco.com > Subject: VLAN to VLAN > > Hi Dave, > > How can I enable VLAN to VLAN communication? I want to have devices on > one VLAN talk to devices on another VLAN, if possible constrain the > devices by MAC or IP address. > > For example, only device with MAC (aa:aa:bb:80:90) or IP address > (192.168.2.20) on VLAN 100 can talk to devices on VLAN 200 > (192.168.3.0/24). > > Thanks > > -=-=-=-=-=-=-=-=-=-=-=- Links: You receive all messages sent to this group. View/Reply Online (#9000): https://lists.fd.io/g/vpp-dev/message/9000 View All Messages In Topic (3): https://lists.fd.io/g/vpp-dev/topic/17639114 Mute This Topic: https://lists.fd.io/mt/17639114/21656 New Topic: https://lists.fd.io/g/vpp-dev/post Change Your Subscription: https://lists.fd.io/g/vpp-dev/editsub/21656 Group Home: https://lists.fd.io/g/vpp-dev Contact Group Owner: vpp-dev+ow...@lists.fd.io Terms of Service: https://lists.fd.io/static/tos Unsubscribe: https://lists.fd.io/g/vpp-dev/unsub -=-=-=-=-=-=-=-=-=-=-=-
Re: [vpp-dev] VLAN to VLAN
hi Carlito, you can configure subinterfaces with tags and assign the ip addresses so the VPP does routing and then either use vnet ACLs or acl plugin to restrict the traffic. —a > On 19 Apr 2018, at 21:07, Dave Barachwrote: > > Begin forwarded message: > >> From: Carlito Nueno >> Date: April 19, 2018 at 9:03:51 AM HST >> To: dbar...@cisco.com >> Subject: VLAN to VLAN >> >> Hi Dave, >> >> How can I enable VLAN to VLAN communication? I want to have devices on >> one VLAN talk to devices on another VLAN, if possible constrain the >> devices by MAC or IP address. >> >> For example, only device with MAC (aa:aa:bb:80:90) or IP address >> (192.168.2.20) on VLAN 100 can talk to devices on VLAN 200 >> (192.168.3.0/24). >> >> Thanks >
[vpp-dev] VLAN to VLAN
Begin forwarded message: > From: Carlito Nueno> Date: April 19, 2018 at 9:03:51 AM HST > To: dbar...@cisco.com > Subject: VLAN to VLAN > > Hi Dave, > > How can I enable VLAN to VLAN communication? I want to have devices on > one VLAN talk to devices on another VLAN, if possible constrain the > devices by MAC or IP address. > > For example, only device with MAC (aa:aa:bb:80:90) or IP address > (192.168.2.20) on VLAN 100 can talk to devices on VLAN 200 > (192.168.3.0/24). > > Thanks smime.p7s Description: S/MIME cryptographic signature