Am Mon, 2 May 2011 11:15:57 -0500
schrieb John Jackson <open...@lacutt.com>:

> It's probably much more straightforward to run kvm-qemu instead of
> XEN. 

Hm, I'll consider this alternative. Till now our "test-LAN" ran on
VMware but for some reasons we want to get away from VMware.


> OpenBSD works fine as a guest using kvm/kvm-qemu and a CPU which
> supports hardware virtualization (egrep "svm|vmx" /proc/cpuinfo).

This "egrep" isn't successful on my host but this might be due to the
fact that it's an AMD-Opteron (Lisbon) and not a Intel-machine. After
enabling virtualizing support in BIOS (+ enabling IOMMU)
"/proc/cpuinfo" shows these flags:

$ grep flags /proc/cpuinfo |head -1
flags           : fpu de tsc msr pae mce cx8 apic mtrr mca cmov pat clflush mmx 
fxsr sse sse2 ht syscall nx mmxext fxsr_opt lm 3dnowext 3dnow constant_tsc 
rep_good nonstop_tsc extd_apicid pni cx16 popcnt hypervisor lahf_lm cmp_legacy 
extapic cr8_legacy abm sse4a misalignsse 3dnowprefetch nodeid_msr


> I've successfully run IPSEC (iked and isakmpd both work), bridging and
> various network services this way.

I moved from IPSEC to SSL/OpenVPN some years ago because it's more
robust against packet loss but in combination with routing protocols
like OSPF OpenVPN seems to be a bad choice as it keeps the
tunnel-interfaces AKA link-states always UP even if the tunnel is down.
Is there a way IPSEC can handle link-state-protocols better?



Regards,
 Tobias.

Reply via email to