Re: [ovs-dev] [PATCH V3] ovs-vtep: vtep-ctl and ovs-vtep support of adding explicit tunnel key
lay VTEPs cannot be suppressed by >> a >>local service node. >> - BUM packets from relay VTEPs are handled according to the replicating >> mode >> and not forwarded/replicated to the l2-relay ports. >>It is assumed that relay tunnels do not interconnect remote >> networks. > > >> To sum it up, the role of the l2-relay is merely to connect two distinct >> broadcast domains, it will otherwise never be used as a switching fabric >> among >> the different remote l2 networks. >> > > This statement looks misleading. The so called l2 relay ports support BUM > traffic and > hence its part of L2 switching logic in that sense. > > > > >> >> ovs-vtep manifested changes >> === >> >> 1. The code need to distinguish between overlay (mesh) VTEPs, and relay >> VTEPs. >> 2. BUM traffic >> * BUM traffic from either mesh or bare metal network is replicated on >> all >> relay 'unknown-dst' VTEP. >> * BUM traffic from relay VTEP, is handled according to the >> replicating mode >> and is not forwarded/replicated to the l2-relay ports. >> > > The code in ovs-vtep should not be Neutron L2 border gateway specific. > Please remove references to so-called relay and mesh ports. > > The relay vteps are a second level of hierachy of vteps - I have more > detailed > comments in the code. > > Do not link per tunnel tunnel keys to Neutron L2 border gateway relay vteps > in generic code, such as ovs-vtep. > > >> >> >> Requested-by: "Ofer Ben-Yacov" <ofer.benya...@gmail.com> >> Signed-off-by: "Itamar Ofek" <itamar.o...@gmail.com> >> --- >> tests/vtep-ctl.at | 145 ++ >> +--- >> vtep/ovs-vtep | 102 +- >> vtep/vtep-ctl.c | 138 ++ >> - >> 3 files changed, 286 insertions(+), 99 deletions(-) >> >> diff --git a/tests/vtep-ctl.at b/tests/vtep-ctl.at >> index f0511ad..4178309 100644 >> --- a/tests/vtep-ctl.at >> +++ b/tests/vtep-ctl.at >> @@ -433,12 +433,16 @@ AT_CHECK([RUN_VTEP_CTL( >> CHECK_LSWITCHES([ls1]) >> AT_CHECK([RUN_VTEP_CTL( >> [add-ucast-local ls1 00:11:22:33:44:55 10.0.0.10], >> - [add-ucast-local ls1 00:11:22:33:44:66 vxlan_over_ipv4 10.0.0.11]) >> + [add-ucast-local ls1 00:11:22:33:44:66 vxlan_over_ipv4 10.0.0.11], >> + [add-ucast-local ls1 00:11:22:33:55:66 10.0.0.12 100], >> + [add-ucast-local ls1 00:11:22:33:55:77 vxlan_over_ipv4 10.0.0.13 200]) >> ], [0], [], [], [VTEP_CTL_CLEANUP]) >> AT_CHECK([RUN_VTEP_CTL([list-local-macs ls1])], [0], >> [ucast-mac-local >>00:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.10 >>00:11:22:33:44:66 -> vxlan_over_ipv4/10.0.0.11 >> + 00:11:22:33:55:66 -> vxlan_over_ipv4/10.0.0.12 [[100]] >> + 00:11:22:33:55:77 -> vxlan_over_ipv4/10.0.0.13 [[200]] >> >> mcast-mac-local >> >> @@ -460,11 +464,20 @@ AT_CHECK([RUN_VTEP_CTL( >> CHECK_LSWITCHES([ls1]) >> AT_CHECK([RUN_VTEP_CTL( >> [add-ucast-local ls1 00:11:22:33:44:55 10.0.0.10], >> - [add-ucast-local ls1 00:11:22:33:44:55 10.0.0.11]) >> + [add-ucast-local ls1 00:11:22:33:44:55 10.0.0.11], >> + [add-ucast-local ls1 00:11:22:33:55:66 10.0.0.12 100], >> + [add-ucast-local ls1 00:11:22:33:55:66 10.0.0.13 200], >> + [add-ucast-local ls1 00:11:22:33:55:77 10.0.0.14 300], >> + [add-ucast-local ls1 00:11:22:33:55:77 10.0.0.15], >> + [add-ucast-local ls1 00:11:22:33:55:88 10.0.0.16], >> + [add-ucast-local ls1 00:11:22:33:55:88 10.0.0.17 400]) >> ], [0], [], [], [VTEP_CTL_CLEANUP]) >> AT_CHECK([RUN_VTEP_CTL([list-local-macs ls1])], [0], >> [ucast-mac-local >>00:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.11 >> + 00:11:22:33:55:66 -> vxlan_over_ipv4/10.0.0.13 [[200]] >> + 00:11:22:33:55:77 -> vxlan_over_ipv4/10.0.0.15 >> + 00:11:22:33:55:88 -> vxlan_over_ipv4/10.0.0.17 [[400]] >> >> mcast-mac-local >> >> @@ -480,22 +493,28 @@ AT_CHECK([RUN_VTEP_CTL( >> CHECK_LSWITCHES([ls1]) >> AT_CHECK([RUN_VTEP_CTL( >> [add-ucast-local ls1 00:11:22:33:44:55 10.0.0.10], >> - [add-ucast-local ls1 00:11:22:33:44:66 vxlan_over_ipv4 10.0.0.11]) >> + [add-ucast-local ls1 00:11:22:33:44:66 vxlan_over_ipv4 10.0.0.11], >> + [add-ucast-local ls1 00:11:22:33:55:66 10.0.0.12 100], >> + [add-ucast-local ls1 00:11:22:33:55:77 vxlan_over_ipv4 10.0.0.13 200]) >> ], [0
Re: [ovs-dev] [PATCH V3] ovs-vtep: vtep-ctl and ovs-vtep support of adding explicit tunnel key
from physical port are > forwarded to only a selected single service node from the unknown-dst > ports > (the service node responsible for "BUM" propagation to the overlay > network), > and flooded to all the physical bound ports. > > In either of the replication modes BUM traffic originated from a VTEP port > is > flooded only to all physical ports. > > Considering the new l2-relay VTEPs ports group, relay related BUM traffic > is > handled as follows: > - BUM packets from Physical Port and from local overlay network are > replicated > to the unknown-dst l2-relay ports. >The reason is that a relay VTEP is not a part of the local managed >network and BUM traffic to the relay VTEPs cannot be suppressed by a >local service node. > - BUM packets from relay VTEPs are handled according to the replicating > mode > and not forwarded/replicated to the l2-relay ports. >It is assumed that relay tunnels do not interconnect remote > networks. > > To sum it up, the role of the l2-relay is merely to connect two distinct > broadcast domains, it will otherwise never be used as a switching fabric > among > the different remote l2 networks. > > ovs-vtep manifested changes > === > > 1. The code need to distinguish between overlay (mesh) VTEPs, and relay > VTEPs. > 2. BUM traffic > * BUM traffic from either mesh or bare metal network is replicated on > all > relay 'unknown-dst' VTEP. > * BUM traffic from relay VTEP, is handled according to the replicating > mode > and is not forwarded/replicated to the l2-relay ports. > > > Requested-by: "Ofer Ben-Yacov" <ofer.benya...@gmail.com> > Signed-off-by: "Itamar Ofek" <itamar.o...@gmail.com> > --- > tests/vtep-ctl.at | 145 > +++--- > vtep/ovs-vtep | 102 +- > vtep/vtep-ctl.c | 138 > ++- > 3 files changed, 286 insertions(+), 99 deletions(-) > > diff --git a/tests/vtep-ctl.at b/tests/vtep-ctl.at > index f0511ad..4178309 100644 > --- a/tests/vtep-ctl.at > +++ b/tests/vtep-ctl.at > @@ -433,12 +433,16 @@ AT_CHECK([RUN_VTEP_CTL( > CHECK_LSWITCHES([ls1]) > AT_CHECK([RUN_VTEP_CTL( > [add-ucast-local ls1 00:11:22:33:44:55 10.0.0.10], > - [add-ucast-local ls1 00:11:22:33:44:66 vxlan_over_ipv4 10.0.0.11]) > + [add-ucast-local ls1 00:11:22:33:44:66 vxlan_over_ipv4 10.0.0.11], > + [add-ucast-local ls1 00:11:22:33:55:66 10.0.0.12 100], > + [add-ucast-local ls1 00:11:22:33:55:77 vxlan_over_ipv4 10.0.0.13 200]) > ], [0], [], [], [VTEP_CTL_CLEANUP]) > AT_CHECK([RUN_VTEP_CTL([list-local-macs ls1])], [0], > [ucast-mac-local >00:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.10 >00:11:22:33:44:66 -> vxlan_over_ipv4/10.0.0.11 > + 00:11:22:33:55:66 -> vxlan_over_ipv4/10.0.0.12 [[100]] > + 00:11:22:33:55:77 -> vxlan_over_ipv4/10.0.0.13 [[200]] > > mcast-mac-local > > @@ -460,11 +464,20 @@ AT_CHECK([RUN_VTEP_CTL( > CHECK_LSWITCHES([ls1]) > AT_CHECK([RUN_VTEP_CTL( > [add-ucast-local ls1 00:11:22:33:44:55 10.0.0.10], > - [add-ucast-local ls1 00:11:22:33:44:55 10.0.0.11]) > + [add-ucast-local ls1 00:11:22:33:44:55 10.0.0.11], > + [add-ucast-local ls1 00:11:22:33:55:66 10.0.0.12 100], > + [add-ucast-local ls1 00:11:22:33:55:66 10.0.0.13 200], > + [add-ucast-local ls1 00:11:22:33:55:77 10.0.0.14 300], > + [add-ucast-local ls1 00:11:22:33:55:77 10.0.0.15], > + [add-ucast-local ls1 00:11:22:33:55:88 10.0.0.16], > + [add-ucast-local ls1 00:11:22:33:55:88 10.0.0.17 400]) > ], [0], [], [], [VTEP_CTL_CLEANUP]) > AT_CHECK([RUN_VTEP_CTL([list-local-macs ls1])], [0], > [ucast-mac-local >00:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.11 > + 00:11:22:33:55:66 -> vxlan_over_ipv4/10.0.0.13 [[200]] > + 00:11:22:33:55:77 -> vxlan_over_ipv4/10.0.0.15 > + 00:11:22:33:55:88 -> vxlan_over_ipv4/10.0.0.17 [[400]] > > mcast-mac-local > > @@ -480,22 +493,28 @@ AT_CHECK([RUN_VTEP_CTL( > CHECK_LSWITCHES([ls1]) > AT_CHECK([RUN_VTEP_CTL( > [add-ucast-local ls1 00:11:22:33:44:55 10.0.0.10], > - [add-ucast-local ls1 00:11:22:33:44:66 vxlan_over_ipv4 10.0.0.11]) > + [add-ucast-local ls1 00:11:22:33:44:66 vxlan_over_ipv4 10.0.0.11], > + [add-ucast-local ls1 00:11:22:33:55:66 10.0.0.12 100], > + [add-ucast-local ls1 00:11:22:33:55:77 vxlan_over_ipv4 10.0.0.13 200]) > ], [0], [], [], [VTEP_CTL_CLEANUP]) > AT_CHECK([RUN_VTEP_CTL([list-local-macs ls1])], [0], > [ucast-mac-local >00:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.10 >00:11:22:
Re: [ovs-dev] [PATCH] vtep: add per-tunnel tunnel key support in vtep-ctl and ovs-vtep. related to commit c2cd1902
Hi Darrel, The problem with applying the patch may be caused by gmail. Patch will be resubmitted again. I have run make check, and it passed. Itamar On Mon, Jun 13, 2016 at 7:30 PM, Darrell Ball <dlu...@gmail.com> wrote: > I was not able to apply this patch - can you fix this > > Also, can you make sure the OVN vtep GW test passes (using make check) with > the patch submitted > > 2043: ovn.at:1029ovn -- vtep: 3 HVs, 1 VIFs/HV, 1 GW, 1 LS > vtep > > The changes to vtep.xml are hard to follow; also I am not sure > they are required as there is already documentation for > Per Logical_Switch+Physical_Locator pair tunnel keys. > > > > > > > On Tue, Jun 7, 2016 at 1:19 AM, Itamar Ofek <itamar.o...@gmail.com> wrote: > >> This patch adds support for handeling a per-tunnel tunnel key in the >> ovs-vtep and vtep-ctl to support the usage of neutron L2GW as an >> inter-cloud >> gateway. >> >> The Neutron spec is available here: >> https://review.openstack.org/#/c/270786/ >> >> Requested-by: "Ofer Ben-Yacov" <ofer.benya...@gmail.com> >> Signed-off-by: "Itamar Ofek" <itamar.o...@gmail.com> >> --- >> tests/vtep-ctl.at | 132 >> +-- >> vtep/ovs-vtep | 52 +--- >> vtep/vtep-ctl.c | 138 >> +++--- >> vtep/vtep.xml | 10 +++- >> 4 files changed, 200 insertions(+), 132 deletions(-) >> >> diff --git a/tests/vtep-ctl.at b/tests/vtep-ctl.at >> index f0511ad..b7803c3 100644 >> --- a/tests/vtep-ctl.at >> +++ b/tests/vtep-ctl.at >> @@ -437,8 +437,8 @@ AT_CHECK([RUN_VTEP_CTL( >> ], [0], [], [], [VTEP_CTL_CLEANUP]) >> AT_CHECK([RUN_VTEP_CTL([list-local-macs ls1])], [0], >> [ucast-mac-local >> - 00:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.10 >> - 00:11:22:33:44:66 -> vxlan_over_ipv4/10.0.0.11 >> + 00:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.10 [[]] >> + 00:11:22:33:44:66 -> vxlan_over_ipv4/10.0.0.11 [[]] >> >> mcast-mac-local >> >> @@ -464,7 +464,7 @@ AT_CHECK([RUN_VTEP_CTL( >> ], [0], [], [], [VTEP_CTL_CLEANUP]) >> AT_CHECK([RUN_VTEP_CTL([list-local-macs ls1])], [0], >> [ucast-mac-local >> - 00:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.11 >> + 00:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.11 [[]] >> >> mcast-mac-local >> >> @@ -484,8 +484,8 @@ AT_CHECK([RUN_VTEP_CTL( >> ], [0], [], [], [VTEP_CTL_CLEANUP]) >> AT_CHECK([RUN_VTEP_CTL([list-local-macs ls1])], [0], >> [ucast-mac-local >> - 00:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.10 >> - 00:11:22:33:44:66 -> vxlan_over_ipv4/10.0.0.11 >> + 00:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.10 [[]] >> + 00:11:22:33:44:66 -> vxlan_over_ipv4/10.0.0.11 [[]] >> >> mcast-mac-local >> >> @@ -495,7 +495,7 @@ AT_CHECK([RUN_VTEP_CTL( >> ], [0], [], [], [VTEP_CTL_CLEANUP]) >> AT_CHECK([RUN_VTEP_CTL([list-local-macs ls1])], [0], >> [ucast-mac-local >> - 00:11:22:33:44:66 -> vxlan_over_ipv4/10.0.0.11 >> + 00:11:22:33:44:66 -> vxlan_over_ipv4/10.0.0.11 [[]] >> >> mcast-mac-local >> >> @@ -515,8 +515,8 @@ AT_CHECK([RUN_VTEP_CTL( >> ], [0], [], [], [VTEP_CTL_CLEANUP]) >> AT_CHECK([RUN_VTEP_CTL([list-remote-macs ls1])], [0], >> [ucast-mac-remote >> - 00:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.10 >> - 00:11:22:33:44:66 -> vxlan_over_ipv4/10.0.0.11 >> + 00:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.10 [[]] >> + 00:11:22:33:44:66 -> vxlan_over_ipv4/10.0.0.11 [[]] >> >> mcast-mac-remote >> >> @@ -542,7 +542,7 @@ AT_CHECK([RUN_VTEP_CTL( >> ], [0], [], [], [VTEP_CTL_CLEANUP]) >> AT_CHECK([RUN_VTEP_CTL([list-remote-macs ls1])], [0], >> [ucast-mac-remote >> - 00:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.11 >> + 00:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.11 [[]] >> >> mcast-mac-remote >> >> @@ -562,8 +562,8 @@ AT_CHECK([RUN_VTEP_CTL( >> ], [0], [], [], [VTEP_CTL_CLEANUP]) >> AT_CHECK([RUN_VTEP_CTL([list-remote-macs ls1])], [0], >> [ucast-mac-remote >> - 00:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.10 >> - 00:11:22:33:44:66 -> vxlan_over_ipv4/10.0.0.11 >> + 00:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.10 [[]] >> + 00:11:22:33:44:66 -> vxlan_over_ipv4/10.0.0.11 [[]] >> >> mcast-mac-remote >> >> @@ -573,7 +573,7 @@ AT_CHECK([RUN_VTEP_CTL( >> ], [0], [], [], [VTEP_CTL_CLEANUP]) &g
[ovs-dev] [PATCH] vtep: add per-tunnel tunnel key support in vtep-ctl and ovs-vtep. related to commit c2cd1902
This patch adds support for handeling a per-tunnel tunnel key in the ovs-vtep and vtep-ctl to support the usage of neutron L2GW as an inter-cloud gateway. The Neutron spec is available here: https://review.openstack.org/#/c/270786/ Requested-by: "Ofer Ben-Yacov" <ofer.benya...@gmail.com> Signed-off-by: "Itamar Ofek" <itamar.o...@gmail.com> --- tests/vtep-ctl.at | 132 +-- vtep/ovs-vtep | 52 +--- vtep/vtep-ctl.c | 138 +++--- vtep/vtep.xml | 10 +++- 4 files changed, 200 insertions(+), 132 deletions(-) diff --git a/tests/vtep-ctl.at b/tests/vtep-ctl.at index f0511ad..b7803c3 100644 --- a/tests/vtep-ctl.at +++ b/tests/vtep-ctl.at @@ -437,8 +437,8 @@ AT_CHECK([RUN_VTEP_CTL( ], [0], [], [], [VTEP_CTL_CLEANUP]) AT_CHECK([RUN_VTEP_CTL([list-local-macs ls1])], [0], [ucast-mac-local - 00:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.10 - 00:11:22:33:44:66 -> vxlan_over_ipv4/10.0.0.11 + 00:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.10 [[]] + 00:11:22:33:44:66 -> vxlan_over_ipv4/10.0.0.11 [[]] mcast-mac-local @@ -464,7 +464,7 @@ AT_CHECK([RUN_VTEP_CTL( ], [0], [], [], [VTEP_CTL_CLEANUP]) AT_CHECK([RUN_VTEP_CTL([list-local-macs ls1])], [0], [ucast-mac-local - 00:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.11 + 00:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.11 [[]] mcast-mac-local @@ -484,8 +484,8 @@ AT_CHECK([RUN_VTEP_CTL( ], [0], [], [], [VTEP_CTL_CLEANUP]) AT_CHECK([RUN_VTEP_CTL([list-local-macs ls1])], [0], [ucast-mac-local - 00:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.10 - 00:11:22:33:44:66 -> vxlan_over_ipv4/10.0.0.11 + 00:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.10 [[]] + 00:11:22:33:44:66 -> vxlan_over_ipv4/10.0.0.11 [[]] mcast-mac-local @@ -495,7 +495,7 @@ AT_CHECK([RUN_VTEP_CTL( ], [0], [], [], [VTEP_CTL_CLEANUP]) AT_CHECK([RUN_VTEP_CTL([list-local-macs ls1])], [0], [ucast-mac-local - 00:11:22:33:44:66 -> vxlan_over_ipv4/10.0.0.11 + 00:11:22:33:44:66 -> vxlan_over_ipv4/10.0.0.11 [[]] mcast-mac-local @@ -515,8 +515,8 @@ AT_CHECK([RUN_VTEP_CTL( ], [0], [], [], [VTEP_CTL_CLEANUP]) AT_CHECK([RUN_VTEP_CTL([list-remote-macs ls1])], [0], [ucast-mac-remote - 00:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.10 - 00:11:22:33:44:66 -> vxlan_over_ipv4/10.0.0.11 + 00:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.10 [[]] + 00:11:22:33:44:66 -> vxlan_over_ipv4/10.0.0.11 [[]] mcast-mac-remote @@ -542,7 +542,7 @@ AT_CHECK([RUN_VTEP_CTL( ], [0], [], [], [VTEP_CTL_CLEANUP]) AT_CHECK([RUN_VTEP_CTL([list-remote-macs ls1])], [0], [ucast-mac-remote - 00:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.11 + 00:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.11 [[]] mcast-mac-remote @@ -562,8 +562,8 @@ AT_CHECK([RUN_VTEP_CTL( ], [0], [], [], [VTEP_CTL_CLEANUP]) AT_CHECK([RUN_VTEP_CTL([list-remote-macs ls1])], [0], [ucast-mac-remote - 00:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.10 - 00:11:22:33:44:66 -> vxlan_over_ipv4/10.0.0.11 + 00:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.10 [[]] + 00:11:22:33:44:66 -> vxlan_over_ipv4/10.0.0.11 [[]] mcast-mac-remote @@ -573,7 +573,7 @@ AT_CHECK([RUN_VTEP_CTL( ], [0], [], [], [VTEP_CTL_CLEANUP]) AT_CHECK([RUN_VTEP_CTL([list-remote-macs ls1])], [0], [ucast-mac-remote - 00:11:22:33:44:66 -> vxlan_over_ipv4/10.0.0.11 + 00:11:22:33:44:66 -> vxlan_over_ipv4/10.0.0.11 [[]] mcast-mac-remote @@ -595,16 +595,16 @@ AT_CHECK([RUN_VTEP_CTL( ], [0], [], [], [VTEP_CTL_CLEANUP]) AT_CHECK([RUN_VTEP_CTL([list-local-macs ls1])], [0], [ucast-mac-local - 00:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.10 - 00:11:22:33:44:66 -> vxlan_over_ipv4/10.0.0.11 + 00:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.10 [[]] + 00:11:22:33:44:66 -> vxlan_over_ipv4/10.0.0.11 [[]] mcast-mac-local ], [], [VTEP_CTL_CLEANUP]) AT_CHECK([RUN_VTEP_CTL([list-remote-macs ls1])], [0], [ucast-mac-remote - 02:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.10 - 02:11:22:33:44:66 -> vxlan_over_ipv4/10.0.0.11 + 02:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.10 [[]] + 02:11:22:33:44:66 -> vxlan_over_ipv4/10.0.0.11 [[]] mcast-mac-remote @@ -627,9 +627,9 @@ AT_CHECK([RUN_VTEP_CTL([list-local-macs ls1])], [0], [ucast-mac-local mcast-mac-local - 01:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.10 - 01:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.12 - 01:11:22:33:44:66 -> vxlan_over_ipv4/10.0.0.11 + 01:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.10 [[]] + 01:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.12 [[]] + 01:11:22:33:44:66 -> vxlan_over_ipv4/10.0.0.11 [[]] ], [], [VTEP_CTL_CLEANUP]) AT_CHECK([RUN_VTEP_CTL([list-remote-macs ls1])], [0], @@ -657,10 +657,10 @@ AT_CHECK([RUN_VTEP_CTL([list-local-macs ls1])], [0], [ucast-mac-local mcast-mac-local - 01:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.10 - 01:11:
[ovs-dev] [PATCH] vtep: add per-tunnel tunnel key support in vtep-ctl and ovs-vtep. related to commit c2cd1902
___ dev mailing list dev@openvswitch.org http://openvswitch.org/mailman/listinfo/dev