The MAC address of br0 seems to indicate that at least one of eth1* is
connected to the bridge br0. What's the virtual network topology inside
Linux guest vnphost? "brctl show", "brctl showmacs br0" (and maybe also
"brctl showstp br0"), "tail -100 /proc/net/vlan/*".
How is the (dynamic?) traffic allowance planned to be realized on vnphost?
Why does the vlan base device eth1 have configured IP address(es)? (The
local TCP/IP stack and the vlan devices might undesirably compete for
incoming frames.)
Is vnphost a bridge (ebtables? vlan devices don't have configured IP
addresses) or a router (routing tables? iptables?) for the other guests?
Tcpdump (or any sniffer using packet sockets, e.g. being based on
libpcap) is tricky in such environments with virtual vlan network
devices and even more so with bridges due to stripping/prepending of
vlan tag headers (e.g. REORDER_HDR vconfig flag, network device vlan
hardware assist), the Linux internal delivery of frames to packet
sockets (net/core/dev.c:dev_queue_xmit_nit() called from
dev_hard_start_xmit() for egress traffic and ptype_all loop in
__netif_receive_skb() for ingress traffic), and the order of frame
processing hooks for packet sockets, vlan, bridge, local protocol stack
(e.g. in dev_hard_start_xmit() and esp. in __netif_receive_skb()).
Unfortunately, not all possible configurations work or work as expected
with Linux since not all features are implemented orthogonally.
On 07/13/2012 08:49 PM, Taylor, Neal E wrote:
Correction. State of eth1.x makes no difference.
Corrected version below.
From: Taylor, Neal E
Sent: Friday, July 13, 2012 11:08 AM
To: 'linux-390@vm.marist.edu'
Cc: Anand, Swapna A; Pavelka, Tomas; Quach, Minh T
Subject: VLAN Packet reverb.
Gentlefolk,
As a new person to the list I have checked the archive and didn't locate an
answer.
We're Using VLANs to isolate traffic to VMs with a
router/firewall-like process to switch VLAN IDs to complete allowed
> communication. Only the router/firewall instance of zLinux is grated
> trunked, promiscuous access to the vswitch. On the router/firewall we
start see 18 (usually) copies of packets.
Other nodes on the vswitch see normal traffic.
Any suggestions on what we've mis-configured or what data to gather next?
Neal Taylor
Principal Software Engineer
CA Technologies, Inc.
[root@vnphost ~]# vmcp q lan vnptest acc
VSWITCH SYSTEM VNPTEST Type: QDIO Connected: 3 Maxconn: INFINITE
PERSISTENT RESTRICTED ETHERNET Accounting: OFF
USERBASED
VLAN Aware Default VLAN: 0001 Default Porttype: Access GVRP: Disabled
Native VLAN: 0001 VLAN Counters: OFF
MAC address: 02-00-C2-00-00-14 MAC Protection: Unspecified
State: Defined
IPTimeout: 5 QueueStorage: 8
Isolation Status: OFF
Authorized userids:
VNPAPP1 Porttype: Access VLAN: 0002
VNPAPP2 Porttype: Access VLAN: 0003
VNPHOST Porttype: Trunk VLAN: 0002-0003
[root@vnphost tmp]# ifconfig -a
br0 Link encap:Ethernet HWaddr 02:00:C2:00:00:1B
inet6 addr: fe80::c2ff:fe00:1b/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:0 errors:0 dropped:0 overruns:0 frame:0
TX packets:6 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:0 (0.0 b) TX bytes:468 (468.0 b)
eth0 Link encap:Ethernet HWaddr 02:00:C2:00:00:1C
inet addr:141.202.162.61 Bcast:141.202.162.255 Mask:255.255.255.0
inet6 addr: fe80::200:c200:1800:1c/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:12518 errors:0 dropped:0 overruns:0 frame:0
TX packets:10681 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:4093811 (3.9 MiB) TX bytes:1588807 (1.5 MiB)
eth1 Link encap:Ethernet HWaddr 02:00:C2:00:00:1B
inet addr:10.55.255.3 Bcast:10.55.255.255 Mask:255.255.255.0
inet6 addr: fe80::c2ff:fe00:1b/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:5166 errors:0 dropped:0 overruns:0 frame:0
TX packets:4644 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:419062 (409.2 KiB) TX bytes:379468 (370.5 KiB)
eth1.2 Link encap:Ethernet HWaddr 02:00:C2:00:00:1B
inet6 addr: fe80::c2ff:fe00:1b/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:0 errors:0 dropped:0 overruns:0 frame:0
TX packets:12 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:0 (0.0 b) TX bytes:984 (984.0 b)
eth1.3 Link encap:Ethernet HWaddr 02:00:C2:00:00:1B
inet6 addr: fe80::c2ff:fe00:1b/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:0 errors:0 dropped:0 overruns:0 frame:0
TX packets:12 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:0 (0.0 b) TX bytes:984 (984.0 b)
eth1.4 Link encap:Ethernet HWaddr 02:00:C2:00:00:1B
inet6 addr: fe80::c2ff:fe00:1b/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:0 errors:0 dropped:0 overruns:0 frame:0
TX packets:6 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:0 (0.0 b) TX bytes:492 (492.0 b)
lo Link encap:Local Loopback
inet addr:127.0.0.1 Mask:255.0.0.0
inet6 addr: ::1/128 Scope:Host
UP LOOPBACK RUNNING MTU:16436 Metric:1
RX packets:0 errors:0 dropped:0 overruns:0 frame:0
TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:0 (0.0 b) TX bytes:0 (0.0 b)
From a "tcpdum -i eth1". This shows traffic between two other nodes, but 18
copies of it:
12:19:12.089413 IP 10.55.255.1> 10.55.255.2: ICMP echo request, id 3334, seq
1, length 64
12:19:12.089444 IP 10.55.255.1> 10.55.255.2: ICMP echo request, id 3334, seq
1, length 64
12:19:12.089449 IP 10.55.255.1> 10.55.255.2: ICMP echo request, id 3334, seq
1, length 64
12:19:12.089455 IP 10.55.255.1> 10.55.255.2: ICMP echo request, id 3334, seq
1, length 64
12:19:12.089460 IP 10.55.255.1> 10.55.255.2: ICMP echo request, id 3334, seq
1, length 64
12:19:12.089465 IP 10.55.255.1> 10.55.255.2: ICMP echo request, id 3334, seq
1, length 64
12:19:12.089470 IP 10.55.255.1> 10.55.255.2: ICMP echo request, id 3334, seq
1, length 64
12:19:12.089475 IP 10.55.255.1> 10.55.255.2: ICMP echo request, id 3334, seq
1, length 64
12:19:12.089480 IP 10.55.255.1> 10.55.255.2: ICMP echo request, id 3334, seq
1, length 64
12:19:12.089485 IP 10.55.255.1> 10.55.255.2: ICMP echo request, id 3334, seq
1, length 64
12:19:12.089490 IP 10.55.255.1> 10.55.255.2: ICMP echo request, id 3334, seq
1, length 64
12:19:12.089495 IP 10.55.255.1> 10.55.255.2: ICMP echo request, id 3334, seq
1, length 64
12:19:12.089500 IP 10.55.255.1> 10.55.255.2: ICMP echo request, id 3334, seq
1, length 64
12:19:12.089505 IP 10.55.255.1> 10.55.255.2: ICMP echo request, id 3334, seq
1, length 64
12:19:12.089510 IP 10.55.255.1> 10.55.255.2: ICMP echo request, id 3334, seq
1, length 64
12:19:12.089515 IP 10.55.255.1> 10.55.255.2: ICMP echo request, id 3334, seq
1, length 64
12:19:12.089520 IP 10.55.255.1> 10.55.255.2: ICMP echo request, id 3334, seq
1, length 64
12:19:12.089525 IP 10.55.255.1> 10.55.255.2: ICMP echo request, id 3334, seq
1, length 64
--
Mit freundlichen Grüßen / Kind regards
Steffen Maier
Linux on System z Development
IBM Deutschland Research & Development GmbH
Vorsitzende des Aufsichtsrats: Martina Koederitz
Geschäftsführung: Dirk Wittkopp
Sitz der Gesellschaft: Böblingen
Registergericht: Amtsgericht Stuttgart, HRB 243294
----------------------------------------------------------------------
For LINUX-390 subscribe / signoff / archive access instructions,
send email to lists...@vm.marist.edu with the message: INFO LINUX-390 or visit
http://www.marist.edu/htbin/wlvindex?LINUX-390
----------------------------------------------------------------------
For more information on Linux on System z, visit
http://wiki.linuxvm.org/