How is the bridge for multiacess links created ? #1324
Replies: 4 comments 10 replies
-
For Containerlab it's done here: netlab/netsim/providers/clab.py Line 22 in 85421e3 We've not had complaints about this before afaik, but it could be that something similar to
is required on some platforms? |
Beta Was this translation helpful? Give feedback.
-
Is this the same OpenSuse box we were discussing in #1313? If so, I can only give you vague pointers. In the libvirt world, the networks (Linux bridges) are created by Vagrant (calling libvirt), and the only thing netlab does afterwards is to find out the underlying Linux bridge name and the change a few bits like the group_fwd_mask. You can see what's going on behind the scenes with '-v' (or '-vv') option of netlab up. However, to minimize the clutter I'd run netlab create first followed by netlab up --snapshot This is a pretty good description of group_fwd_mask: https://interestingtraffic.nl/2017/11/21/an-oddly-specific-post-about-group_fwd_mask/ and this is the second hit of my Google search ;) https://blog.ipspace.net/2020/12/linux-bridge-lldp/ As you can see from that article, the group_fwd_mask affects only the IEEE group MAC addresses, not the IP traffic. In you case, it looks like something created iptables that block traffic between the virtual machines -- the setting you mentioned disables the call to iptables for packets traversing a bridge (https://wiki.libvirt.org/Net.bridge.bridge-nf-call_and_sysctl.conf.html). FWIW, here are my net.bridge settings and as you can see the defaults work on Ubuntu:
You could inspect the iptables before starting the lab and afterwards and see if there's any change. That will at least tell you whether any of the components used by netlab is the culprit (and no, netlab does not call iptables). Finally, we could disable iptables on bridges in netlab. Any thoughts on that one @jbemmel @ssasso @steffann? |
Beta Was this translation helpful? Give feedback.
-
FWIW, here's my iptables after bringing up a topology that uses a libvirt isolated network (Linux bridge):
The magic happens in the LIBVIRT_FWX chain in which packets leaving through the same bridge they came in are accepted. There might be something in your iptables that drops those packets before LIBVIRT_FWX chain is called. |
Beta Was this translation helpful? Give feedback.
-
The plot thickens. guys, does this look to you what it looks to me ? A prerouting chain drop due to an incorrect IP checksum. 2024/09/27 14:42:36 Attaching kprobes (via kprobe)... |
Beta Was this translation helpful? Give feedback.
-
As title says. I have to set net.bridge.bridge-nf-call-iptables=0 to be able to ping between devices on a multiaccess link. Is this the intended behavior ? Or should the firewalll process all bridge packets and be configured correctly ?
Thanks, Dan
Beta Was this translation helpful? Give feedback.
All reactions