Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Disable source learning aka. multicast flooding on Netwatcher created VTEP interfaces #157

Open
Levovar opened this issue Oct 4, 2019 · 1 comment
Labels
major feature Features requiring thorough changes, and multiple PRs

Comments

@Levovar
Copy link
Collaborator

Levovar commented Oct 4, 2019

Based on recent feedback from the field we probably made an error assuming multicast is allowed for VNFs on top of all private, and public cloud offerings.
Example for such an environment turned out to be AWS.

To be able to survive in those environments, but still be able to interwork with strict port security settings Netwatcher should not create host VTEPs with source-learning enabled.
Instead, Netwatchers of all hosts' should update the VTEPs' neighbour table based on the DanmEp API.

Other possible solution would be employing some proven techniques and protocols automating just that, e.g. BGP.

@Levovar Levovar changed the title Disable source learning aka. multicast flooding on Netwatcher created VxLANs Disable source learning aka. multicast flooding on Netwatcher created VTEP interfaces Oct 4, 2019
@Levovar Levovar added the major feature Features requiring thorough changes, and multiple PRs label Oct 4, 2019
@Levovar
Copy link
Collaborator Author

Levovar commented Oct 7, 2019

sthing sthing sthing "unicast dynamic L3" described here:
https://vincent.bernat.ch/en/blog/2017-vxlan-linux#unicast-with-static-l2-entries

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
major feature Features requiring thorough changes, and multiple PRs
Projects
None yet
Development

No branches or pull requests

1 participant