Put in a PR to add targeted LDP neighbors.
- Feed Queries
- All Stories
- Search
- Feed Search
- Transactions
- Transaction Logs
All Stories
Nov 9 2020
Nov 8 2020
as we rely on OpenNHRP this looks like a dead end as of now. Maybe IPv6 support will get introduced and supported when we can migrate to FRR based NHRP - there is another task about that (T2326).
for reference:
my PIM config for allowing multicast from eth1.112 to eth1 (10.10.10.10 is a fictional ip):
show protocols pim
interface dum0 {
}
interface eth1 {
}
interface eth1.112 {
}
rp {
address 10.10.10.10 {
group 224.0.0.0/4
}
}terminating watchfrr and pimd has solved the problem.
With my configuration everything was OK...
Your referenced commit is only relevant for validation logic if your hardware supports QAT or not. We now run Kernel 4.19.155 - please retry with the latest rolling release.
@tuxnet maybe this will help: https://docs.vyos.io/en/latest/routing/multicast.html
@christophedc0 Could you provide me with your pim configuration? i am not getting any further
Nov 7 2020
set interfaces ethernet eth2 dhcp-options no-default-route
Available via set interfaces ethernet eth0 dhcp-options host-name
Issue is fixed in the latest rolling release. The IPv4 remote-host hostname in client mode works without adding the option '--proto udp4'.
Tested in VyOS 1.3-rolling-202011060217
Nov 6 2020
Problem is the constraint statement in https://github.com/vyos/vyos-1x/blob/current/interface-definitions/include/nat-address.xml.i where ipv4-range returns 0 instead of 1.
See T3051 "OpenVPN: multiple client routes do not work in server mode" for follow up
I want to have native-vlan and allowed-vlan
Nov 5 2020
Perfect! Then please share your full OpenVPN config so the issue can be recreated and fixed properly.
Until version 1.3-rolling-202010280217 it still worked.
I have not changed the configuration...
Can you please check if this used to work in older VyOS versions, e.g. https://downloads.vyos.io/rolling/current/amd64/vyos-1.3-rolling-202010151549-amd64.iso or share your config and a network diagram.
Sure, no worries. We still have a *ton* of work on 7.3.1 to do so I'm sure we'll get to 7.5 in time :)
AWS hosted ntpd instances:
us-east-1 - 34.206.168.146 ipv6 2600:1f18:1632:5f01:3ee9:8db5:3a01:4018
eu-central-1 - 18.193.41.138 ipv6 2a05:d014:89b:f501:c695:7709:5430:16a1
ap-southeast-1 - 122.248.201.177 ipv6 2406:da18:cdf:e900:9420:6c3:f3:7abc
Neet to retest, the related task T2100
Not sure if it's relevant or not, but I think 7.5 was released....we might be able to just leapfrog 7.4 and go directly to 7.5 instead.
Nov 4 2020
Put in a PR to add session hold time for static LDP neighbors.
now it works.
there seems to be another problem, the communication only works point to point, no routed traffic arrives on the opposite side.
Put in a PR to add TTL security for static LDP neighbors.
it sounds good to me.
I personally think the days with manually locking nic queues to cpu's is a bit outdated and we need something more dynamic.
After reading a bit on tuned i give my thumbs up
Hey, it seems that the big trouble now is the difference in the definition of the command line. If possible, I agree to conduct a survey to see your opinions.
@c-po i agree with using "native-vlan", but i dont agree on using "allowed-vlan".
"allowed-vlan" for me it dosn't actually describe that this vlan will be tagged on the port
Please try again with the next rolling release.
OK, I understand, PR has been updated
As I'm raised by A vendor starting with C and now switched to another vendor starting with A they both reference the function as native-vlan and allowed-vlan - this makes it easier for users which operate cross-platform.
set interfaces bridge br0 member interface eth0 allowed-vlan 2,4-9 set interfaces bridge br0 member interface eth0 native-vlan 101
The following writing methods can currently be used, such as:
I really like the idea of this interface and alwaysed watned to implement it - but I lacked of time, so first thank you @jack9603301 for picking this up.
It seems to be the same as the task list, but my basic realization is basically completed, see:
If two different vlan processing methods are not used for the same interface, then the two are not currently in conflict, unless the user sets vlan filter and eth0.10 on the same interface at the same time
I wonder what happens if I have a eth0.10 bridge member interface? Also what should happen when the user jas eth0 and eth1.10 bridge members? should this feature still work or is it exclusively only for native non vlan interfaces?
@runar The modified command is as follows:
@runar There is a question, that is, how to set the pvid flag according to this command format? Is the pvid flag automatically attached to the untagged option by default?
Hmm.. i have a few sugestions about the syntax.
The linux kernel allows the user to have different pvid vlan's on ingress and egress of a router port,.
- this is if you ask me not a common use case and i think we should merge the pvid(ingress) and untagged(egress) so that they will be ONE command..
- my second note is that the syntax shown above is quite verbose when creating a lot of vlan's and interfaces. consider creating 20 vlans on 5 ports, that will make a minimum of 100 lines of code in the config.
i would like to purpose a different syntax like this:
# Enable vlan filtering set interfaces bridge br1 vlan
Hello everyone