-
Notifications
You must be signed in to change notification settings - Fork 9
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
VxLAN packets are encapsulated with an outer VLAN tag with VID 1 on Trident3 #414
Comments
KanjiMonster
added a commit
that referenced
this issue
May 3, 2024
Using unbridged, untagged ports at the same time as VID 1 as default PVID on a bridge may cause unexpected leakage and forwarding of traffic. Moving to the reserved VID 4095 would avoid this, but we cannot unconditionally use it until we solved #414, as otherwise we would leak packets with VID 4095. So for now allow changing the VID used internally for ports, but keep the default at 1. Signed-off-by: Jonas Gorski <jonas.gorski@bisdn.de>
KanjiMonster
added a commit
that referenced
this issue
May 3, 2024
Using unbridged, untagged ports at the same time as VID 1 as default PVID on a bridge may cause unexpected leakage and forwarding of traffic. Moving to the reserved VID 4095 would avoid this, but we cannot unconditionally use it until we solved #414, as otherwise we would leak packets with VID 4095. So for now allow changing the VID used internally for ports, but keep the default at 1. Signed-off-by: Jonas Gorski <jonas.gorski@bisdn.de>
KanjiMonster
added a commit
that referenced
this issue
May 8, 2024
Using unbridged, untagged ports at the same time as VID 1 as default PVID on a bridge may cause unexpected leakage and forwarding of traffic. Moving to the reserved VID 4095 would avoid this, but we cannot unconditionally use it until we solved #414, as otherwise we would leak packets with VID 4095. So for now allow changing the VID used internally for ports, but keep the default at 1. Signed-off-by: Jonas Gorski <jonas.gorski@bisdn.de> (cherry picked from commit a2d1e6b)
KanjiMonster
added a commit
that referenced
this issue
May 8, 2024
Using unbridged, untagged ports at the same time as VID 1 as default PVID on a bridge may cause unexpected leakage and forwarding of traffic. Moving to the reserved VID 4095 would avoid this, but we cannot unconditionally use it until we solved #414, as otherwise we would leak packets with VID 4095. So for now allow changing the VID used internally for ports, but keep the default at 1. Signed-off-by: Jonas Gorski <jonas.gorski@bisdn.de> (cherry picked from commit a2d1e6b)
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Expected Behavior
There is no outer VLAN tag on VxLAN packets unless explicitly configured.
Actual Behavior
On Trident3, there is an outer VLAN tag on VxLAN packets.
Steps to Reproduce the Problem
Create a VxLAN tunnel, try to send packets over it. When looking at them form the other side, there will be a VLAN tag added to them, while non-VxLAN packets are correctly untagged:
Specifications
The text was updated successfully, but these errors were encountered: