Steffen Weiberle
2006-Aug-30 21:49 UTC
[crossbow-discuss] ?: stacktype: shares (for routing out of the box)
One of the reasons I''m interested in the vnics is the ability to force
traffic out of the system even if it is to another co-located zone.
I see there is an option to add a router entry for a zone. However, I
get the following error:
zonecfg:zone1> add router
zonecfg:zone1:router> set address=10.1.14.129
zonecfg:zone1:router> end
zonecfg:zone1> verify
router: not allowed with a shared stack: address 10.1.14.129
zone1: Invalid argument
zonecfg:zone1> info
zonename: zone1
zonepath: /export/zones/zone1
autoboot: false
stacktype: shared
bootargs:
pool:
limitpriv:
inherit-pkg-dir:
dir: /lib
inherit-pkg-dir:
dir: /platform
inherit-pkg-dir:
dir: /sbin
inherit-pkg-dir:
dir: /usr
net:
physical: vnic1
address: 10.1.14.151/26
af not specified
restrict not specified
net:
address: 10.1.14.129
zonecfg:zone1>
This is on an e1000g interface. Does this fail because of the same
issue where I can''t set the MAC address? Which interfaces does this
currently work on, besides bge? nge? hme? eri?
Thanks
Steffen
Nicolas Droux
2006-Aug-30 22:25 UTC
[crossbow-discuss] ?: stacktype: shares (for routing out of the box)
Hi Steffen, Steffen Weiberle wrote:> One of the reasons I''m interested in the vnics is the ability to force > traffic out of the system even if it is to another co-located zone. > > I see there is an option to add a router entry for a zone. However, I > get the following error: > > zonecfg:zone1> add router > zonecfg:zone1:router> set address=10.1.14.129 > zonecfg:zone1:router> end > zonecfg:zone1> verify > router: not allowed with a shared stack: address 10.1.14.129 > zone1: Invalid argument > zonecfg:zone1> info > zonename: zone1 > zonepath: /export/zones/zone1 > autoboot: false > stacktype: shared^^^^^^ It''s because the zone is sharing its stack with the global zone. Try setting stacktype=exclusive for that zone. Nicolas. -- Nicolas Droux, Solaris Kernel Networking Sun Microsystems, Inc. http://blogs.sun.com/droux
Kais Belgaied
2006-Aug-30 22:39 UTC
[crossbow-discuss] ?: stacktype: shares (for routing out of the box)
> > router: not allowed with a shared stack: address 10.1.14.129 > > zone1: Invalid argument > > zonecfg:zone1> info > > zonename: zone1 > > zonepath: /export/zones/zone1 > > autoboot: false > > stacktype: shared > ^^^^^^ > > It''s because the zone is sharing its stack with the global zone. Try > setting stacktype=exclusive for that zone.it may be worth mentioning for troubleshooting that zonenname -t displays the type of zone (shared vs exclusive) Kais.
Kais Belgaied
2006-Aug-31 03:21 UTC
[crossbow-discuss] ?: stacktype: shares (for routing out of the box)
>> >> zonecfg:zone1> verify >> router: not allowed with a shared stack: address 10.1.14.129 >> zone1: Invalid argument >> zonecfg:zone1> info >> zonename: zone1 >> zonepath: /export/zones/zone1 >> autoboot: false >> stacktype: shared > > ^^^^^^it is also worth mentioning for ease of debugging here that zonenname -t can be used to display the stack type (shared vs exclusive) Kais.
Steffen Weiberle
2006-Aug-31 17:09 UTC
[crossbow-discuss] ?: stacktype: shared (for routing out of the box)
Ok, got that working. Thanks!
I found out that by having stacktype=exclusive, I must not ifconfig
vnic1 or vnic2 in the GZ or the zones won''t boot. And once booted the
vnics don''t show up in the GZ.
I am getting different results with my testing under difference
circumstances.
So, first some questions on proper practice in bringing up the VNICs.
I have two interfaces. One (e1000g0) is on the public network, the
other (e1000g3) is on a private network, and a Solaris 9 box is the
router between the two, just in case.
Must I plumb e1000g3 to use VNICs? It doesn''t seem so, but should I?
If so, must it have a valid address as well?
A zone reboot fails with:
Interface vnic2 is used by the non-global zone: zone2.
zoneadm: zone zone2 failed to verify
But I can halt the zone and then boot it.
Currently, e1000g3 is not plumbed.
I can not ping the router at .129 from either NGZ. I see arp requests
and responses at the router on the proper interface, but neither NGZ
gets them. I also see the request and reply via snoop in the GZ on the
e1000g3 interface, so traffic is going out and coming back, just not
getting delivered to the NGZs.
I can ping between NGZs, but traffic does not leave the system.
Below is some data, but I might be ending up with three different sets
of datapoints, depending on whether the underlying interface is not
plumbed, plumbed but not address, or plumbed and with address.
I do the following to bring up the VNICs
dladm create-vnic -d e1000g3 -i 10.1.14.151 -b 1000 1
dladm create-vnic -d e1000g3 -i 10.1.14.152 -b 1000 2
# zonecfg -z zone1 info
zonename: zone1
zonepath: /export/zones/zone1
autoboot: false
stacktype: exclusive
bootargs:
pool:
limitpriv:
inherit-pkg-dir:
dir: /lib
inherit-pkg-dir:
dir: /platform
inherit-pkg-dir:
dir: /sbin
inherit-pkg-dir:
dir: /usr
net:
physical: vnic1
address: 10.1.14.151/26
af: inet
restrict not specified
net:
address: 10.1.14.129
Zone 2 is similar to zone 1 exect .152
Why the second ''net'', instead of ''router''?
Nicolas Droux
2006-Aug-31 18:26 UTC
[crossbow-discuss] ?: stacktype: shared (for routing out of the box)
Hi Steffen, Steffen Weiberle wrote:> Ok, got that working. Thanks! > > I found out that by having stacktype=exclusive, I must not ifconfig > vnic1 or vnic2 in the GZ or the zones won''t boot. And once booted the > vnics don''t show up in the GZ.Once the vnic is used by a non-global zone with an exclusive stack, it shouldn''t be used by the global zone. I''m not sure if all the checks are in place currently to enforce this.> > I am getting different results with my testing under difference > circumstances. > > So, first some questions on proper practice in bringing up the VNICs. > > I have two interfaces. One (e1000g0) is on the public network, the other > (e1000g3) is on a private network, and a Solaris 9 box is the router > between the two, just in case. > > Must I plumb e1000g3 to use VNICs? It doesn''t seem so, but should I? If > so, must it have a valid address as well?Unfortunately at this point e1000g3 would have to be plumbed and configured as well. This is a known restriction and I''m looking into it.> > A zone reboot fails with: > > Interface vnic2 is used by the non-global zone: zone2. > zoneadm: zone zone2 failed to verifyMmm, this is during a boot of zone2?> > But I can halt the zone and then boot it. > > Currently, e1000g3 is not plumbed. > > I can not ping the router at .129 from either NGZ. I see arp requests > and responses at the router on the proper interface, but neither NGZ > gets them. I also see the request and reply via snoop in the GZ on the > e1000g3 interface, so traffic is going out and coming back, just not > getting delivered to the NGZs. > > I can ping between NGZs, but traffic does not leave the system.See above, try configuring the underlying interface.> > Below is some data, but I might be ending up with three different sets > of datapoints, depending on whether the underlying interface is not > plumbed, plumbed but not address, or plumbed and with address. > > > I do the following to bring up the VNICs > > dladm create-vnic -d e1000g3 -i 10.1.14.151 -b 1000 1 > dladm create-vnic -d e1000g3 -i 10.1.14.152 -b 1000 2 > > # zonecfg -z zone1 info > zonename: zone1 > zonepath: /export/zones/zone1 > autoboot: false > stacktype: exclusive > bootargs: > pool: > limitpriv: > inherit-pkg-dir: > dir: /lib > inherit-pkg-dir: > dir: /platform > inherit-pkg-dir: > dir: /sbin > inherit-pkg-dir: > dir: /usr > net: > physical: vnic1 > address: 10.1.14.151/26 > af: inet > restrict not specified > net: > address: 10.1.14.129 > > Zone 2 is similar to zone 1 exect .152 > > Why the second ''net'', instead of ''router''?That looks like a bug. Nicolas. -- Nicolas Droux, Solaris Kernel Networking Sun Microsystems, Inc. http://blogs.sun.com/droux
Kais Belgaied
2006-Aug-31 18:40 UTC
[crossbow-discuss] ?: stacktype: shared (for routing out of the box)
Steffen Weiberle wrote:> > I do the following to bring up the VNICs > > dladm create-vnic -d e1000g3 -i 10.1.14.151 -b 1000 1 > dladm create-vnic -d e1000g3 -i 10.1.14.152 -b 1000 2and what''s the output of ifconfig -a from the global zone? Kais.
Steffen Weiberle
2006-Aug-31 19:22 UTC
[crossbow-discuss] ?: stacktype: shared (for routing out of the box)
Hi Kais,
Currently, with e1000g3 not plumbed, this is what it looks like. I
will reboot and do this again with it configured per Nicolas''
suggestion (thanks Nicolas).
Steffen
tajmahal# ifconfig -a
lo0: flags=2001000849<UP,LOOPBACK,RUNNING,MULTICAST,IPv4,VIRTUAL> mtu
8232 index 1
inet 127.0.0.1 netmask ff000000
e1000g0: flags=1000843<UP,BROADCAST,RUNNING,MULTICAST,IPv4> mtu 1500
index 2
inet 129.154.53.7 netmask ffffff00 broadcast 129.154.53.255
ether 0:3:ba:d8:41:20
tajmahal# zlogin zone1 ifconfig -a
lo0: flags=2001000849<UP,LOOPBACK,RUNNING,MULTICAST,IPv4,VIRTUAL> mtu
8232 index 1
inet 127.0.0.1 netmask ff000000
vnic1: flags=1000803<UP,BROADCAST,MULTICAST,IPv4> mtu 1500 index 2
inet 10.1.14.151 netmask ffffffc0 broadcast 10.1.14.191
ether 0:3:ba:d8:41:1f
tajmahal# zlogin zone2 ifconfig -a
lo0: flags=2001000849<UP,LOOPBACK,RUNNING,MULTICAST,IPv4,VIRTUAL> mtu
8232 index 1
inet 127.0.0.1 netmask ff000000
vnic2: flags=1000843<UP,BROADCAST,RUNNING,MULTICAST,IPv4> mtu 1500 index 2
inet 10.1.14.152 netmask ffffffc0 broadcast 10.1.14.191
ether 0:3:ba:d8:41:1f
tajmahal#
Kais Belgaied wrote On 08/31/06 14:40,:> Steffen Weiberle wrote:
>
>>
>> I do the following to bring up the VNICs
>>
>> dladm create-vnic -d e1000g3 -i 10.1.14.151 -b 1000 1
>> dladm create-vnic -d e1000g3 -i 10.1.14.152 -b 1000 2
>
>
>
> and what''s the output of ifconfig -a from the global zone?
>
> Kais.
>
> _______________________________________________
> crossbow-discuss mailing list
> crossbow-discuss at opensolaris.org
> http://opensolaris.org/mailman/listinfo/crossbow-discuss
Steffen Weiberle
2006-Aug-31 19:40 UTC
[crossbow-discuss] ?: stacktype: shared (for routing out of the box)
Here it is after a reboot and setting up e1000g3 with an IP address.
One thing I forgot to do was try ping()ing the router before setting
up the VNICs.
Steffen
tajmahal# cat crossbow.sh
#!/bin/sh
ifconfig e1000g3 plumb
ifconfig e1000g3 10.1.14.150 netmask + broadcast + up
dladm create-vnic -d e1000g3 -i 10.1.14.151 -b 1000 1
dladm create-vnic -d e1000g3 -i 10.1.14.152 -b 1000 2
dladm show-vnic
zoneadm -z zone1 boot
zoneadm -z zone2 boot
tajmahal# ./crossbow.sh
Setting netmask of e1000g3 to 255.255.255.192
vnic1 dev: e1000g3 IP: 10.1.14.151
vnic0 dev:
tajmahal# ifconfig -a
lo0: flags=2001000849<UP,LOOPBACK,RUNNING,MULTICAST,IPv4,VIRTUAL> mtu
8232 index 1
inet 127.0.0.1 netmask ff000000
e1000g0: flags=1000843<UP,BROADCAST,RUNNING,MULTICAST,IPv4> mtu 1500
index 2
inet 129.154.53.7 netmask ffffff00 broadcast 129.154.53.255
ether 0:3:ba:d8:41:20
e1000g3: flags=1000843<UP,BROADCAST,RUNNING,MULTICAST,IPv4> mtu 1500
index 3
inet 10.1.14.150 netmask ffffffc0 broadcast 10.1.14.191
ether 0:3:ba:d8:41:1f
tajmahal# zlogin zone1 ifconfig -a
lo0: flags=2001000849<UP,LOOPBACK,RUNNING,MULTICAST,IPv4,VIRTUAL> mtu
8232 index 1
inet 127.0.0.1 netmask ff000000
vnic1: flags=1000843<UP,BROADCAST,RUNNING,MULTICAST,IPv4> mtu 1500 index 2
inet 10.1.14.151 netmask ffffffc0 broadcast 10.1.14.191
ether 0:3:ba:d8:41:1f
tajmahal# zlogin zone2 ifconfig -a
lo0: flags=2001000849<UP,LOOPBACK,RUNNING,MULTICAST,IPv4,VIRTUAL> mtu
8232 index 1
inet 127.0.0.1 netmask ff000000
vnic2: flags=1000843<UP,BROADCAST,RUNNING,MULTICAST,IPv4> mtu 1500 index 2
inet 10.1.14.152 netmask ffffffc0 broadcast 10.1.14.191
ether 0:3:ba:d8:41:1f
tajmahal# zlogin zone2 ping 10.1.14.151
10.1.14.151 is alive
tajmahal# zlogin zone1 ping 10.1.14.152
10.1.14.152 is alive
tajmahal# zlogin zone1 ping 10.1.14.129
no answer from 10.1.14.129
tajmahal# ping 10.1.14.129
no answer from 10.1.14.129
tajmahal# arp -a
Net to Media Table: IPv4
Device IP Address Mask Flags Phys Addr
------ -------------------- --------------- ----- ---------------
e1000g0 224.0.0.2 255.255.255.255 01:00:5e:00:00:02
e1000g3 224.0.0.2 255.255.255.255 01:00:5e:00:00:02
e1000g3 mtllab129.East.Sun.COM 255.255.255.255 08:00:20:1a:b7:b3
e1000g0 224.0.0.22 255.255.255.255 01:00:5e:00:00:16
e1000g3 224.0.0.22 255.255.255.255 01:00:5e:00:00:16
e1000g0 tajmahal 255.255.255.255 SP 00:03:ba:d8:41:20
e1000g3 mtllab150.East.Sun.COM 255.255.255.255 SP 00:03:ba:d8:41:1f
e1000g3 224.0.0.0 240.0.0.0 SM 01:00:5e:00:00:00
e1000g0 224.0.0.0 240.0.0.0 SM 01:00:5e:00:00:00
tajmahal#
Kais Belgaied wrote On 08/31/06 14:40,:> Steffen Weiberle wrote:
>
>>
>> I do the following to bring up the VNICs
>>
>> dladm create-vnic -d e1000g3 -i 10.1.14.151 -b 1000 1
>> dladm create-vnic -d e1000g3 -i 10.1.14.152 -b 1000 2
>
>
>
> and what''s the output of ifconfig -a from the global zone?
>
> Kais.
>
> _______________________________________________
> crossbow-discuss mailing list
> crossbow-discuss at opensolaris.org
> http://opensolaris.org/mailman/listinfo/crossbow-discuss
Steffen Weiberle
2006-Aug-31 22:41 UTC
[crossbow-discuss] ?: stacktype: shared (for routing out of the box)
I have verified that I can ping the router before adding the VNICs.
Once in place, the GZ can not ping the router, and the router can not
ping the GZ. I also can not ping between the GZ and a NGZ on the same
subnet.
arp entries are not getting populated, and possibly the entry in the
GZ for the router early on expires.
Steffen
Here it is after a reboot and setting up e1000g3 with an IP address.
One thing I forgot to do was try ping()ing the router before setting
up the VNICs.
Steffen
tajmahal# cat crossbow.sh
#!/bin/sh
ifconfig e1000g3 plumb
ifconfig e1000g3 10.1.14.150 netmask + broadcast + up
dladm create-vnic -d e1000g3 -i 10.1.14.151 -b 1000 1
dladm create-vnic -d e1000g3 -i 10.1.14.152 -b 1000 2
dladm show-vnic
zoneadm -z zone1 boot
zoneadm -z zone2 boot
tajmahal# ./crossbow.sh
Setting netmask of e1000g3 to 255.255.255.192
vnic1 dev: e1000g3 IP: 10.1.14.151
vnic0 dev:
tajmahal# ifconfig -a
lo0: flags=2001000849<UP,LOOPBACK,RUNNING,MULTICAST,IPv4,VIRTUAL> mtu
8232 index 1
inet 127.0.0.1 netmask ff000000
e1000g0: flags=1000843<UP,BROADCAST,RUNNING,MULTICAST,IPv4> mtu 1500
index 2
inet 129.154.53.7 netmask ffffff00 broadcast 129.154.53.255
ether 0:3:ba:d8:41:20
e1000g3: flags=1000843<UP,BROADCAST,RUNNING,MULTICAST,IPv4> mtu 1500
index 3
inet 10.1.14.150 netmask ffffffc0 broadcast 10.1.14.191
ether 0:3:ba:d8:41:1f
tajmahal# zlogin zone1 ifconfig -a
lo0: flags=2001000849<UP,LOOPBACK,RUNNING,MULTICAST,IPv4,VIRTUAL> mtu
8232 index 1
inet 127.0.0.1 netmask ff000000
vnic1: flags=1000843<UP,BROADCAST,RUNNING,MULTICAST,IPv4> mtu 1500 index 2
inet 10.1.14.151 netmask ffffffc0 broadcast 10.1.14.191
ether 0:3:ba:d8:41:1f
tajmahal# zlogin zone2 ifconfig -a
lo0: flags=2001000849<UP,LOOPBACK,RUNNING,MULTICAST,IPv4,VIRTUAL> mtu
8232 index 1
inet 127.0.0.1 netmask ff000000
vnic2: flags=1000843<UP,BROADCAST,RUNNING,MULTICAST,IPv4> mtu 1500 index 2
inet 10.1.14.152 netmask ffffffc0 broadcast 10.1.14.191
ether 0:3:ba:d8:41:1f
tajmahal# zlogin zone2 ping 10.1.14.151
10.1.14.151 is alive
tajmahal# zlogin zone1 ping 10.1.14.152
10.1.14.152 is alive
tajmahal# zlogin zone1 ping 10.1.14.129
no answer from 10.1.14.129
tajmahal# ping 10.1.14.129
no answer from 10.1.14.129
tajmahal# arp -a
Net to Media Table: IPv4
Device IP Address Mask Flags Phys Addr
------ -------------------- --------------- ----- ---------------
e1000g0 224.0.0.2 255.255.255.255 01:00:5e:00:00:02
e1000g3 224.0.0.2 255.255.255.255 01:00:5e:00:00:02
e1000g3 mtllab129.East.Sun.COM 255.255.255.255 08:00:20:1a:b7:b3
e1000g0 224.0.0.22 255.255.255.255 01:00:5e:00:00:16
e1000g3 224.0.0.22 255.255.255.255 01:00:5e:00:00:16
e1000g0 tajmahal 255.255.255.255 SP 00:03:ba:d8:41:20
e1000g3 mtllab150.East.Sun.COM 255.255.255.255 SP 00:03:ba:d8:41:1f
e1000g3 224.0.0.0 240.0.0.0 SM 01:00:5e:00:00:00
e1000g0 224.0.0.0 240.0.0.0 SM 01:00:5e:00:00:00
tajmahal#
Kais Belgaied wrote On 08/31/06 14:40,:> Steffen Weiberle wrote:
>
>>
>> I do the following to bring up the VNICs
>>
>> dladm create-vnic -d e1000g3 -i 10.1.14.151 -b 1000 1
>> dladm create-vnic -d e1000g3 -i 10.1.14.152 -b 1000 2
>
>
>
> and what''s the output of ifconfig -a from the global zone?
>
> Kais.
>
> _______________________________________________
> crossbow-discuss mailing list
> crossbow-discuss at opensolaris.org
> http://opensolaris.org/mailman/listinfo/crossbow-discuss
_______________________________________________
crossbow-discuss mailing list
crossbow-discuss at opensolaris.org
http://opensolaris.org/mailman/listinfo/crossbow-discuss
Nicolas Droux
2006-Sep-01 17:25 UTC
[crossbow-discuss] ?: stacktype: shared (for routing out of the box)
Hi Steffen, Steffen Weiberle wrote:> I have verified that I can ping the router before adding the VNICs. Once > in place, the GZ can not ping the router, and the router can not ping > the GZ. I also can not ping between the GZ and a NGZ on the same subnet.If you want full connectivity between the GZ and the NGZ VNICs, you need to define a VNIC on e1000g3 and use it from the GZ. So here''s what I''d suggest: - configure a test address for e1000g3 instead of the current 10.1.14.150 - create a vnic3 interface, plumb it and configure it with address 10.1.14.150 from the GZ - now you should have connectivity between the GZ and the NGZ through the VNICs. Let me know if that works better for you. The VNICs based on IP addresses have gone through very minimal testing, and will see a significant rewack in the future. Our next code drop will make defining VNICs with their own MAC addresses possible even on NICs which don''t have multiple unicast MAC address support, which would help for cases like this. Nicolas.> > arp entries are not getting populated, and possibly the entry in the GZ > for the router early on expires. > > Steffen > > > Here it is after a reboot and setting up e1000g3 with an IP address. > One thing I forgot to do was try ping()ing the router before setting > up the VNICs. > > Steffen > > tajmahal# cat crossbow.sh > #!/bin/sh > > ifconfig e1000g3 plumb > ifconfig e1000g3 10.1.14.150 netmask + broadcast + up > > dladm create-vnic -d e1000g3 -i 10.1.14.151 -b 1000 1 > dladm create-vnic -d e1000g3 -i 10.1.14.152 -b 1000 2 > dladm show-vnic > > zoneadm -z zone1 boot > zoneadm -z zone2 boot > > tajmahal# ./crossbow.sh > Setting netmask of e1000g3 to 255.255.255.192 > vnic1 dev: e1000g3 IP: 10.1.14.151 > vnic0 dev: > tajmahal# ifconfig -a > lo0: flags=2001000849<UP,LOOPBACK,RUNNING,MULTICAST,IPv4,VIRTUAL> mtu > 8232 index 1 > inet 127.0.0.1 netmask ff000000 > e1000g0: flags=1000843<UP,BROADCAST,RUNNING,MULTICAST,IPv4> mtu 1500 > index 2 > inet 129.154.53.7 netmask ffffff00 broadcast 129.154.53.255 > ether 0:3:ba:d8:41:20 > e1000g3: flags=1000843<UP,BROADCAST,RUNNING,MULTICAST,IPv4> mtu 1500 > index 3 > inet 10.1.14.150 netmask ffffffc0 broadcast 10.1.14.191 > ether 0:3:ba:d8:41:1f > tajmahal# zlogin zone1 ifconfig -a > lo0: flags=2001000849<UP,LOOPBACK,RUNNING,MULTICAST,IPv4,VIRTUAL> mtu > 8232 index 1 > inet 127.0.0.1 netmask ff000000 > vnic1: flags=1000843<UP,BROADCAST,RUNNING,MULTICAST,IPv4> mtu 1500 index 2 > inet 10.1.14.151 netmask ffffffc0 broadcast 10.1.14.191 > ether 0:3:ba:d8:41:1f > tajmahal# zlogin zone2 ifconfig -a > lo0: flags=2001000849<UP,LOOPBACK,RUNNING,MULTICAST,IPv4,VIRTUAL> mtu > 8232 index 1 > inet 127.0.0.1 netmask ff000000 > vnic2: flags=1000843<UP,BROADCAST,RUNNING,MULTICAST,IPv4> mtu 1500 index 2 > inet 10.1.14.152 netmask ffffffc0 broadcast 10.1.14.191 > ether 0:3:ba:d8:41:1f > tajmahal# zlogin zone2 ping 10.1.14.151 > 10.1.14.151 is alive > tajmahal# zlogin zone1 ping 10.1.14.152 > 10.1.14.152 is alive > tajmahal# zlogin zone1 ping 10.1.14.129 > no answer from 10.1.14.129 > tajmahal# ping 10.1.14.129 > no answer from 10.1.14.129 > tajmahal# arp -a > Net to Media Table: IPv4 > Device IP Address Mask Flags Phys Addr > ------ -------------------- --------------- ----- --------------- > e1000g0 224.0.0.2 255.255.255.255 01:00:5e:00:00:02 > e1000g3 224.0.0.2 255.255.255.255 01:00:5e:00:00:02 > e1000g3 mtllab129.East.Sun.COM 255.255.255.255 08:00:20:1a:b7:b3 > e1000g0 224.0.0.22 255.255.255.255 01:00:5e:00:00:16 > e1000g3 224.0.0.22 255.255.255.255 01:00:5e:00:00:16 > e1000g0 tajmahal 255.255.255.255 SP 00:03:ba:d8:41:20 > e1000g3 mtllab150.East.Sun.COM 255.255.255.255 SP 00:03:ba:d8:41:1f > e1000g3 224.0.0.0 240.0.0.0 SM 01:00:5e:00:00:00 > e1000g0 224.0.0.0 240.0.0.0 SM 01:00:5e:00:00:00 > tajmahal# > > > Kais Belgaied wrote On 08/31/06 14:40,: > >> Steffen Weiberle wrote: >> >>> >>> I do the following to bring up the VNICs >>> >>> dladm create-vnic -d e1000g3 -i 10.1.14.151 -b 1000 1 >>> dladm create-vnic -d e1000g3 -i 10.1.14.152 -b 1000 2 >> >> >> >> >> and what''s the output of ifconfig -a from the global zone? >> >> Kais. >> >> _______________________________________________ >> crossbow-discuss mailing list >> crossbow-discuss at opensolaris.org >> http://opensolaris.org/mailman/listinfo/crossbow-discuss > > _______________________________________________ > crossbow-discuss mailing list > crossbow-discuss at opensolaris.org > http://opensolaris.org/mailman/listinfo/crossbow-discuss > _______________________________________________ > crossbow-discuss mailing list > crossbow-discuss at opensolaris.org > http://opensolaris.org/mailman/listinfo/crossbow-discuss-- Nicolas Droux, Solaris Kernel Networking Sun Microsystems, Inc. http://blogs.sun.com/droux
Steffen Weiberle
2006-Sep-01 17:55 UTC
[crossbow-discuss] ?: stacktype: shared (for routing out of the box)
Thanks, Nicolas, I will give this a try. Since my goal is to force inter-zone traffic out of the box, even if the zones are on the same subnet, will this be sufficient and work, or 1. the features to do that are not there yet, 2. need to use different NICs, 3. won''t work if they are on the same subnet, or 4. something else I haven''t thought of? All the other features that come with virtualization are nice, but the short term issue for me is getting inter-zone traffic onto the wire. Reasons include snooping and firewalling, which I know will be addressed in other projects, but there is at least one case where the firewall must be external. Thanks Steffen Nicolas Droux wrote On 09/01/06 13:25,:> Hi Steffen, > > Steffen Weiberle wrote: > >> I have verified that I can ping the router before adding the VNICs. >> Once in place, the GZ can not ping the router, and the router can not >> ping the GZ. I also can not ping between the GZ and a NGZ on the same >> subnet. > > > If you want full connectivity between the GZ and the NGZ VNICs, you need > to define a VNIC on e1000g3 and use it from the GZ. > > So here''s what I''d suggest: > > - configure a test address for e1000g3 instead of the current 10.1.14.150 > - create a vnic3 interface, plumb it and configure it with address > 10.1.14.150 from the GZ > - now you should have connectivity between the GZ and the NGZ through > the VNICs. > > Let me know if that works better for you. > > The VNICs based on IP addresses have gone through very minimal testing, > and will see a significant rewack in the future. Our next code drop will > make defining VNICs with their own MAC addresses possible even on NICs > which don''t have multiple unicast MAC address support, which would help > for cases like this. > > Nicolas. > > > >> >> arp entries are not getting populated, and possibly the entry in the >> GZ for the router early on expires. >> >> Steffen >> >> >> Here it is after a reboot and setting up e1000g3 with an IP address. >> One thing I forgot to do was try ping()ing the router before setting >> up the VNICs. >> >> Steffen >> >> tajmahal# cat crossbow.sh >> #!/bin/sh >> >> ifconfig e1000g3 plumb >> ifconfig e1000g3 10.1.14.150 netmask + broadcast + up >> >> dladm create-vnic -d e1000g3 -i 10.1.14.151 -b 1000 1 >> dladm create-vnic -d e1000g3 -i 10.1.14.152 -b 1000 2 >> dladm show-vnic >> >> zoneadm -z zone1 boot >> zoneadm -z zone2 boot >> >> tajmahal# ./crossbow.sh >> Setting netmask of e1000g3 to 255.255.255.192 >> vnic1 dev: e1000g3 IP: 10.1.14.151 >> vnic0 dev: >> tajmahal# ifconfig -a >> lo0: flags=2001000849<UP,LOOPBACK,RUNNING,MULTICAST,IPv4,VIRTUAL> mtu >> 8232 index 1 >> inet 127.0.0.1 netmask ff000000 >> e1000g0: flags=1000843<UP,BROADCAST,RUNNING,MULTICAST,IPv4> mtu 1500 >> index 2 >> inet 129.154.53.7 netmask ffffff00 broadcast 129.154.53.255 >> ether 0:3:ba:d8:41:20 >> e1000g3: flags=1000843<UP,BROADCAST,RUNNING,MULTICAST,IPv4> mtu 1500 >> index 3 >> inet 10.1.14.150 netmask ffffffc0 broadcast 10.1.14.191 >> ether 0:3:ba:d8:41:1f >> tajmahal# zlogin zone1 ifconfig -a >> lo0: flags=2001000849<UP,LOOPBACK,RUNNING,MULTICAST,IPv4,VIRTUAL> mtu >> 8232 index 1 >> inet 127.0.0.1 netmask ff000000 >> vnic1: flags=1000843<UP,BROADCAST,RUNNING,MULTICAST,IPv4> mtu 1500 >> index 2 >> inet 10.1.14.151 netmask ffffffc0 broadcast 10.1.14.191 >> ether 0:3:ba:d8:41:1f >> tajmahal# zlogin zone2 ifconfig -a >> lo0: flags=2001000849<UP,LOOPBACK,RUNNING,MULTICAST,IPv4,VIRTUAL> mtu >> 8232 index 1 >> inet 127.0.0.1 netmask ff000000 >> vnic2: flags=1000843<UP,BROADCAST,RUNNING,MULTICAST,IPv4> mtu 1500 >> index 2 >> inet 10.1.14.152 netmask ffffffc0 broadcast 10.1.14.191 >> ether 0:3:ba:d8:41:1f >> tajmahal# zlogin zone2 ping 10.1.14.151 >> 10.1.14.151 is alive >> tajmahal# zlogin zone1 ping 10.1.14.152 >> 10.1.14.152 is alive >> tajmahal# zlogin zone1 ping 10.1.14.129 >> no answer from 10.1.14.129 >> tajmahal# ping 10.1.14.129 >> no answer from 10.1.14.129 >> tajmahal# arp -a >> Net to Media Table: IPv4 >> Device IP Address Mask Flags Phys Addr >> ------ -------------------- --------------- ----- --------------- >> e1000g0 224.0.0.2 255.255.255.255 01:00:5e:00:00:02 >> e1000g3 224.0.0.2 255.255.255.255 01:00:5e:00:00:02 >> e1000g3 mtllab129.East.Sun.COM 255.255.255.255 08:00:20:1a:b7:b3 >> e1000g0 224.0.0.22 255.255.255.255 01:00:5e:00:00:16 >> e1000g3 224.0.0.22 255.255.255.255 01:00:5e:00:00:16 >> e1000g0 tajmahal 255.255.255.255 SP 00:03:ba:d8:41:20 >> e1000g3 mtllab150.East.Sun.COM 255.255.255.255 SP 00:03:ba:d8:41:1f >> e1000g3 224.0.0.0 240.0.0.0 SM 01:00:5e:00:00:00 >> e1000g0 224.0.0.0 240.0.0.0 SM 01:00:5e:00:00:00 >> tajmahal# >> >> >> Kais Belgaied wrote On 08/31/06 14:40,: >> >>> Steffen Weiberle wrote: >>> >>>> >>>> I do the following to bring up the VNICs >>>> >>>> dladm create-vnic -d e1000g3 -i 10.1.14.151 -b 1000 1 >>>> dladm create-vnic -d e1000g3 -i 10.1.14.152 -b 1000 2 >>> >>> >>> >>> >>> >>> and what''s the output of ifconfig -a from the global zone? >>> >>> Kais. >>> >>> _______________________________________________ >>> crossbow-discuss mailing list >>> crossbow-discuss at opensolaris.org >>> http://opensolaris.org/mailman/listinfo/crossbow-discuss >> >> >> _______________________________________________ >> crossbow-discuss mailing list >> crossbow-discuss at opensolaris.org >> http://opensolaris.org/mailman/listinfo/crossbow-discuss >> _______________________________________________ >> crossbow-discuss mailing list >> crossbow-discuss at opensolaris.org >> http://opensolaris.org/mailman/listinfo/crossbow-discuss > >
Erik Nordmark
2006-Sep-01 21:56 UTC
[crossbow-discuss] Re: ?: stacktype: shared (for routing out of the box)
> Thanks, Nicolas, I will give this a try. Since my goal is to force > inter-zone traffic out of the box, even if the zones are on the same > subnet, will this be sufficient and work, or > > 1. the features to do that are not there yet, > > 2. need to use different NICs, > > 3. won''t work if they are on the same subnet, or > > 4. something else I haven''t thought of? > > All the other features that come with virtualization are nice, but the > short term issue for me is getting inter-zone traffic onto the wire. > Reasons include snooping and firewalling, which I know will be > addressed in other projects, but there is at least one case where the > firewall must be external.Why do you need to have the zones on the same subnet? What I know works is this (at least when using MAC address based VNICs - I haven''t tried with IP address based VNICs.) You use different IP subnets for the zones that need to go via the firewall. Each zone has a default router in its subnet. Thus when the zones try to communicate with each other they will send packets to their firewall. Those packets will go out on the wire. If you are going to use the same subnet number, and you are not going to use different VLANs, then you would have to use different physical NICs. But in this case the zones would ARP for each other, and the packets would go out on the wire but the Ethernet switch/bridge would send them to the port on which is the other NIC. Thus unless your firewall is in your Ethernet switch it wouldn''t help. Erik This message posted from opensolaris.org
Nicolas Droux
2006-Sep-02 00:00 UTC
[crossbow-discuss] ?: stacktype: shared (for routing out of the box)
Hi Steffen, Steffen Weiberle wrote:> Thanks, Nicolas, I will give this a try. Since my goal is to force > inter-zone traffic out of the box, even if the zones are on the same > subnet, will this be sufficient and work, orIt should allow the zones to communicate to the rest of the network.> > 1. the features to do that are not there yet, > > 2. need to use different NICs, > > 3. won''t work if they are on the same subnet, or > > 4. something else I haven''t thought of?If it still doesn''t work, it''s most likely due to a problem with the IP-based VNICs, which were not fully tested and will undergo major changes in the future. The ideal, for now, would be to use a bge interface which will allow you to configure VNICs with their own MAC address. Our next release will make that possible for e1000g NICs as well. I fixed the remaining problems with VNICs just last week to enable the scenario you are interested in, i.e. communication between zones using VNICs, as well as communication to the outside of the box from these VNICs. Nicolas.> > All the other features that come with virtualization are nice, but the > short term issue for me is getting inter-zone traffic onto the wire. > Reasons include snooping and firewalling, which I know will be addressed > in other projects, but there is at least one case where the firewall > must be external. > > Thanks > Steffen > > Nicolas Droux wrote On 09/01/06 13:25,: > >> Hi Steffen, >> >> Steffen Weiberle wrote: >> >>> I have verified that I can ping the router before adding the VNICs. >>> Once in place, the GZ can not ping the router, and the router can not >>> ping the GZ. I also can not ping between the GZ and a NGZ on the same >>> subnet. >> >> >> >> If you want full connectivity between the GZ and the NGZ VNICs, you >> need to define a VNIC on e1000g3 and use it from the GZ. >> >> So here''s what I''d suggest: >> >> - configure a test address for e1000g3 instead of the current 10.1.14.150 >> - create a vnic3 interface, plumb it and configure it with address >> 10.1.14.150 from the GZ >> - now you should have connectivity between the GZ and the NGZ through >> the VNICs. >> >> Let me know if that works better for you. >> >> The VNICs based on IP addresses have gone through very minimal >> testing, and will see a significant rewack in the future. Our next >> code drop will make defining VNICs with their own MAC addresses >> possible even on NICs which don''t have multiple unicast MAC address >> support, which would help for cases like this. >> >> Nicolas. >> >> >> >>> >>> arp entries are not getting populated, and possibly the entry in the >>> GZ for the router early on expires. >>> >>> Steffen >>> >>> >>> Here it is after a reboot and setting up e1000g3 with an IP address. >>> One thing I forgot to do was try ping()ing the router before setting >>> up the VNICs. >>> >>> Steffen >>> >>> tajmahal# cat crossbow.sh >>> #!/bin/sh >>> >>> ifconfig e1000g3 plumb >>> ifconfig e1000g3 10.1.14.150 netmask + broadcast + up >>> >>> dladm create-vnic -d e1000g3 -i 10.1.14.151 -b 1000 1 >>> dladm create-vnic -d e1000g3 -i 10.1.14.152 -b 1000 2 >>> dladm show-vnic >>> >>> zoneadm -z zone1 boot >>> zoneadm -z zone2 boot >>> >>> tajmahal# ./crossbow.sh >>> Setting netmask of e1000g3 to 255.255.255.192 >>> vnic1 dev: e1000g3 IP: 10.1.14.151 >>> vnic0 dev: >>> tajmahal# ifconfig -a >>> lo0: flags=2001000849<UP,LOOPBACK,RUNNING,MULTICAST,IPv4,VIRTUAL> mtu >>> 8232 index 1 >>> inet 127.0.0.1 netmask ff000000 >>> e1000g0: flags=1000843<UP,BROADCAST,RUNNING,MULTICAST,IPv4> mtu 1500 >>> index 2 >>> inet 129.154.53.7 netmask ffffff00 broadcast 129.154.53.255 >>> ether 0:3:ba:d8:41:20 >>> e1000g3: flags=1000843<UP,BROADCAST,RUNNING,MULTICAST,IPv4> mtu 1500 >>> index 3 >>> inet 10.1.14.150 netmask ffffffc0 broadcast 10.1.14.191 >>> ether 0:3:ba:d8:41:1f >>> tajmahal# zlogin zone1 ifconfig -a >>> lo0: flags=2001000849<UP,LOOPBACK,RUNNING,MULTICAST,IPv4,VIRTUAL> mtu >>> 8232 index 1 >>> inet 127.0.0.1 netmask ff000000 >>> vnic1: flags=1000843<UP,BROADCAST,RUNNING,MULTICAST,IPv4> mtu 1500 >>> index 2 >>> inet 10.1.14.151 netmask ffffffc0 broadcast 10.1.14.191 >>> ether 0:3:ba:d8:41:1f >>> tajmahal# zlogin zone2 ifconfig -a >>> lo0: flags=2001000849<UP,LOOPBACK,RUNNING,MULTICAST,IPv4,VIRTUAL> mtu >>> 8232 index 1 >>> inet 127.0.0.1 netmask ff000000 >>> vnic2: flags=1000843<UP,BROADCAST,RUNNING,MULTICAST,IPv4> mtu 1500 >>> index 2 >>> inet 10.1.14.152 netmask ffffffc0 broadcast 10.1.14.191 >>> ether 0:3:ba:d8:41:1f >>> tajmahal# zlogin zone2 ping 10.1.14.151 >>> 10.1.14.151 is alive >>> tajmahal# zlogin zone1 ping 10.1.14.152 >>> 10.1.14.152 is alive >>> tajmahal# zlogin zone1 ping 10.1.14.129 >>> no answer from 10.1.14.129 >>> tajmahal# ping 10.1.14.129 >>> no answer from 10.1.14.129 >>> tajmahal# arp -a >>> Net to Media Table: IPv4 >>> Device IP Address Mask Flags Phys Addr >>> ------ -------------------- --------------- ----- --------------- >>> e1000g0 224.0.0.2 255.255.255.255 01:00:5e:00:00:02 >>> e1000g3 224.0.0.2 255.255.255.255 01:00:5e:00:00:02 >>> e1000g3 mtllab129.East.Sun.COM 255.255.255.255 08:00:20:1a:b7:b3 >>> e1000g0 224.0.0.22 255.255.255.255 01:00:5e:00:00:16 >>> e1000g3 224.0.0.22 255.255.255.255 01:00:5e:00:00:16 >>> e1000g0 tajmahal 255.255.255.255 SP 00:03:ba:d8:41:20 >>> e1000g3 mtllab150.East.Sun.COM 255.255.255.255 SP 00:03:ba:d8:41:1f >>> e1000g3 224.0.0.0 240.0.0.0 SM 01:00:5e:00:00:00 >>> e1000g0 224.0.0.0 240.0.0.0 SM 01:00:5e:00:00:00 >>> tajmahal# >>> >>> >>> Kais Belgaied wrote On 08/31/06 14:40,: >>> >>>> Steffen Weiberle wrote: >>>> >>>>> >>>>> I do the following to bring up the VNICs >>>>> >>>>> dladm create-vnic -d e1000g3 -i 10.1.14.151 -b 1000 1 >>>>> dladm create-vnic -d e1000g3 -i 10.1.14.152 -b 1000 2 >>>> >>>> >>>> >>>> >>>> >>>> >>>> and what''s the output of ifconfig -a from the global zone? >>>> >>>> Kais. >>>> >>>> _______________________________________________ >>>> crossbow-discuss mailing list >>>> crossbow-discuss at opensolaris.org >>>> http://opensolaris.org/mailman/listinfo/crossbow-discuss >>> >>> >>> >>> _______________________________________________ >>> crossbow-discuss mailing list >>> crossbow-discuss at opensolaris.org >>> http://opensolaris.org/mailman/listinfo/crossbow-discuss >>> _______________________________________________ >>> crossbow-discuss mailing list >>> crossbow-discuss at opensolaris.org >>> http://opensolaris.org/mailman/listinfo/crossbow-discuss >> >> >> > _______________________________________________ > crossbow-discuss mailing list > crossbow-discuss at opensolaris.org > http://opensolaris.org/mailman/listinfo/crossbow-discuss-- Nicolas Droux, Solaris Kernel Networking Sun Microsystems, Inc. http://blogs.sun.com/droux
Steffen Weiberle
2006-Sep-02 14:57 UTC
[crossbow-discuss] Re: ?: stacktype: shared (for routing out of the box)
Erik Nordmark wrote On 09/01/06 17:56,:>>Thanks, Nicolas, I will give this a try. Since my goal is to force >>inter-zone traffic out of the box, even if the zones are on the same >>subnet, will this be sufficient and work, or >> >>1. the features to do that are not there yet, >> >>2. need to use different NICs, >> >>3. won''t work if they are on the same subnet, or >> >>4. something else I haven''t thought of? >> >>All the other features that come with virtualization are nice, but the >>short term issue for me is getting inter-zone traffic onto the wire. >>Reasons include snooping and firewalling, which I know will be >>addressed in other projects, but there is at least one case where the >>firewall must be external. > > > Why do you need to have the zones on the same subnet?1. I am able to test with only one, besides the office network (OK, not a really good reason :) ) 2. This is how at least some customers do multiple tiers, especially on internal networks. Seriously. I am trying to simulate one customer''s configuration that has been deployed with the understanding that the current networking setup would send traffic out of the box. Ouch!> > What I know works is this (at least when using MAC address based VNICs - I haven''t tried with IP address based VNICs.) > You use different IP subnets for the zones that need to go via the firewall. Each zone has a default router in its subnet. > Thus when the zones try to communicate with each other they will send packets to their firewall. Those packets will go out on the wire. > > If you are going to use the same subnet number, and you are not going to use different VLANs, then you would have to use different physical NICs. But in this case the zones would ARP for each other, and the packets would go out on the wire but the Ethernet switch/bridge would send them to the port on which is the other NIC. Thus unless your firewall is in your Ethernet switch it wouldn''t help.Some good points. This shows the need for some best practices and setting of expectation of what virtual NICs will and will not be able to provide. Thanks Steffen> > Erik > > > This message posted from opensolaris.org > _______________________________________________ > crossbow-discuss mailing list > crossbow-discuss at opensolaris.org > http://opensolaris.org/mailman/listinfo/crossbow-discuss
Steffen Weiberle
2006-Sep-02 14:58 UTC
[crossbow-discuss] ?: stacktype: shared (for routing out of the box)
Nicolas Droux wrote On 09/01/06 20:00,:> Hi Steffen, > > Steffen Weiberle wrote: > >> Thanks, Nicolas, I will give this a try. Since my goal is to force >> inter-zone traffic out of the box, even if the zones are on the same >> subnet, will this be sufficient and work, or > > It should allow the zones to communicate to the rest of the network. > >> 1. the features to do that are not there yet, >> >> 2. need to use different NICs, >> >> 3. won''t work if they are on the same subnet, or >> >> 4. something else I haven''t thought of? > > If it still doesn''t work, it''s most likely due to a problem with the > IP-based VNICs, which were not fully tested and will undergo major > changes in the future. > > The ideal, for now, would be to use a bge interface which will allow you > to configure VNICs with their own MAC address. Our next release will > make that possible for e1000g NICs as well. > > I fixed the remaining problems with VNICs just last week to enable the > scenario you are interested in, i.e. communication between zones using > VNICs, as well as communication to the outside of the box from these VNICs.Thanks. I am definitely going to have to find a system with a bge interface in the meantime! Thanks Steffen> > Nicolas. > >> >> All the other features that come with virtualization are nice, but the >> short term issue for me is getting inter-zone traffic onto the wire. >> Reasons include snooping and firewalling, which I know will be >> addressed in other projects, but there is at least one case where the >> firewall must be external. >> >> Thanks >> Steffen >> >> Nicolas Droux wrote On 09/01/06 13:25,: >> >>> Hi Steffen, >>> >>> Steffen Weiberle wrote: >>> >>>> I have verified that I can ping the router before adding the VNICs. >>>> Once in place, the GZ can not ping the router, and the router can >>>> not ping the GZ. I also can not ping between the GZ and a NGZ on the >>>> same subnet. >>> >>> >>> >>> >>> If you want full connectivity between the GZ and the NGZ VNICs, you >>> need to define a VNIC on e1000g3 and use it from the GZ. >>> >>> So here''s what I''d suggest: >>> >>> - configure a test address for e1000g3 instead of the current >>> 10.1.14.150 >>> - create a vnic3 interface, plumb it and configure it with address >>> 10.1.14.150 from the GZ >>> - now you should have connectivity between the GZ and the NGZ through >>> the VNICs. >>> >>> Let me know if that works better for you. >>> >>> The VNICs based on IP addresses have gone through very minimal >>> testing, and will see a significant rewack in the future. Our next >>> code drop will make defining VNICs with their own MAC addresses >>> possible even on NICs which don''t have multiple unicast MAC address >>> support, which would help for cases like this. >>> >>> Nicolas. >>> >>> >>> >>>> >>>> arp entries are not getting populated, and possibly the entry in the >>>> GZ for the router early on expires. >>>> >>>> Steffen >>>> >>>> >>>> Here it is after a reboot and setting up e1000g3 with an IP address. >>>> One thing I forgot to do was try ping()ing the router before setting >>>> up the VNICs. >>>> >>>> Steffen >>>> >>>> tajmahal# cat crossbow.sh >>>> #!/bin/sh >>>> >>>> ifconfig e1000g3 plumb >>>> ifconfig e1000g3 10.1.14.150 netmask + broadcast + up >>>> >>>> dladm create-vnic -d e1000g3 -i 10.1.14.151 -b 1000 1 >>>> dladm create-vnic -d e1000g3 -i 10.1.14.152 -b 1000 2 >>>> dladm show-vnic >>>> >>>> zoneadm -z zone1 boot >>>> zoneadm -z zone2 boot >>>> >>>> tajmahal# ./crossbow.sh >>>> Setting netmask of e1000g3 to 255.255.255.192 >>>> vnic1 dev: e1000g3 IP: 10.1.14.151 >>>> vnic0 dev: >>>> tajmahal# ifconfig -a >>>> lo0: flags=2001000849<UP,LOOPBACK,RUNNING,MULTICAST,IPv4,VIRTUAL> mtu >>>> 8232 index 1 >>>> inet 127.0.0.1 netmask ff000000 >>>> e1000g0: flags=1000843<UP,BROADCAST,RUNNING,MULTICAST,IPv4> mtu 1500 >>>> index 2 >>>> inet 129.154.53.7 netmask ffffff00 broadcast 129.154.53.255 >>>> ether 0:3:ba:d8:41:20 >>>> e1000g3: flags=1000843<UP,BROADCAST,RUNNING,MULTICAST,IPv4> mtu 1500 >>>> index 3 >>>> inet 10.1.14.150 netmask ffffffc0 broadcast 10.1.14.191 >>>> ether 0:3:ba:d8:41:1f >>>> tajmahal# zlogin zone1 ifconfig -a >>>> lo0: flags=2001000849<UP,LOOPBACK,RUNNING,MULTICAST,IPv4,VIRTUAL> mtu >>>> 8232 index 1 >>>> inet 127.0.0.1 netmask ff000000 >>>> vnic1: flags=1000843<UP,BROADCAST,RUNNING,MULTICAST,IPv4> mtu 1500 >>>> index 2 >>>> inet 10.1.14.151 netmask ffffffc0 broadcast 10.1.14.191 >>>> ether 0:3:ba:d8:41:1f >>>> tajmahal# zlogin zone2 ifconfig -a >>>> lo0: flags=2001000849<UP,LOOPBACK,RUNNING,MULTICAST,IPv4,VIRTUAL> mtu >>>> 8232 index 1 >>>> inet 127.0.0.1 netmask ff000000 >>>> vnic2: flags=1000843<UP,BROADCAST,RUNNING,MULTICAST,IPv4> mtu 1500 >>>> index 2 >>>> inet 10.1.14.152 netmask ffffffc0 broadcast 10.1.14.191 >>>> ether 0:3:ba:d8:41:1f >>>> tajmahal# zlogin zone2 ping 10.1.14.151 >>>> 10.1.14.151 is alive >>>> tajmahal# zlogin zone1 ping 10.1.14.152 >>>> 10.1.14.152 is alive >>>> tajmahal# zlogin zone1 ping 10.1.14.129 >>>> no answer from 10.1.14.129 >>>> tajmahal# ping 10.1.14.129 >>>> no answer from 10.1.14.129 >>>> tajmahal# arp -a >>>> Net to Media Table: IPv4 >>>> Device IP Address Mask Flags Phys Addr >>>> ------ -------------------- --------------- ----- --------------- >>>> e1000g0 224.0.0.2 255.255.255.255 01:00:5e:00:00:02 >>>> e1000g3 224.0.0.2 255.255.255.255 01:00:5e:00:00:02 >>>> e1000g3 mtllab129.East.Sun.COM 255.255.255.255 08:00:20:1a:b7:b3 >>>> e1000g0 224.0.0.22 255.255.255.255 01:00:5e:00:00:16 >>>> e1000g3 224.0.0.22 255.255.255.255 01:00:5e:00:00:16 >>>> e1000g0 tajmahal 255.255.255.255 SP 00:03:ba:d8:41:20 >>>> e1000g3 mtllab150.East.Sun.COM 255.255.255.255 SP 00:03:ba:d8:41:1f >>>> e1000g3 224.0.0.0 240.0.0.0 SM 01:00:5e:00:00:00 >>>> e1000g0 224.0.0.0 240.0.0.0 SM 01:00:5e:00:00:00 >>>> tajmahal# >>>> >>>> >>>> Kais Belgaied wrote On 08/31/06 14:40,: >>>> >>>>> Steffen Weiberle wrote: >>>>> >>>>>> >>>>>> I do the following to bring up the VNICs >>>>>> >>>>>> dladm create-vnic -d e1000g3 -i 10.1.14.151 -b 1000 1 >>>>>> dladm create-vnic -d e1000g3 -i 10.1.14.152 -b 1000 2 >>>>> >>>>> >>>>> >>>>> >>>>> >>>>> >>>>> >>>>> and what''s the output of ifconfig -a from the global zone? >>>>> >>>>> Kais. >>>>> >>>>> _______________________________________________ >>>>> crossbow-discuss mailing list >>>>> crossbow-discuss at opensolaris.org >>>>> http://opensolaris.org/mailman/listinfo/crossbow-discuss >>>> >>>> >>>> >>>> >>>> _______________________________________________ >>>> crossbow-discuss mailing list >>>> crossbow-discuss at opensolaris.org >>>> http://opensolaris.org/mailman/listinfo/crossbow-discuss >>>> _______________________________________________ >>>> crossbow-discuss mailing list >>>> crossbow-discuss at opensolaris.org >>>> http://opensolaris.org/mailman/listinfo/crossbow-discuss >>> >>> >>> >>> >> _______________________________________________ >> crossbow-discuss mailing list >> crossbow-discuss at opensolaris.org >> http://opensolaris.org/mailman/listinfo/crossbow-discuss > >