You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
When using the same tunnel ACL on both DP local and DP remote (via stack interface) ports, tunnelled traffic from the remote interface does not reach the tunnel egress interface.
This selects the tunnelled traffic (table0), and then egresses it out port sw1/99 after removing the vlan tag.
But, in the failing case failing case (both ports have acls_in), the rules in sw1 have significant differences (I've removed some rules from the output):
When using the same tunnel ACL on both DP local and DP remote (via stack interface) ports, tunnelled traffic from the remote interface does not reach the tunnel egress interface.
Using a network configuration like the following
with the following faucet.yaml against 2 OVS bridge instances:
Injecting L2 flooded UDP traffic on sw1/1, this traffic gets tunnelled to sw1/99, as expected.
But, injecting the same UDP stream on sw3/1, this traffic does not egress via sw1/99.
But, by removing the 'acls_in' stanza from sw1/1, this allows the ingress UDP traffic on sw3/1 to be tunnelled to sw1/99 correctly.
Looking at sw1, in the working case (when executed with just the tunnel ACL applied to sw3/1), then I observer the following rules in sw1:
This selects the tunnelled traffic (table0), and then egresses it out port sw1/99 after removing the vlan tag.
But, in the failing case failing case (both ports have acls_in), the rules in sw1 have significant differences (I've removed some rules from the output):
It appears that, in the failing case, the tunnel interception / de-encapsulation rules are not present.
The text was updated successfully, but these errors were encountered: