You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/cumulus-linux-516/Layer-1-and-Switch-Ports/802.1X-Interfaces.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -435,10 +435,10 @@ Edit the `/etc/hostapd.conf` file to set the `eap_send_identity` option to 0, th
435
435
Enabling or disabling dynamic VLAN assignment restarts `hostapd`, which forces existing, authorized users to reauthenticate.
436
436
{{%/notice%}}
437
437
438
-
## Dynamic VRF Assignments
438
+
## Dynamic VRF Assignment
439
439
440
440
{{%notice note%}}
441
-
Tx squelch control is a Beta feature.
441
+
Dynamic VRF assignment is a Beta feature.
442
442
{{%/notice%}}
443
443
444
444
Dynamic VRF assignment on 802.1X enables layer 3 ports to be authenticated and assigned to VRFs dynamically. When you enable 802.1x on an interface, the switch blocks all traffic except supplicant EAPOL messages. When RADIUS authenticates a supplicant, Radius includes a <spanclass="a-tooltip">[VSA](##"Vendor Specific Attribute")</span> that contains the VRF. The `hostapd` service parses this VSA, performs some validation and assigns the interface to the VRF.
Copy file name to clipboardExpand all lines: content/cumulus-linux-516/Network-Virtualization/Ethernet-Virtual-Private-Network-EVPN/_index.md
+5-2Lines changed: 5 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,8 +27,11 @@ Cumulus Linux fully supports EVPN as the control plane for VXLAN, including for
27
27
- IPv6 tenant routing.
28
28
- <spanclass="a-tooltip">[ECMP](##"Equal Cost Multi Path")</span> for overlay networks on NVIDIA Spectrum-A1 ASICs. ECMP occurs in the overlay when there are multiple next hops.
29
29
- Head end replication is on by default.
30
-
- EVPN VXLAN over an IPv6 underlay on switches with Spectrum-2 and later (Beta). The network fabric supports either an IPv4 or IPv6 underlay network but not both at the same time. MLAG, MAC mobility, and interoperability with an IPv4-based VTEP are not supported.
31
-
30
+
- EVPN VXLAN over an IPv6 underlay on switches with Spectrum-2 and later. The network fabric supports either an IPv4 or IPv6 underlay network but not both at the same time. MLAG, MAC mobility, and interoperability with an IPv4-based VTEP are not supported.
31
+
{{%notice note%}}
32
+
EVPN VXLAN over an IPv6 underlay is a Beta feature.
33
+
{{%/notice%}}
34
+
32
35
Cumulus Linux supports the EVPN address family with both <spanclass="a-tooltip">[eBGP](##"external BGP")</span> and <spanclass="a-tooltip">[iBGP](##"internal BGP")</span> peering. If you configure underlay routing with eBGP, you can use the same eBGP session to carry EVPN routes. In a typical 2-tier Clos network where the leafs are VTEPs, if you use eBGP sessions between the leafs and spines for underlay routing, the same sessions exchange EVPN routes. The spine switches act as *route forwarders* and do not install any forwarding state as they are not VTEPs. When the switch exchanges EVPN routes over iBGP peering, you can use OSPF as the IGP or resolve next hops using iBGP.
Create a rules file in the `/etc/cumulus/acl/policy.d` directory and add a rule under `[iptables]`. The following example creates an ACL permit rule for inbound packets on swp1 that matches the inner header DSCP value 10, source IP address 10.10.10.10, destination IP address 20.20.20.20, UDP source port 1000, and UDP destination port 2000.
With inner IP matches configured, any IPv4 or IPv6 `deny all` or `permit all` ACL rule must include an inner IP match (Source IP ANY, Destination IP ANY, or both). If the rule does not include an inner IP match, the switch interprets it as an outer rule, and does not evaluate the inner match. For Example:
1367
1343
@@ -1381,11 +1357,9 @@ Cumulus Linux supports ACL rule matches based on the packet offset.
1381
1357
- You can configure offset matches only for ACL type ipv4 and ipv6.
1382
1358
- The Spectrum1 switch does not support matches based on the packet offset.
1383
1359
- Matches based on the packet offset support hardware forwarded packets only.
1360
+
- You can configure matches based on the packet offset with NVUE commmands only.
1384
1361
{{%/notice%}}
1385
1362
1386
-
{{< tabs "TabID1368 ">}}
1387
-
{{< tab "NVUE Commands">}}
1388
-
1389
1363
You can use the following packet offset matching options:
- An offset match in the egress direction might not work if matched data is overwritten.
1426
1400
{{%/notice%}}
1427
1401
1428
-
{{< /tab >}}
1429
-
{{< tab "iptables rule ">}}
1430
-
1431
-
Create a rules file in the `/etc/cumulus/acl/policy.d` directory and add a rule under `[iptables]`. The following example creates an ACL permit rule for inbound packets on swp1 that matches the first bytes of inner ipv4 header as 0x64.
0 commit comments