Skip to content

Commit 97d2e47

Browse files
committed
updates
1 parent 1832f0c commit 97d2e47

File tree

3 files changed

+9
-54
lines changed

3 files changed

+9
-54
lines changed

content/cumulus-linux-516/Layer-1-and-Switch-Ports/802.1X-Interfaces.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -435,10 +435,10 @@ Edit the `/etc/hostapd.conf` file to set the `eap_send_identity` option to 0, th
435435
Enabling or disabling dynamic VLAN assignment restarts `hostapd`, which forces existing, authorized users to reauthenticate.
436436
{{%/notice%}}
437437

438-
## Dynamic VRF Assignments
438+
## Dynamic VRF Assignment
439439

440440
{{%notice note%}}
441-
Tx squelch control is a Beta feature.
441+
Dynamic VRF assignment is a Beta feature.
442442
{{%/notice%}}
443443

444444
Dynamic VRF assignment on 802.1X enables layer 3 ports to be authenticated and assigned to VRFs dynamically. When you enable 802.1x on an interface, the switch blocks all traffic except supplicant EAPOL messages. When RADIUS authenticates a supplicant, Radius includes a <span class="a-tooltip">[VSA](## "Vendor Specific Attribute")</span> that contains the VRF. The `hostapd` service parses this VSA, performs some validation and assigns the interface to the VRF.

content/cumulus-linux-516/Network-Virtualization/Ethernet-Virtual-Private-Network-EVPN/_index.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -27,8 +27,11 @@ Cumulus Linux fully supports EVPN as the control plane for VXLAN, including for
2727
- IPv6 tenant routing.
2828
- <span class="a-tooltip">[ECMP](## "Equal Cost Multi Path")</span> for overlay networks on NVIDIA Spectrum-A1 ASICs. ECMP occurs in the overlay when there are multiple next hops.
2929
- Head end replication is on by default.
30-
- EVPN VXLAN over an IPv6 underlay on switches with Spectrum-2 and later (Beta). The network fabric supports either an IPv4 or IPv6 underlay network but not both at the same time. MLAG, MAC mobility, and interoperability with an IPv4-based VTEP are not supported.
31-
30+
- EVPN VXLAN over an IPv6 underlay on switches with Spectrum-2 and later. The network fabric supports either an IPv4 or IPv6 underlay network but not both at the same time. MLAG, MAC mobility, and interoperability with an IPv4-based VTEP are not supported.
31+
{{%notice note%}}
32+
EVPN VXLAN over an IPv6 underlay is a Beta feature.
33+
{{%/notice%}}
34+
3235
Cumulus Linux supports the EVPN address family with both <span class="a-tooltip">[eBGP](## "external BGP")</span> and <span class="a-tooltip">[iBGP](## "internal BGP")</span> peering. If you configure underlay routing with eBGP, you can use the same eBGP session to carry EVPN routes. In a typical 2-tier Clos network where the leafs are VTEPs, if you use eBGP sessions between the leafs and spines for underlay routing, the same sessions exchange EVPN routes. The spine switches act as *route forwarders* and do not install any forwarding state as they are not VTEPs. When the switch exchanges EVPN routes over iBGP peering, you can use OSPF as the IGP or resolve next hops using iBGP.
3336

3437
{{%notice note%}}

content/cumulus-linux-516/System-Configuration/Access-Control-Lists/Access-Control-List-Configuration.md

Lines changed: 2 additions & 50 deletions
Original file line numberDiff line numberDiff line change
@@ -1309,11 +1309,9 @@ Cumulus Linux supports ACL matches based on inner packet headers inside encapsul
13091309
- You cannot match on both inner and outer packet headers in the same ACL.
13101310
- You cannot combine a VLAN match with inner packet matches.
13111311
- Inner packet matches support hardware forwarded packets only.
1312+
- You can configure matches on inner packet headers with NVUE commmands only.
13121313
{{%/notice%}}
13131314
1314-
{{< tabs "TabID1309 ">}}
1315-
{{< tab "NVUE Commands ">}}
1316-
13171315
You can use the following inner packet matching options:
13181316
13191317
| Option | Description|
@@ -1340,28 +1338,6 @@ cumulus@switch:~$ nv set interface swp1 acl example3 inbound
13401338
cumulus@switch:~$ nv config apply
13411339
```
13421340
1343-
{{< /tab >}}
1344-
{{< tab "iptables rule ">}}
1345-
1346-
Create a rules file in the `/etc/cumulus/acl/policy.d` directory and add a rule under `[iptables]`. The following example creates an ACL permit rule for inbound packets on swp1 that matches the inner header DSCP value 10, source IP address 10.10.10.10, destination IP address 20.20.20.20, UDP source port 1000, and UDP destination port 2000.
1347-
1348-
```
1349-
cumulus@switch:~$ sudo nano /etc/cumulus/acl/policy.d/10-inner-header.rules
1350-
[iptables]
1351-
## ACL example3 in dir inbound on interface swp1 ##
1352-
# rule-id #10: #
1353-
-t mangle -A PREROUTING -i swp1 -m comment --comment rule_id:10,acl_name:example3,dir:inbound,interface_id:swp1 -s 10.10.10.10 -d 20.20.20.20 -p udp --sport 1000 --dport 2000 -m dscp --dscp 10 -m mark --mark 100 -j ACCEPT
1354-
```
1355-
1356-
Apply the rule:
1357-
1358-
```
1359-
cumulus@switch:~$ sudo cl-acltool -i
1360-
```
1361-
1362-
{{< /tab >}}
1363-
{{< /tabs >}}
1364-
13651341
{{%notice note%}}
13661342
With inner IP matches configured, any IPv4 or IPv6 `deny all` or `permit all` ACL rule must include an inner IP match (Source IP ANY, Destination IP ANY, or both). If the rule does not include an inner IP match, the switch interprets it as an outer rule, and does not evaluate the inner match. For Example:
13671343
@@ -1381,11 +1357,9 @@ Cumulus Linux supports ACL rule matches based on the packet offset.
13811357
- You can configure offset matches only for ACL type ipv4 and ipv6.
13821358
- The Spectrum1 switch does not support matches based on the packet offset.
13831359
- Matches based on the packet offset support hardware forwarded packets only.
1360+
- You can configure matches based on the packet offset with NVUE commmands only.
13841361
{{%/notice%}}
13851362
1386-
{{< tabs "TabID1368 ">}}
1387-
{{< tab "NVUE Commands">}}
1388-
13891363
You can use the following packet offset matching options:
13901364
13911365
| Option | Description|
@@ -1425,28 +1399,6 @@ cumulus@switch:~$ nv config apply
14251399
- An offset match in the egress direction might not work if matched data is overwritten.
14261400
{{%/notice%}}
14271401
1428-
{{< /tab >}}
1429-
{{< tab "iptables rule ">}}
1430-
1431-
Create a rules file in the `/etc/cumulus/acl/policy.d` directory and add a rule under `[iptables]`. The following example creates an ACL permit rule for inbound packets on swp1 that matches the first bytes of inner ipv4 header as 0x64.
1432-
1433-
```
1434-
cumulus@switch:~$ sudo nano /etc/cumulus/acl/policy.d/10-offset-header.rules
1435-
[iptables]
1436-
## ACL OFFSET in dir inbound on interface swp1 ##
1437-
# rule-id #10: #
1438-
-t mangle -A PREROUTING -i swp1 -m comment --comment rule_id:10,acl_name:OFFSET,dir:inbound,interface_id:swp1 -m u32 --u32 "0x00010022 & 0xFF00 = 0x1200 && 0x00010036 & 0xFFFF = 0xabcd" -j ACCEPT
1439-
```
1440-
1441-
Apply the rule:
1442-
1443-
```
1444-
cumulus@switch:~$ sudo cl-acltool -i
1445-
```
1446-
1447-
{{< /tab >}}
1448-
{{< /tabs >}}
1449-
14501402
## Example Configuration
14511403
14521404
The following example shows how Cumulus Linux applies several different rules.

0 commit comments

Comments
 (0)