]> git.proxmox.com Git - pve-docs.git/blame - pve-network.adoc
network: override device names: suggest running update-initramfs
[pve-docs.git] / pve-network.adoc
CommitLineData
80c0adcb 1[[sysadmin_network_configuration]]
0bcd1f7f
DM
2Network Configuration
3---------------------
5f09af76
DM
4ifdef::wiki[]
5:pve-toplevel:
6endif::wiki[]
7
6f151d25
AL
8{pve} is using the Linux network stack. This provides a lot of flexibility on
9how to set up the network on the {pve} nodes. The configuration can be done
10either via the GUI, or by manually editing the file `/etc/network/interfaces`,
11which contains the whole network configuration. The `interfaces(5)` manual
12page contains the complete format description. All {pve} tools try hard to keep
13direct user modifications, but using the GUI is still preferable, because it
05213009 14protects you from errors.
0bcd1f7f 15
0500f140
SH
16A Linux bridge interface (commonly called 'vmbrX') is needed to connect guests
17to the underlying physical network. It can be thought of as a virtual switch
18which the guests and physical interfaces are connected to. This section provides
19some examples on how the network can be set up to accomodate different use cases
20like redundancy with a xref:sysadmin_network_bond['bond'],
6f151d25
AL
21xref:sysadmin_network_vlan['vlans'] or
22xref:sysadmin_network_routed['routed'] and
23xref:sysadmin_network_masquerading['NAT'] setups.
24
25The xref:chapter_pvesdn[Software Defined Network] is an option for more complex
26virtual networks in {pve} clusters.
27
c15cb60b 28WARNING: It's discouraged to use the traditional Debian tools `ifup` and `ifdown`
a5604bb4
TL
29if unsure, as they have some pitfalls like interupting all guest traffic on
30`ifdown vmbrX` but not reconnecting those guest again when doing `ifup` on the
31same bridge later.
32
52e23c35
TL
33Apply Network Changes
34~~~~~~~~~~~~~~~~~~~~~
35
36{pve} does not write changes directly to `/etc/network/interfaces`. Instead, we
37write into a temporary file called `/etc/network/interfaces.new`, this way you
38can do many related changes at once. This also allows to ensure your changes
39are correct before applying, as a wrong network configuration may render a node
40inaccessible.
41
4faa6445
TL
42Live-Reload Network with ifupdown2
43^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
52e23c35 44
4faa6445
TL
45With the recommended 'ifupdown2' package (default for new installations since
46{pve} 7.0), it is possible to apply network configuration changes without a
47reboot. If you change the network configuration via the GUI, you can click the
48'Apply Configuration' button. This will move changes from the staging
49`interfaces.new` file to `/etc/network/interfaces` and apply them live.
52e23c35 50
4faa6445
TL
51If you made manual changes directly to the `/etc/network/interfaces` file, you
52can apply them by running `ifreload -a`
52e23c35 53
4faa6445
TL
54NOTE: If you installed {pve} on top of Debian, or upgraded to {pve} 7.0 from an
55older {pve} installation, make sure 'ifupdown2' is installed: `apt install
56ifupdown2`
52e23c35 57
4faa6445
TL
58Reboot Node to Apply
59^^^^^^^^^^^^^^^^^^^^
52e23c35 60
4faa6445
TL
61Another way to apply a new network configuration is to reboot the node.
62In that case the systemd service `pvenetcommit` will activate the staging
63`interfaces.new` file before the `networking` service will apply that
64configuration.
0bcd1f7f 65
0bcd1f7f
DM
66Naming Conventions
67~~~~~~~~~~~~~~~~~~
68
69We currently use the following naming conventions for device names:
70
96c02618 71* Ethernet devices: `en*`, systemd network interface names. This naming scheme is
05213009 72 used for new {pve} installations since version 5.0.
7a0d4784 73
96c02618 74* Ethernet devices: `eth[N]`, where 0 ≤ N (`eth0`, `eth1`, ...) This naming
05213009
EK
75scheme is used for {pve} hosts which were installed before the 5.0
76release. When upgrading to 5.0, the names are kept as-is.
0bcd1f7f 77
0500f140
SH
78* Bridge names: Commonly `vmbr[N]`, where 0 ≤ N ≤ 4094 (`vmbr0` - `vmbr4094`),
79but you can use any alphanumeric string that starts with a character and is at
80most 10 characters long.
0bcd1f7f 81
96c02618 82* Bonds: `bond[N]`, where 0 ≤ N (`bond0`, `bond1`, ...)
0bcd1f7f
DM
83
84* VLANs: Simply add the VLAN number to the device name,
7a0d4784 85 separated by a period (`eno1.50`, `bond1.30`)
0bcd1f7f
DM
86
87This makes it easier to debug networks problems, because the device
05213009 88name implies the device type.
cc3cb912 89
f9a6aa0f 90[[systemd_network_interface_names]]
7a0d4784
WL
91Systemd Network Interface Names
92^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
93
96c02618
FW
94Systemd defines a versioned naming scheme for network device names. The
95scheme uses the two-character prefix `en` for Ethernet network devices. The
96next characters depends on the device driver, device location and other
97attributes. Some possible patterns are:
7a0d4784 98
96c02618 99* `o<index>[n<phys_port_name>|d<dev_port>]` — devices on board
7a0d4784 100
96c02618 101* `s<slot>[f<function>][n<phys_port_name>|d<dev_port>]` — devices by hotplug id
7a0d4784 102
96c02618
FW
103* `[P<domain>]p<bus>s<slot>[f<function>][n<phys_port_name>|d<dev_port>]` —
104devices by bus id
7a0d4784 105
96c02618 106* `x<MAC>` — devices by MAC address
7a0d4784 107
96c02618 108Some examples for the most common patterns are:
7a0d4784 109
96c02618 110* `eno1` — is the first on-board NIC
7a0d4784 111
96c02618 112* `enp3s0f1` — is function 1 of the NIC on PCI bus 3, slot 0
7a0d4784 113
96c02618
FW
114For a full list of possible device name patterns, see the
115https://manpages.debian.org/stable/systemd/systemd.net-naming-scheme.7.en.html[
116systemd.net-naming-scheme(7) manpage].
117
118A new version of systemd may define a new version of the network device naming
119scheme, which it then uses by default. Consequently, updating to a newer
120systemd version, for example during a major {pve} upgrade, can change the names
121of network devices and require adjusting the network configuration. To avoid
122name changes due to a new version of the naming scheme, you can manually pin a
123particular naming scheme version (see
124xref:network_pin_naming_scheme_version[below]).
125
126However, even with a pinned naming scheme version, network device names can
127still change due to kernel or driver updates. In order to avoid name changes
128for a particular network device altogether, you can manually override its name
129using a link file (see xref:network_override_device_names[below]).
130
131For more information on network interface names, see
132https://systemd.io/PREDICTABLE_INTERFACE_NAMES/[Predictable Network Interface
133Names].
134
135[[network_pin_naming_scheme_version]]
136Pinning a specific naming scheme version
137^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
138
139You can pin a specific version of the naming scheme for network devices by
140adding the `net.naming-scheme=<version>` parameter to the
141xref:sysboot_edit_kernel_cmdline[kernel command line]. For a list of naming
142scheme versions, see the
143https://manpages.debian.org/stable/systemd/systemd.net-naming-scheme.7.en.html[
144systemd.net-naming-scheme(7) manpage].
145
146For example, to pin the version `v252`, which is the latest naming scheme
147version for a fresh {pve} 8.0 installation, add the following kernel
148command-line parameter:
149
150----
151net.naming-scheme=v252
152----
153
154See also xref:sysboot_edit_kernel_cmdline[this section] on editing the kernel
155command line. You need to reboot for the changes to take effect.
156
157[[network_override_device_names]]
158Overriding network device names
159^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
160
161You can manually assign a name to a particular network device using a custom
162https://manpages.debian.org/stable/udev/systemd.link.5.en.html[systemd.link
163file]. This overrides the name that would be assigned according to the latest
164network device naming scheme. This way, you can avoid naming changes due to
165kernel updates, driver updates or newer versions of the naming scheme.
166
167Custom link files should be placed in `/etc/systemd/network/` and named
168`<n>-<id>.link`, where `n` is a priority smaller than `99` and `id` is some
169identifier. A link file has two sections: `[Match]` determines which interfaces
170the file will apply to; `[Link]` determines how these interfaces should be
171configured, including their naming.
172
173To assign a name to a particular network device, you need a way to uniquely and
174permanently identify that device in the `[Match]` section. One possibility is
175to match the device's MAC address using the `MACAddress` option, as it is
11a062af 176unlikely to change.
96c02618 177
11a062af
FW
178The `[Match]` section should also contain a `Type` option to make sure it only
179matches the expected physical interface, and not bridge/bond/VLAN interfaces
180with the same MAC address. In most setups, `Type` should be set to `ether` to
181match only Ethernet devices, but some setups may require other choices. See the
182https://manpages.debian.org/stable/udev/systemd.link.5.en.html[systemd.link(5)
183manpage] for more details.
184
185Then, you can assign a name using the `Name` option in the `[Link]` section.
186
0563b1e9
FW
187Link files are copied to the `initramfs`, so it is recommended to refresh the
188`initramfs` after adding, modifying, or removing a link file:
189
190----
191# update-initramfs -u -k all
192----
193
11a062af
FW
194For example, to assign the name `enwan0` to the Ethernet device with MAC
195address `aa:bb:cc:dd:ee:ff`, create a file
196`/etc/systemd/network/10-enwan0.link` with the following contents:
96c02618
FW
197
198----
199[Match]
200MACAddress=aa:bb:cc:dd:ee:ff
11a062af 201Type=ether
96c02618
FW
202
203[Link]
204Name=enwan0
205----
206
0563b1e9
FW
207Do not forget to adjust `/etc/network/interfaces` to use the new name, and
208refresh your `initramfs` as described above. You need to reboot the node for
209the change to take effect.
96c02618
FW
210
211NOTE: It is recommended to assign a name starting with `en` or `eth` so that
212{pve} recognizes the interface as a physical network device which can then be
213configured via the GUI. Also, you should ensure that the name will not clash
214with other interface names in the future. One possibility is to assign a name
215that does not match any name pattern that systemd uses for network interfaces
216(xref:systemd_network_interface_names[see above]), such as `enwan0` in the
217example above.
218
219For more information on link files, see the
220https://manpages.debian.org/stable/udev/systemd.link.5.en.html[systemd.link(5)
221manpage].
cc3cb912 222
05213009
EK
223Choosing a network configuration
224~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
225
a22d7c24 226Depending on your current network organization and your resources you can
05213009
EK
227choose either a bridged, routed, or masquerading networking setup.
228
229{pve} server in a private LAN, using an external gateway to reach the internet
230^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
231
a22d7c24 232The *Bridged* model makes the most sense in this case, and this is also
05213009 233the default mode on new {pve} installations.
a22d7c24
SR
234Each of your Guest system will have a virtual interface attached to the
235{pve} bridge. This is similar in effect to having the Guest network card
05213009
EK
236directly connected to a new switch on your LAN, the {pve} host playing the role
237of the switch.
238
239{pve} server at hosting provider, with public IP ranges for Guests
240^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
241
242For this setup, you can use either a *Bridged* or *Routed* model, depending on
243what your provider allows.
244
245{pve} server at hosting provider, with a single public IP address
246^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
247
248In that case the only way to get outgoing network accesses for your guest
a22d7c24 249systems is to use *Masquerading*. For incoming network access to your guests,
05213009
EK
250you will need to configure *Port Forwarding*.
251
252For further flexibility, you can configure
253VLANs (IEEE 802.1q) and network bonding, also known as "link
254aggregation". That way it is possible to build complex and flexible
255virtual networks.
7a0d4784 256
0bcd1f7f
DM
257Default Configuration using a Bridge
258~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
259
50f88938 260[thumbnail="default-network-setup-bridge.svg"]
05213009 261Bridges are like physical network switches implemented in software.
e2280bf7
TL
262All virtual guests can share a single bridge, or you can create multiple
263bridges to separate network domains. Each host can have up to 4094 bridges.
05213009 264
0bcd1f7f 265The installation program creates a single bridge named `vmbr0`, which
04e8476d
EK
266is connected to the first Ethernet card. The corresponding
267configuration in `/etc/network/interfaces` might look like this:
0bcd1f7f
DM
268
269----
270auto lo
271iface lo inet loopback
272
7a0d4784 273iface eno1 inet manual
0bcd1f7f
DM
274
275auto vmbr0
276iface vmbr0 inet static
33349b9f 277 address 192.168.10.2/24
0bcd1f7f 278 gateway 192.168.10.1
7a39aabd
AL
279 bridge-ports eno1
280 bridge-stp off
281 bridge-fd 0
0bcd1f7f
DM
282----
283
284Virtual machines behave as if they were directly connected to the
285physical network. The network, in turn, sees each virtual machine as
286having its own MAC, even though there is only one network cable
287connecting all of these VMs to the network.
288
6f151d25 289[[sysadmin_network_routed]]
0bcd1f7f
DM
290Routed Configuration
291~~~~~~~~~~~~~~~~~~~~
292
293Most hosting providers do not support the above setup. For security
294reasons, they disable networking as soon as they detect multiple MAC
295addresses on a single interface.
296
67c9747f
TL
297TIP: Some providers allow you to register additional MACs through their
298management interface. This avoids the problem, but can be clumsy to
0bcd1f7f
DM
299configure because you need to register a MAC for each of your VMs.
300
8c1189b6 301You can avoid the problem by ``routing'' all traffic via a single
0bcd1f7f
DM
302interface. This makes sure that all network packets use the same MAC
303address.
304
50f88938 305[thumbnail="default-network-setup-routed.svg"]
05213009 306A common scenario is that you have a public IP (assume `198.51.100.5`
0bcd1f7f 307for this example), and an additional IP block for your VMs
e4682f58 308(`203.0.113.16/28`). We recommend the following setup for such
0bcd1f7f
DM
309situations:
310
311----
312auto lo
313iface lo inet loopback
314
e4682f58
DW
315auto eno0
316iface eno0 inet static
317 address 198.51.100.5/29
05213009 318 gateway 198.51.100.1
1ed90852 319 post-up echo 1 > /proc/sys/net/ipv4/ip_forward
d7a0fa2a 320 post-up echo 1 > /proc/sys/net/ipv4/conf/eno0/proxy_arp
0bcd1f7f
DM
321
322
323auto vmbr0
324iface vmbr0 inet static
e4682f58 325 address 203.0.113.17/28
7a39aabd
AL
326 bridge-ports none
327 bridge-stp off
328 bridge-fd 0
0bcd1f7f
DM
329----
330
331
6f151d25 332[[sysadmin_network_masquerading]]
8c1189b6
FG
333Masquerading (NAT) with `iptables`
334~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
0bcd1f7f 335
05213009
EK
336Masquerading allows guests having only a private IP address to access the
337network by using the host IP address for outgoing traffic. Each outgoing
338packet is rewritten by `iptables` to appear as originating from the host,
339and responses are rewritten accordingly to be routed to the original sender.
0bcd1f7f
DM
340
341----
342auto lo
343iface lo inet loopback
344
05213009 345auto eno1
470d4313 346#real IP address
7a0d4784 347iface eno1 inet static
33349b9f 348 address 198.51.100.5/24
05213009 349 gateway 198.51.100.1
0bcd1f7f
DM
350
351auto vmbr0
352#private sub network
353iface vmbr0 inet static
33349b9f 354 address 10.10.10.1/24
7a39aabd
AL
355 bridge-ports none
356 bridge-stp off
357 bridge-fd 0
0bcd1f7f 358
22d52440 359 post-up echo 1 > /proc/sys/net/ipv4/ip_forward
7a0d4784
WL
360 post-up iptables -t nat -A POSTROUTING -s '10.10.10.0/24' -o eno1 -j MASQUERADE
361 post-down iptables -t nat -D POSTROUTING -s '10.10.10.0/24' -o eno1 -j MASQUERADE
0bcd1f7f
DM
362----
363
22d52440
OB
364NOTE: In some masquerade setups with firewall enabled, conntrack zones might be
365needed for outgoing connections. Otherwise the firewall could block outgoing
366connections since they will prefer the `POSTROUTING` of the VM bridge (and not
367`MASQUERADE`).
368
369Adding these lines in the `/etc/network/interfaces` can fix this problem:
370
371----
372post-up iptables -t raw -I PREROUTING -i fwbr+ -j CT --zone 1
373post-down iptables -t raw -D PREROUTING -i fwbr+ -j CT --zone 1
374----
375
376For more information about this, refer to the following links:
217f7cd8 377
22d52440 378https://commons.wikimedia.org/wiki/File:Netfilter-packet-flow.svg[Netfilter Packet Flow]
217f7cd8 379
22d52440 380https://lwn.net/Articles/370152/[Patch on netdev-list introducing conntrack zones]
217f7cd8 381
eec63198 382https://web.archive.org/web/20220610151210/https://blog.lobraun.de/2019/05/19/prox/[Blog post with a good explanation by using TRACE in the raw table]
22d52440
OB
383
384
6f151d25 385[[sysadmin_network_bond]]
b4c06a93
WL
386Linux Bond
387~~~~~~~~~~
388
3eafe338
WL
389Bonding (also called NIC teaming or Link Aggregation) is a technique
390for binding multiple NIC's to a single network device. It is possible
391to achieve different goals, like make the network fault-tolerant,
392increase the performance or both together.
393
394High-speed hardware like Fibre Channel and the associated switching
395hardware can be quite expensive. By doing link aggregation, two NICs
396can appear as one logical interface, resulting in double speed. This
397is a native Linux kernel feature that is supported by most
398switches. If your nodes have multiple Ethernet ports, you can
399distribute your points of failure by running network cables to
400different switches and the bonded connection will failover to one
401cable or the other in case of network trouble.
402
403Aggregated links can improve live-migration delays and improve the
404speed of replication of data between Proxmox VE Cluster nodes.
b4c06a93
WL
405
406There are 7 modes for bonding:
407
408* *Round-robin (balance-rr):* Transmit network packets in sequential
409order from the first available network interface (NIC) slave through
410the last. This mode provides load balancing and fault tolerance.
411
412* *Active-backup (active-backup):* Only one NIC slave in the bond is
413active. A different slave becomes active if, and only if, the active
414slave fails. The single logical bonded interface's MAC address is
415externally visible on only one NIC (port) to avoid distortion in the
416network switch. This mode provides fault tolerance.
417
418* *XOR (balance-xor):* Transmit network packets based on [(source MAC
419address XOR'd with destination MAC address) modulo NIC slave
420count]. This selects the same NIC slave for each destination MAC
421address. This mode provides load balancing and fault tolerance.
422
423* *Broadcast (broadcast):* Transmit network packets on all slave
424network interfaces. This mode provides fault tolerance.
425
426* *IEEE 802.3ad Dynamic link aggregation (802.3ad)(LACP):* Creates
427aggregation groups that share the same speed and duplex
428settings. Utilizes all slave network interfaces in the active
429aggregator group according to the 802.3ad specification.
430
431* *Adaptive transmit load balancing (balance-tlb):* Linux bonding
432driver mode that does not require any special network-switch
433support. The outgoing network packet traffic is distributed according
434to the current load (computed relative to the speed) on each network
435interface slave. Incoming traffic is received by one currently
436designated slave network interface. If this receiving slave fails,
437another slave takes over the MAC address of the failed receiving
438slave.
439
e60ce90c 440* *Adaptive load balancing (balance-alb):* Includes balance-tlb plus receive
b4c06a93
WL
441load balancing (rlb) for IPV4 traffic, and does not require any
442special network switch support. The receive load balancing is achieved
443by ARP negotiation. The bonding driver intercepts the ARP Replies sent
444by the local system on their way out and overwrites the source
445hardware address with the unique hardware address of one of the NIC
446slaves in the single logical bonded interface such that different
447network-peers use different MAC addresses for their network packet
448traffic.
449
649098a6 450If your switch support the LACP (IEEE 802.3ad) protocol then we recommend using
a22d7c24 451the corresponding bonding mode (802.3ad). Otherwise you should generally use the
4ab400d1
AL
452active-backup mode.
453
454For the cluster network (Corosync) we recommend configuring it with multiple
455networks. Corosync does not need a bond for network reduncancy as it can switch
456between networks by itself, if one becomes unusable.
b4c06a93 457
cd1de2c2
WL
458The following bond configuration can be used as distributed/shared
459storage network. The benefit would be that you get more speed and the
460network will be fault-tolerant.
461
b4c06a93
WL
462.Example: Use bond with fixed IP address
463----
464auto lo
465iface lo inet loopback
466
7a0d4784 467iface eno1 inet manual
b4c06a93 468
7a0d4784 469iface eno2 inet manual
b4c06a93 470
61b099f5
WL
471iface eno3 inet manual
472
b4c06a93
WL
473auto bond0
474iface bond0 inet static
5f05aad1 475 bond-slaves eno1 eno2
33349b9f 476 address 192.168.1.2/24
7a39aabd
AL
477 bond-miimon 100
478 bond-mode 802.3ad
479 bond-xmit-hash-policy layer2+3
b4c06a93
WL
480
481auto vmbr0
482iface vmbr0 inet static
33349b9f 483 address 10.10.10.2/24
7ea42266 484 gateway 10.10.10.1
61b099f5 485 bridge-ports eno3
7a39aabd
AL
486 bridge-stp off
487 bridge-fd 0
b4c06a93
WL
488
489----
490
cd1de2c2 491
50f88938 492[thumbnail="default-network-setup-bond.svg"]
cd1de2c2
WL
493Another possibility it to use the bond directly as bridge port.
494This can be used to make the guest network fault-tolerant.
495
496.Example: Use a bond as bridge port
b4c06a93
WL
497----
498auto lo
499iface lo inet loopback
500
7a0d4784 501iface eno1 inet manual
b4c06a93 502
7a0d4784 503iface eno2 inet manual
b4c06a93
WL
504
505auto bond0
470d4313 506iface bond0 inet manual
5f05aad1 507 bond-slaves eno1 eno2
7a39aabd
AL
508 bond-miimon 100
509 bond-mode 802.3ad
510 bond-xmit-hash-policy layer2+3
b4c06a93
WL
511
512auto vmbr0
513iface vmbr0 inet static
33349b9f 514 address 10.10.10.2/24
7ea42266 515 gateway 10.10.10.1
7a39aabd
AL
516 bridge-ports bond0
517 bridge-stp off
518 bridge-fd 0
b4c06a93
WL
519
520----
521
61105e42 522
6f151d25 523[[sysadmin_network_vlan]]
94fd8ea5
WL
524VLAN 802.1Q
525~~~~~~~~~~~
526
4d8af129
DM
527A virtual LAN (VLAN) is a broadcast domain that is partitioned and
528isolated in the network at layer two. So it is possible to have
529multiple networks (4096) in a physical network, each independent of
530the other ones.
531
61105e42 532Each VLAN network is identified by a number often called 'tag'.
4d8af129
DM
533Network packages are then 'tagged' to identify which virtual network
534they belong to.
94fd8ea5 535
94fd8ea5 536
4d8af129
DM
537VLAN for Guest Networks
538^^^^^^^^^^^^^^^^^^^^^^^
94fd8ea5 539
4d8af129
DM
540{pve} supports this setup out of the box. You can specify the VLAN tag
541when you create a VM. The VLAN tag is part of the guest network
a22d7c24 542configuration. The networking layer supports different modes to
4d8af129 543implement VLANs, depending on the bridge configuration:
94fd8ea5 544
4d8af129 545* *VLAN awareness on the Linux bridge:*
94fd8ea5 546In this case, each guest's virtual network card is assigned to a VLAN tag,
4d8af129 547which is transparently supported by the Linux bridge.
a22d7c24 548Trunk mode is also possible, but that makes configuration
94fd8ea5
WL
549in the guest necessary.
550
551* *"traditional" VLAN on the Linux bridge:*
552In contrast to the VLAN awareness method, this method is not transparent
553and creates a VLAN device with associated bridge for each VLAN.
a22d7c24
SR
554That is, creating a guest on VLAN 5 for example, would create two
555interfaces eno1.5 and vmbr0v5, which would remain until a reboot occurs.
94fd8ea5 556
4d8af129
DM
557* *Open vSwitch VLAN:*
558This mode uses the OVS VLAN feature.
559
a22d7c24 560* *Guest configured VLAN:*
4d8af129
DM
561VLANs are assigned inside the guest. In this case, the setup is
562completely done inside the guest and can not be influenced from the
563outside. The benefit is that you can use more than one VLAN on a
564single virtual NIC.
565
566
567VLAN on the Host
568^^^^^^^^^^^^^^^^
94fd8ea5 569
4d8af129
DM
570To allow host communication with an isolated network. It is possible
571to apply VLAN tags to any network device (NIC, Bond, Bridge). In
572general, you should configure the VLAN on the interface with the least
94fd8ea5
WL
573abstraction layers between itself and the physical NIC.
574
575For example, in a default configuration where you want to place
576the host management address on a separate VLAN.
577
94fd8ea5 578
038dc7df 579.Example: Use VLAN 5 for the {pve} management IP with traditional Linux bridge
94fd8ea5
WL
580----
581auto lo
582iface lo inet loopback
583
584iface eno1 inet manual
585
586iface eno1.5 inet manual
587
588auto vmbr0v5
589iface vmbr0v5 inet static
33349b9f 590 address 10.10.10.2/24
94fd8ea5 591 gateway 10.10.10.1
7a39aabd
AL
592 bridge-ports eno1.5
593 bridge-stp off
594 bridge-fd 0
94fd8ea5
WL
595
596auto vmbr0
597iface vmbr0 inet manual
7a39aabd
AL
598 bridge-ports eno1
599 bridge-stp off
600 bridge-fd 0
94fd8ea5
WL
601
602----
603
038dc7df
AD
604.Example: Use VLAN 5 for the {pve} management IP with VLAN aware Linux bridge
605----
606auto lo
607iface lo inet loopback
608
609iface eno1 inet manual
610
611
612auto vmbr0.5
613iface vmbr0.5 inet static
33349b9f 614 address 10.10.10.2/24
038dc7df
AD
615 gateway 10.10.10.1
616
617auto vmbr0
618iface vmbr0 inet manual
7a39aabd
AL
619 bridge-ports eno1
620 bridge-stp off
621 bridge-fd 0
622 bridge-vlan-aware yes
a59c283b 623 bridge-vids 2-4094
038dc7df
AD
624----
625
94fd8ea5
WL
626The next example is the same setup but a bond is used to
627make this network fail-safe.
628
038dc7df 629.Example: Use VLAN 5 with bond0 for the {pve} management IP with traditional Linux bridge
94fd8ea5
WL
630----
631auto lo
632iface lo inet loopback
633
634iface eno1 inet manual
635
636iface eno2 inet manual
637
638auto bond0
639iface bond0 inet manual
5f05aad1 640 bond-slaves eno1 eno2
7a39aabd
AL
641 bond-miimon 100
642 bond-mode 802.3ad
643 bond-xmit-hash-policy layer2+3
94fd8ea5
WL
644
645iface bond0.5 inet manual
646
647auto vmbr0v5
648iface vmbr0v5 inet static
33349b9f 649 address 10.10.10.2/24
94fd8ea5 650 gateway 10.10.10.1
7a39aabd
AL
651 bridge-ports bond0.5
652 bridge-stp off
653 bridge-fd 0
94fd8ea5
WL
654
655auto vmbr0
656iface vmbr0 inet manual
7a39aabd
AL
657 bridge-ports bond0
658 bridge-stp off
659 bridge-fd 0
94fd8ea5
WL
660
661----
662
024d3706
SI
663Disabling IPv6 on the Node
664~~~~~~~~~~~~~~~~~~~~~~~~~~
665
666{pve} works correctly in all environments, irrespective of whether IPv6 is
667deployed or not. We recommend leaving all settings at the provided defaults.
668
669Should you still need to disable support for IPv6 on your node, do so by
670creating an appropriate `sysctl.conf (5)` snippet file and setting the proper
671https://www.kernel.org/doc/Documentation/networking/ip-sysctl.txt[sysctls],
672for example adding `/etc/sysctl.d/disable-ipv6.conf` with content:
673
674----
675net.ipv6.conf.all.disable_ipv6 = 1
676net.ipv6.conf.default.disable_ipv6 = 1
677----
678
679This method is preferred to disabling the loading of the IPv6 module on the
680https://www.kernel.org/doc/Documentation/networking/ipv6.rst[kernel commandline].
681
62fd0400
TL
682
683Disabling MAC Learning on a Bridge
684~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
685
686By default, MAC learning is enabled on a bridge to ensure a smooth experience
687with virtual guests and their networks.
688
689But in some environments this can be undesired. Since {pve} 7.3 you can disable
690MAC learning on the bridge by setting the `bridge-disable-mac-learning 1`
691configuration on a bridge in `/etc/network/interfaces', for example:
692
693----
694# ...
695
696auto vmbr0
697iface vmbr0 inet static
698 address 10.10.10.2/24
699 gateway 10.10.10.1
700 bridge-ports ens18
701 bridge-stp off
702 bridge-fd 0
703 bridge-disable-mac-learning 1
704----
705
706Once enabled, {pve} will manually add the configured MAC address from VMs and
707Containers to the bridges forwarding database to ensure that guest can still
708use the network - but only when they are using their actual MAC address.
709
0bcd1f7f
DM
710////
711TODO: explain IPv6 support?
470d4313 712TODO: explain OVS
0bcd1f7f 713////