]> git.proxmox.com Git - pve-docs.git/blame - pve-network.adoc
bump version to 8.2.1
[pve-docs.git] / pve-network.adoc
CommitLineData
80c0adcb 1[[sysadmin_network_configuration]]
0bcd1f7f
DM
2Network Configuration
3---------------------
5f09af76
DM
4ifdef::wiki[]
5:pve-toplevel:
6endif::wiki[]
7
6f151d25
AL
8{pve} is using the Linux network stack. This provides a lot of flexibility on
9how to set up the network on the {pve} nodes. The configuration can be done
10either via the GUI, or by manually editing the file `/etc/network/interfaces`,
11which contains the whole network configuration. The `interfaces(5)` manual
12page contains the complete format description. All {pve} tools try hard to keep
13direct user modifications, but using the GUI is still preferable, because it
05213009 14protects you from errors.
0bcd1f7f 15
0500f140
SH
16A Linux bridge interface (commonly called 'vmbrX') is needed to connect guests
17to the underlying physical network. It can be thought of as a virtual switch
18which the guests and physical interfaces are connected to. This section provides
19some examples on how the network can be set up to accomodate different use cases
20like redundancy with a xref:sysadmin_network_bond['bond'],
6f151d25
AL
21xref:sysadmin_network_vlan['vlans'] or
22xref:sysadmin_network_routed['routed'] and
23xref:sysadmin_network_masquerading['NAT'] setups.
24
25The xref:chapter_pvesdn[Software Defined Network] is an option for more complex
26virtual networks in {pve} clusters.
27
c15cb60b 28WARNING: It's discouraged to use the traditional Debian tools `ifup` and `ifdown`
a5604bb4
TL
29if unsure, as they have some pitfalls like interupting all guest traffic on
30`ifdown vmbrX` but not reconnecting those guest again when doing `ifup` on the
31same bridge later.
32
52e23c35
TL
33Apply Network Changes
34~~~~~~~~~~~~~~~~~~~~~
35
36{pve} does not write changes directly to `/etc/network/interfaces`. Instead, we
37write into a temporary file called `/etc/network/interfaces.new`, this way you
38can do many related changes at once. This also allows to ensure your changes
39are correct before applying, as a wrong network configuration may render a node
40inaccessible.
41
4faa6445
TL
42Live-Reload Network with ifupdown2
43^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
52e23c35 44
4faa6445
TL
45With the recommended 'ifupdown2' package (default for new installations since
46{pve} 7.0), it is possible to apply network configuration changes without a
47reboot. If you change the network configuration via the GUI, you can click the
48'Apply Configuration' button. This will move changes from the staging
49`interfaces.new` file to `/etc/network/interfaces` and apply them live.
52e23c35 50
4faa6445
TL
51If you made manual changes directly to the `/etc/network/interfaces` file, you
52can apply them by running `ifreload -a`
52e23c35 53
4faa6445
TL
54NOTE: If you installed {pve} on top of Debian, or upgraded to {pve} 7.0 from an
55older {pve} installation, make sure 'ifupdown2' is installed: `apt install
56ifupdown2`
52e23c35 57
4faa6445
TL
58Reboot Node to Apply
59^^^^^^^^^^^^^^^^^^^^
52e23c35 60
4faa6445
TL
61Another way to apply a new network configuration is to reboot the node.
62In that case the systemd service `pvenetcommit` will activate the staging
63`interfaces.new` file before the `networking` service will apply that
64configuration.
0bcd1f7f 65
0bcd1f7f
DM
66Naming Conventions
67~~~~~~~~~~~~~~~~~~
68
69We currently use the following naming conventions for device names:
70
96c02618 71* Ethernet devices: `en*`, systemd network interface names. This naming scheme is
05213009 72 used for new {pve} installations since version 5.0.
7a0d4784 73
96c02618 74* Ethernet devices: `eth[N]`, where 0 ≤ N (`eth0`, `eth1`, ...) This naming
05213009
EK
75scheme is used for {pve} hosts which were installed before the 5.0
76release. When upgrading to 5.0, the names are kept as-is.
0bcd1f7f 77
0500f140
SH
78* Bridge names: Commonly `vmbr[N]`, where 0 ≤ N ≤ 4094 (`vmbr0` - `vmbr4094`),
79but you can use any alphanumeric string that starts with a character and is at
80most 10 characters long.
0bcd1f7f 81
96c02618 82* Bonds: `bond[N]`, where 0 ≤ N (`bond0`, `bond1`, ...)
0bcd1f7f
DM
83
84* VLANs: Simply add the VLAN number to the device name,
7a0d4784 85 separated by a period (`eno1.50`, `bond1.30`)
0bcd1f7f
DM
86
87This makes it easier to debug networks problems, because the device
05213009 88name implies the device type.
cc3cb912 89
f9a6aa0f 90[[systemd_network_interface_names]]
7a0d4784
WL
91Systemd Network Interface Names
92^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
93
96c02618
FW
94Systemd defines a versioned naming scheme for network device names. The
95scheme uses the two-character prefix `en` for Ethernet network devices. The
96next characters depends on the device driver, device location and other
97attributes. Some possible patterns are:
7a0d4784 98
96c02618 99* `o<index>[n<phys_port_name>|d<dev_port>]` — devices on board
7a0d4784 100
96c02618 101* `s<slot>[f<function>][n<phys_port_name>|d<dev_port>]` — devices by hotplug id
7a0d4784 102
96c02618
FW
103* `[P<domain>]p<bus>s<slot>[f<function>][n<phys_port_name>|d<dev_port>]` —
104devices by bus id
7a0d4784 105
96c02618 106* `x<MAC>` — devices by MAC address
7a0d4784 107
96c02618 108Some examples for the most common patterns are:
7a0d4784 109
96c02618 110* `eno1` — is the first on-board NIC
7a0d4784 111
96c02618 112* `enp3s0f1` — is function 1 of the NIC on PCI bus 3, slot 0
7a0d4784 113
96c02618
FW
114For a full list of possible device name patterns, see the
115https://manpages.debian.org/stable/systemd/systemd.net-naming-scheme.7.en.html[
116systemd.net-naming-scheme(7) manpage].
117
118A new version of systemd may define a new version of the network device naming
119scheme, which it then uses by default. Consequently, updating to a newer
120systemd version, for example during a major {pve} upgrade, can change the names
121of network devices and require adjusting the network configuration. To avoid
122name changes due to a new version of the naming scheme, you can manually pin a
123particular naming scheme version (see
124xref:network_pin_naming_scheme_version[below]).
125
126However, even with a pinned naming scheme version, network device names can
127still change due to kernel or driver updates. In order to avoid name changes
128for a particular network device altogether, you can manually override its name
129using a link file (see xref:network_override_device_names[below]).
130
131For more information on network interface names, see
132https://systemd.io/PREDICTABLE_INTERFACE_NAMES/[Predictable Network Interface
133Names].
134
135[[network_pin_naming_scheme_version]]
136Pinning a specific naming scheme version
137^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
138
139You can pin a specific version of the naming scheme for network devices by
140adding the `net.naming-scheme=<version>` parameter to the
141xref:sysboot_edit_kernel_cmdline[kernel command line]. For a list of naming
142scheme versions, see the
143https://manpages.debian.org/stable/systemd/systemd.net-naming-scheme.7.en.html[
144systemd.net-naming-scheme(7) manpage].
145
146For example, to pin the version `v252`, which is the latest naming scheme
147version for a fresh {pve} 8.0 installation, add the following kernel
148command-line parameter:
149
150----
151net.naming-scheme=v252
152----
153
154See also xref:sysboot_edit_kernel_cmdline[this section] on editing the kernel
155command line. You need to reboot for the changes to take effect.
156
157[[network_override_device_names]]
158Overriding network device names
159^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
160
161You can manually assign a name to a particular network device using a custom
162https://manpages.debian.org/stable/udev/systemd.link.5.en.html[systemd.link
163file]. This overrides the name that would be assigned according to the latest
164network device naming scheme. This way, you can avoid naming changes due to
165kernel updates, driver updates or newer versions of the naming scheme.
166
167Custom link files should be placed in `/etc/systemd/network/` and named
168`<n>-<id>.link`, where `n` is a priority smaller than `99` and `id` is some
169identifier. A link file has two sections: `[Match]` determines which interfaces
170the file will apply to; `[Link]` determines how these interfaces should be
171configured, including their naming.
172
173To assign a name to a particular network device, you need a way to uniquely and
174permanently identify that device in the `[Match]` section. One possibility is
175to match the device's MAC address using the `MACAddress` option, as it is
176unlikely to change. Then, you can assign a name using the `Name` option in the
177`[Link]` section.
178
179For example, to assign the name `enwan0` to the device with MAC address
180`aa:bb:cc:dd:ee:ff`, create a file `/etc/systemd/network/10-enwan0.link` with
181the following contents:
182
183----
184[Match]
185MACAddress=aa:bb:cc:dd:ee:ff
186
187[Link]
188Name=enwan0
189----
190
191Do not forget to adjust `/etc/network/interfaces` to use the new name.
192You need to reboot the node for the change to take effect.
193
194NOTE: It is recommended to assign a name starting with `en` or `eth` so that
195{pve} recognizes the interface as a physical network device which can then be
196configured via the GUI. Also, you should ensure that the name will not clash
197with other interface names in the future. One possibility is to assign a name
198that does not match any name pattern that systemd uses for network interfaces
199(xref:systemd_network_interface_names[see above]), such as `enwan0` in the
200example above.
201
202For more information on link files, see the
203https://manpages.debian.org/stable/udev/systemd.link.5.en.html[systemd.link(5)
204manpage].
cc3cb912 205
05213009
EK
206Choosing a network configuration
207~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
208
a22d7c24 209Depending on your current network organization and your resources you can
05213009
EK
210choose either a bridged, routed, or masquerading networking setup.
211
212{pve} server in a private LAN, using an external gateway to reach the internet
213^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
214
a22d7c24 215The *Bridged* model makes the most sense in this case, and this is also
05213009 216the default mode on new {pve} installations.
a22d7c24
SR
217Each of your Guest system will have a virtual interface attached to the
218{pve} bridge. This is similar in effect to having the Guest network card
05213009
EK
219directly connected to a new switch on your LAN, the {pve} host playing the role
220of the switch.
221
222{pve} server at hosting provider, with public IP ranges for Guests
223^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
224
225For this setup, you can use either a *Bridged* or *Routed* model, depending on
226what your provider allows.
227
228{pve} server at hosting provider, with a single public IP address
229^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
230
231In that case the only way to get outgoing network accesses for your guest
a22d7c24 232systems is to use *Masquerading*. For incoming network access to your guests,
05213009
EK
233you will need to configure *Port Forwarding*.
234
235For further flexibility, you can configure
236VLANs (IEEE 802.1q) and network bonding, also known as "link
237aggregation". That way it is possible to build complex and flexible
238virtual networks.
7a0d4784 239
0bcd1f7f
DM
240Default Configuration using a Bridge
241~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
242
50f88938 243[thumbnail="default-network-setup-bridge.svg"]
05213009 244Bridges are like physical network switches implemented in software.
e2280bf7
TL
245All virtual guests can share a single bridge, or you can create multiple
246bridges to separate network domains. Each host can have up to 4094 bridges.
05213009 247
0bcd1f7f 248The installation program creates a single bridge named `vmbr0`, which
04e8476d
EK
249is connected to the first Ethernet card. The corresponding
250configuration in `/etc/network/interfaces` might look like this:
0bcd1f7f
DM
251
252----
253auto lo
254iface lo inet loopback
255
7a0d4784 256iface eno1 inet manual
0bcd1f7f
DM
257
258auto vmbr0
259iface vmbr0 inet static
33349b9f 260 address 192.168.10.2/24
0bcd1f7f 261 gateway 192.168.10.1
7a39aabd
AL
262 bridge-ports eno1
263 bridge-stp off
264 bridge-fd 0
0bcd1f7f
DM
265----
266
267Virtual machines behave as if they were directly connected to the
268physical network. The network, in turn, sees each virtual machine as
269having its own MAC, even though there is only one network cable
270connecting all of these VMs to the network.
271
6f151d25 272[[sysadmin_network_routed]]
0bcd1f7f
DM
273Routed Configuration
274~~~~~~~~~~~~~~~~~~~~
275
276Most hosting providers do not support the above setup. For security
277reasons, they disable networking as soon as they detect multiple MAC
278addresses on a single interface.
279
67c9747f
TL
280TIP: Some providers allow you to register additional MACs through their
281management interface. This avoids the problem, but can be clumsy to
0bcd1f7f
DM
282configure because you need to register a MAC for each of your VMs.
283
8c1189b6 284You can avoid the problem by ``routing'' all traffic via a single
0bcd1f7f
DM
285interface. This makes sure that all network packets use the same MAC
286address.
287
50f88938 288[thumbnail="default-network-setup-routed.svg"]
05213009 289A common scenario is that you have a public IP (assume `198.51.100.5`
0bcd1f7f 290for this example), and an additional IP block for your VMs
e4682f58 291(`203.0.113.16/28`). We recommend the following setup for such
0bcd1f7f
DM
292situations:
293
294----
295auto lo
296iface lo inet loopback
297
e4682f58
DW
298auto eno0
299iface eno0 inet static
300 address 198.51.100.5/29
05213009 301 gateway 198.51.100.1
1ed90852 302 post-up echo 1 > /proc/sys/net/ipv4/ip_forward
d7a0fa2a 303 post-up echo 1 > /proc/sys/net/ipv4/conf/eno0/proxy_arp
0bcd1f7f
DM
304
305
306auto vmbr0
307iface vmbr0 inet static
e4682f58 308 address 203.0.113.17/28
7a39aabd
AL
309 bridge-ports none
310 bridge-stp off
311 bridge-fd 0
0bcd1f7f
DM
312----
313
314
6f151d25 315[[sysadmin_network_masquerading]]
8c1189b6
FG
316Masquerading (NAT) with `iptables`
317~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
0bcd1f7f 318
05213009
EK
319Masquerading allows guests having only a private IP address to access the
320network by using the host IP address for outgoing traffic. Each outgoing
321packet is rewritten by `iptables` to appear as originating from the host,
322and responses are rewritten accordingly to be routed to the original sender.
0bcd1f7f
DM
323
324----
325auto lo
326iface lo inet loopback
327
05213009 328auto eno1
470d4313 329#real IP address
7a0d4784 330iface eno1 inet static
33349b9f 331 address 198.51.100.5/24
05213009 332 gateway 198.51.100.1
0bcd1f7f
DM
333
334auto vmbr0
335#private sub network
336iface vmbr0 inet static
33349b9f 337 address 10.10.10.1/24
7a39aabd
AL
338 bridge-ports none
339 bridge-stp off
340 bridge-fd 0
0bcd1f7f 341
22d52440 342 post-up echo 1 > /proc/sys/net/ipv4/ip_forward
7a0d4784
WL
343 post-up iptables -t nat -A POSTROUTING -s '10.10.10.0/24' -o eno1 -j MASQUERADE
344 post-down iptables -t nat -D POSTROUTING -s '10.10.10.0/24' -o eno1 -j MASQUERADE
0bcd1f7f
DM
345----
346
22d52440
OB
347NOTE: In some masquerade setups with firewall enabled, conntrack zones might be
348needed for outgoing connections. Otherwise the firewall could block outgoing
349connections since they will prefer the `POSTROUTING` of the VM bridge (and not
350`MASQUERADE`).
351
352Adding these lines in the `/etc/network/interfaces` can fix this problem:
353
354----
355post-up iptables -t raw -I PREROUTING -i fwbr+ -j CT --zone 1
356post-down iptables -t raw -D PREROUTING -i fwbr+ -j CT --zone 1
357----
358
359For more information about this, refer to the following links:
217f7cd8 360
22d52440 361https://commons.wikimedia.org/wiki/File:Netfilter-packet-flow.svg[Netfilter Packet Flow]
217f7cd8 362
22d52440 363https://lwn.net/Articles/370152/[Patch on netdev-list introducing conntrack zones]
217f7cd8 364
eec63198 365https://web.archive.org/web/20220610151210/https://blog.lobraun.de/2019/05/19/prox/[Blog post with a good explanation by using TRACE in the raw table]
22d52440
OB
366
367
6f151d25 368[[sysadmin_network_bond]]
b4c06a93
WL
369Linux Bond
370~~~~~~~~~~
371
3eafe338
WL
372Bonding (also called NIC teaming or Link Aggregation) is a technique
373for binding multiple NIC's to a single network device. It is possible
374to achieve different goals, like make the network fault-tolerant,
375increase the performance or both together.
376
377High-speed hardware like Fibre Channel and the associated switching
378hardware can be quite expensive. By doing link aggregation, two NICs
379can appear as one logical interface, resulting in double speed. This
380is a native Linux kernel feature that is supported by most
381switches. If your nodes have multiple Ethernet ports, you can
382distribute your points of failure by running network cables to
383different switches and the bonded connection will failover to one
384cable or the other in case of network trouble.
385
386Aggregated links can improve live-migration delays and improve the
387speed of replication of data between Proxmox VE Cluster nodes.
b4c06a93
WL
388
389There are 7 modes for bonding:
390
391* *Round-robin (balance-rr):* Transmit network packets in sequential
392order from the first available network interface (NIC) slave through
393the last. This mode provides load balancing and fault tolerance.
394
395* *Active-backup (active-backup):* Only one NIC slave in the bond is
396active. A different slave becomes active if, and only if, the active
397slave fails. The single logical bonded interface's MAC address is
398externally visible on only one NIC (port) to avoid distortion in the
399network switch. This mode provides fault tolerance.
400
401* *XOR (balance-xor):* Transmit network packets based on [(source MAC
402address XOR'd with destination MAC address) modulo NIC slave
403count]. This selects the same NIC slave for each destination MAC
404address. This mode provides load balancing and fault tolerance.
405
406* *Broadcast (broadcast):* Transmit network packets on all slave
407network interfaces. This mode provides fault tolerance.
408
409* *IEEE 802.3ad Dynamic link aggregation (802.3ad)(LACP):* Creates
410aggregation groups that share the same speed and duplex
411settings. Utilizes all slave network interfaces in the active
412aggregator group according to the 802.3ad specification.
413
414* *Adaptive transmit load balancing (balance-tlb):* Linux bonding
415driver mode that does not require any special network-switch
416support. The outgoing network packet traffic is distributed according
417to the current load (computed relative to the speed) on each network
418interface slave. Incoming traffic is received by one currently
419designated slave network interface. If this receiving slave fails,
420another slave takes over the MAC address of the failed receiving
421slave.
422
e60ce90c 423* *Adaptive load balancing (balance-alb):* Includes balance-tlb plus receive
b4c06a93
WL
424load balancing (rlb) for IPV4 traffic, and does not require any
425special network switch support. The receive load balancing is achieved
426by ARP negotiation. The bonding driver intercepts the ARP Replies sent
427by the local system on their way out and overwrites the source
428hardware address with the unique hardware address of one of the NIC
429slaves in the single logical bonded interface such that different
430network-peers use different MAC addresses for their network packet
431traffic.
432
649098a6 433If your switch support the LACP (IEEE 802.3ad) protocol then we recommend using
a22d7c24 434the corresponding bonding mode (802.3ad). Otherwise you should generally use the
4ab400d1
AL
435active-backup mode.
436
437For the cluster network (Corosync) we recommend configuring it with multiple
438networks. Corosync does not need a bond for network reduncancy as it can switch
439between networks by itself, if one becomes unusable.
b4c06a93 440
cd1de2c2
WL
441The following bond configuration can be used as distributed/shared
442storage network. The benefit would be that you get more speed and the
443network will be fault-tolerant.
444
b4c06a93
WL
445.Example: Use bond with fixed IP address
446----
447auto lo
448iface lo inet loopback
449
7a0d4784 450iface eno1 inet manual
b4c06a93 451
7a0d4784 452iface eno2 inet manual
b4c06a93 453
61b099f5
WL
454iface eno3 inet manual
455
b4c06a93
WL
456auto bond0
457iface bond0 inet static
5f05aad1 458 bond-slaves eno1 eno2
33349b9f 459 address 192.168.1.2/24
7a39aabd
AL
460 bond-miimon 100
461 bond-mode 802.3ad
462 bond-xmit-hash-policy layer2+3
b4c06a93
WL
463
464auto vmbr0
465iface vmbr0 inet static
33349b9f 466 address 10.10.10.2/24
7ea42266 467 gateway 10.10.10.1
61b099f5 468 bridge-ports eno3
7a39aabd
AL
469 bridge-stp off
470 bridge-fd 0
b4c06a93
WL
471
472----
473
cd1de2c2 474
50f88938 475[thumbnail="default-network-setup-bond.svg"]
cd1de2c2
WL
476Another possibility it to use the bond directly as bridge port.
477This can be used to make the guest network fault-tolerant.
478
479.Example: Use a bond as bridge port
b4c06a93
WL
480----
481auto lo
482iface lo inet loopback
483
7a0d4784 484iface eno1 inet manual
b4c06a93 485
7a0d4784 486iface eno2 inet manual
b4c06a93
WL
487
488auto bond0
470d4313 489iface bond0 inet manual
5f05aad1 490 bond-slaves eno1 eno2
7a39aabd
AL
491 bond-miimon 100
492 bond-mode 802.3ad
493 bond-xmit-hash-policy layer2+3
b4c06a93
WL
494
495auto vmbr0
496iface vmbr0 inet static
33349b9f 497 address 10.10.10.2/24
7ea42266 498 gateway 10.10.10.1
7a39aabd
AL
499 bridge-ports bond0
500 bridge-stp off
501 bridge-fd 0
b4c06a93
WL
502
503----
504
61105e42 505
6f151d25 506[[sysadmin_network_vlan]]
94fd8ea5
WL
507VLAN 802.1Q
508~~~~~~~~~~~
509
4d8af129
DM
510A virtual LAN (VLAN) is a broadcast domain that is partitioned and
511isolated in the network at layer two. So it is possible to have
512multiple networks (4096) in a physical network, each independent of
513the other ones.
514
61105e42 515Each VLAN network is identified by a number often called 'tag'.
4d8af129
DM
516Network packages are then 'tagged' to identify which virtual network
517they belong to.
94fd8ea5 518
94fd8ea5 519
4d8af129
DM
520VLAN for Guest Networks
521^^^^^^^^^^^^^^^^^^^^^^^
94fd8ea5 522
4d8af129
DM
523{pve} supports this setup out of the box. You can specify the VLAN tag
524when you create a VM. The VLAN tag is part of the guest network
a22d7c24 525configuration. The networking layer supports different modes to
4d8af129 526implement VLANs, depending on the bridge configuration:
94fd8ea5 527
4d8af129 528* *VLAN awareness on the Linux bridge:*
94fd8ea5 529In this case, each guest's virtual network card is assigned to a VLAN tag,
4d8af129 530which is transparently supported by the Linux bridge.
a22d7c24 531Trunk mode is also possible, but that makes configuration
94fd8ea5
WL
532in the guest necessary.
533
534* *"traditional" VLAN on the Linux bridge:*
535In contrast to the VLAN awareness method, this method is not transparent
536and creates a VLAN device with associated bridge for each VLAN.
a22d7c24
SR
537That is, creating a guest on VLAN 5 for example, would create two
538interfaces eno1.5 and vmbr0v5, which would remain until a reboot occurs.
94fd8ea5 539
4d8af129
DM
540* *Open vSwitch VLAN:*
541This mode uses the OVS VLAN feature.
542
a22d7c24 543* *Guest configured VLAN:*
4d8af129
DM
544VLANs are assigned inside the guest. In this case, the setup is
545completely done inside the guest and can not be influenced from the
546outside. The benefit is that you can use more than one VLAN on a
547single virtual NIC.
548
549
550VLAN on the Host
551^^^^^^^^^^^^^^^^
94fd8ea5 552
4d8af129
DM
553To allow host communication with an isolated network. It is possible
554to apply VLAN tags to any network device (NIC, Bond, Bridge). In
555general, you should configure the VLAN on the interface with the least
94fd8ea5
WL
556abstraction layers between itself and the physical NIC.
557
558For example, in a default configuration where you want to place
559the host management address on a separate VLAN.
560
94fd8ea5 561
038dc7df 562.Example: Use VLAN 5 for the {pve} management IP with traditional Linux bridge
94fd8ea5
WL
563----
564auto lo
565iface lo inet loopback
566
567iface eno1 inet manual
568
569iface eno1.5 inet manual
570
571auto vmbr0v5
572iface vmbr0v5 inet static
33349b9f 573 address 10.10.10.2/24
94fd8ea5 574 gateway 10.10.10.1
7a39aabd
AL
575 bridge-ports eno1.5
576 bridge-stp off
577 bridge-fd 0
94fd8ea5
WL
578
579auto vmbr0
580iface vmbr0 inet manual
7a39aabd
AL
581 bridge-ports eno1
582 bridge-stp off
583 bridge-fd 0
94fd8ea5
WL
584
585----
586
038dc7df
AD
587.Example: Use VLAN 5 for the {pve} management IP with VLAN aware Linux bridge
588----
589auto lo
590iface lo inet loopback
591
592iface eno1 inet manual
593
594
595auto vmbr0.5
596iface vmbr0.5 inet static
33349b9f 597 address 10.10.10.2/24
038dc7df
AD
598 gateway 10.10.10.1
599
600auto vmbr0
601iface vmbr0 inet manual
7a39aabd
AL
602 bridge-ports eno1
603 bridge-stp off
604 bridge-fd 0
605 bridge-vlan-aware yes
a59c283b 606 bridge-vids 2-4094
038dc7df
AD
607----
608
94fd8ea5
WL
609The next example is the same setup but a bond is used to
610make this network fail-safe.
611
038dc7df 612.Example: Use VLAN 5 with bond0 for the {pve} management IP with traditional Linux bridge
94fd8ea5
WL
613----
614auto lo
615iface lo inet loopback
616
617iface eno1 inet manual
618
619iface eno2 inet manual
620
621auto bond0
622iface bond0 inet manual
5f05aad1 623 bond-slaves eno1 eno2
7a39aabd
AL
624 bond-miimon 100
625 bond-mode 802.3ad
626 bond-xmit-hash-policy layer2+3
94fd8ea5
WL
627
628iface bond0.5 inet manual
629
630auto vmbr0v5
631iface vmbr0v5 inet static
33349b9f 632 address 10.10.10.2/24
94fd8ea5 633 gateway 10.10.10.1
7a39aabd
AL
634 bridge-ports bond0.5
635 bridge-stp off
636 bridge-fd 0
94fd8ea5
WL
637
638auto vmbr0
639iface vmbr0 inet manual
7a39aabd
AL
640 bridge-ports bond0
641 bridge-stp off
642 bridge-fd 0
94fd8ea5
WL
643
644----
645
024d3706
SI
646Disabling IPv6 on the Node
647~~~~~~~~~~~~~~~~~~~~~~~~~~
648
649{pve} works correctly in all environments, irrespective of whether IPv6 is
650deployed or not. We recommend leaving all settings at the provided defaults.
651
652Should you still need to disable support for IPv6 on your node, do so by
653creating an appropriate `sysctl.conf (5)` snippet file and setting the proper
654https://www.kernel.org/doc/Documentation/networking/ip-sysctl.txt[sysctls],
655for example adding `/etc/sysctl.d/disable-ipv6.conf` with content:
656
657----
658net.ipv6.conf.all.disable_ipv6 = 1
659net.ipv6.conf.default.disable_ipv6 = 1
660----
661
662This method is preferred to disabling the loading of the IPv6 module on the
663https://www.kernel.org/doc/Documentation/networking/ipv6.rst[kernel commandline].
664
62fd0400
TL
665
666Disabling MAC Learning on a Bridge
667~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
668
669By default, MAC learning is enabled on a bridge to ensure a smooth experience
670with virtual guests and their networks.
671
672But in some environments this can be undesired. Since {pve} 7.3 you can disable
673MAC learning on the bridge by setting the `bridge-disable-mac-learning 1`
674configuration on a bridge in `/etc/network/interfaces', for example:
675
676----
677# ...
678
679auto vmbr0
680iface vmbr0 inet static
681 address 10.10.10.2/24
682 gateway 10.10.10.1
683 bridge-ports ens18
684 bridge-stp off
685 bridge-fd 0
686 bridge-disable-mac-learning 1
687----
688
689Once enabled, {pve} will manually add the configured MAC address from VMs and
690Containers to the bridges forwarding database to ensure that guest can still
691use the network - but only when they are using their actual MAC address.
692
0bcd1f7f
DM
693////
694TODO: explain IPv6 support?
470d4313 695TODO: explain OVS
0bcd1f7f 696////