• About
  • Disclaimer
  • Privacy Policy
  • Contact
Saturday, May 17, 2025
Cyber Defense GO
  • Login
  • Home
  • Cyber Security
  • Artificial Intelligence
  • Machine Learning
  • Data Analysis
  • Computer Networking
  • Disaster Restoration
No Result
View All Result
  • Home
  • Cyber Security
  • Artificial Intelligence
  • Machine Learning
  • Data Analysis
  • Computer Networking
  • Disaster Restoration
No Result
View All Result
Cyber Defense Go
No Result
View All Result
Home Computer Networking

Linux community tunneling through VXLAN or Geneve [closed]

Md Sazzad Hossain by Md Sazzad Hossain
0
Linux community tunneling through VXLAN or Geneve [closed]
585
SHARES
3.2k
VIEWS
Share on FacebookShare on Twitter


I’m attempting to tunnel from a "digital interface" on Machine A to a bodily interface on Machine B. All concerned programs are Linux-based and have bridge instruments, iproute2 and related kernel choices put in. All networks depicted under are /24. I can not change any community settings on C and D, nor can I set up software program on them.

You might also like

[5 Mins Docker] Deploy Nexterm (open-source server administration software program) to Handle Cloud Servers – 51 Safety

Accountable AI vs Generative AI » Community Interview

Report: Monitoring an AI-Pushed Excessive-Pace Ethernet Market in Transformation

environment

Machine A is behind a masquerading NAT however can attain Machine B. Machine B can not attain Machine A. Machine B has a second NIC on a subnet along with Machines C, D (and a few others).

What I plan to realize is to have a brand new community interface on Machine A that’s in the identical subnet as Machines C and D so I can ping them. Ideally a layer 2 tunnel.

Most guides I discovered assume some software program outlined switching, VMs or Kubernetes. Nothing is concerned in my case.

First thought was to create a Wireguard tunnel between Machines A and B and to bridge it to eth1 on Machine B. I have not tried that but since I learn that wireguard is layer 3 solely and thus would not assist bridging.

Subsequent I learn on layer 2 tunneling potentialities: GRE, VXLAN and Geneve.

Since all appear to require that Machines A and B can discuss to one another (= in each instructions), I created a Wireguard community between them. That is working and Machine A and B can ping one another on their wireguard IPs (192.168.66.0/24)

Then (on Machine B), I arrange a bridge interface br0, eliminated the IP from eth1, added eth1 to br0 and configured the IP from eth1 on br0. Pinging from B to C and D nonetheless works.

Then I attempted organising a Geneve tunnel between Machines A and B (utilizing the wireguard interfaces for "distant"), including interface geneve0 on Machine B to br0 and giving geneve0 on Machine A an IPv4 in the identical subnet as br0 on B. I don´t keep in mind the precise instructions however I believe Machine A was capable of ping B (within the 192.168.0.0/24 subnet) however not Machines C and D and B was not capable of ping A (surprisingly).

So I attempted to do the identical with VXLAN as an alternative. Instructions used:

Machine A:

ip hyperlink add vxlan0 sort vxlan id 6666 dstport 4789
ip addr add 192.168.0.210/24 dev vxlan0
ip hyperlink arrange vxlan0
bridge fdb add 00:00:00:00:00:00 dev vxlan0 dst 192.168.66.1

Machine B:

ip hyperlink add vxlan0 sort vxlan id 6666 dstport 4789
ip hyperlink arrange vxlan0
bridge fdb add 00:00:00:00:00:00 dev vxlan0 dst 192.168.66.2
brctl addif br0 vxlan0

At this level, Machine B can nonetheless ping C and D. Machine B also can ping Machine A on 192.168.0.210 (which tells me that the VXLAN appears to be working).
Machine A can ping Machine B on 192.168.0.200. Nevertheless, Machine A CAN NOT ping Machines C and D. Machine B has proxy_arp and ipv4.ip_forward enabled.
Utilizing "tcpdump -i vxlan0" on B I can see the ping requests from A to C however no replies. Nevertheless, the ARP requests are forwarded and the ARP desk on A incorporates the entries with the right IPs and MACs. Utilizing "tcpdump -i eth1", I can see that the ping requests from C don’t make it out to C and D.

Someway bridging the vxlan0 to br0 works however packets aren’t forwarded to eth1 regardless that it’s on the identical bridge as nicely however I can not see what I’m lacking. Why does ARP work however ICMP not?
How would Machine A know that the MAC addresses of C and D are behind B and never another machine that may be a part of the identical VXLAN? Do I would like to inform or ought to it auto-learn (like a change that remembers which MAC addresses are on every port)?

Any thought what I may strive subsequent? Or would there be a better strategy to realize what I need? Thanks!

Tags: ClosedGeneveLinuxNetworktunnelingVXLAN
Previous Post

Step-by-Step Information to Utilizing AI for Skilled Emblem Design

Next Post

Netflix Provides ChatGPT-Powered AI to Cease You From Scrolling Without end

Md Sazzad Hossain

Md Sazzad Hossain

Related Posts

[5 Mins Docker] Deploy Nexterm (open-source server administration software program) to Handle Cloud Servers – 51 Safety
Computer Networking

[5 Mins Docker] Deploy Nexterm (open-source server administration software program) to Handle Cloud Servers – 51 Safety

by Md Sazzad Hossain
May 16, 2025
Accountable AI vs Generative AI » Community Interview
Computer Networking

Accountable AI vs Generative AI » Community Interview

by Md Sazzad Hossain
May 16, 2025
Report: Monitoring an AI-Pushed Excessive-Pace Ethernet Market in Transformation
Computer Networking

Report: Monitoring an AI-Pushed Excessive-Pace Ethernet Market in Transformation

by Md Sazzad Hossain
May 16, 2025
The vCCAP Evoâ„¢ Answer Benefit, Half 2: Financial system & Effectivity
Computer Networking

The vCCAP Evoâ„¢ Answer Benefit, Half 2: Financial system & Effectivity

by Md Sazzad Hossain
May 15, 2025
Sale of BT’s Irish Enterprise Unit Underlines Finish of twentieth Century Telco International Domination Aspirations – IT Connection
Computer Networking

UK Altnets Present Strategic Naivete and Should Consolidate Quickly for Relevance – IT Connection

by Md Sazzad Hossain
May 15, 2025
Next Post
Netflix Provides ChatGPT-Powered AI to Cease You From Scrolling Without end

Netflix Provides ChatGPT-Powered AI to Cease You From Scrolling Without end

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

OFS launches Mayvn AI for Manufacturing

OFS launches Mayvn AI for Manufacturing

February 28, 2025
How Google Secure Searching’s Enhanced Safety Mode retains you protected on-line

How Google Secure Searching’s Enhanced Safety Mode retains you protected on-line

February 12, 2025

Categories

  • Artificial Intelligence
  • Computer Networking
  • Cyber Security
  • Data Analysis
  • Disaster Restoration
  • Machine Learning

CyberDefenseGo

Welcome to CyberDefenseGo. We are a passionate team of technology enthusiasts, cybersecurity experts, and AI innovators dedicated to delivering high-quality, insightful content that helps individuals and organizations stay ahead of the ever-evolving digital landscape.

Recent

An alternate Monty Corridor downside.  As with the standard Monty Corridor downside, simply set it up as a likelihood tree and all of it works out

An alternate Monty Corridor downside. As with the standard Monty Corridor downside, simply set it up as a likelihood tree and all of it works out

May 17, 2025
Sednit abuses XSS flaws to hit gov’t entities, protection corporations

Sednit abuses XSS flaws to hit gov’t entities, protection corporations

May 17, 2025

Search

No Result
View All Result

© 2025 CyberDefenseGo - All Rights Reserved

No Result
View All Result
  • Home
  • Cyber Security
  • Artificial Intelligence
  • Machine Learning
  • Data Analysis
  • Computer Networking
  • Disaster Restoration

© 2025 CyberDefenseGo - All Rights Reserved

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In