Bug 1887333 - Too many resubmits for IPv6 RS coming from "external" network
Summary: Too many resubmits for IPv6 RS coming from "external" network
Keywords:
Status: NEW
Alias: None
Product: Red Hat Enterprise Linux Fast Datapath
Classification: Red Hat
Component: ovn2.13
Version: FDP 20.E
Hardware: Unspecified
OS: Unspecified
medium
medium
Target Milestone: ---
: ---
Assignee: OVN Team
QA Contact: Jianlin Shi
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2020-10-12 07:13 UTC by Dumitru Ceara
Modified: 2023-07-13 07:25 UTC (History)
3 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed:
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)

Description Dumitru Ceara 2020-10-12 07:13:52 UTC
Description of problem:

Currently OVN limits forwarding ARP/IPv6 NS packets only to router ports that own the target IP.

This should be extended for other types of BUM (broadcast/unknown/multicast) traffic as follows:

1. send ARP/NS packets only to router ports that own the target IP address.
2. flood IPv6 ND RS packets only to router ports with IPv6 addresses
configured and ipv6_ra_configs.address_mode set.
3. according to the logical switch multicast configuration either flood
unkown IP multicast or forward it only to hosts that registered for the
IP multicast group.
4. flood all other BUM traffic on all logical ports of a logical switch except router ports.

Version-Release number of selected component (if applicable):
any

Additional info:
Reported upstream: - https://mail.openvswitch.org/pipermail/ovs-discuss/2020-September/050715.html


Note You need to log in before you can comment on or make changes to this bug.