Hi there,
My test host has 2 GbE nics bonded together through 802.3ad, and the switch is configured in a way that the bonded ports can access untagged default vlan and some tagged vlans (10,20,30) for different purposes. Coming from ESXi, I'm quite confused on how to deal with VLANs with proxmox, so here are my questions:
1) Is it possible to create different bridges using the same single bond?
For example I would like to create a bridge (eg. vmbr30) which is tagged to a specific VLAN by default (like configured tagged vswitches on esxi).
Is this possible?
2) By default, from guest VMs, I'm able to create virtual interfaces and access any vlan the host has access to.
Is there a way to limit which VLANs can be accessed from a particular VM or Bridge?
I've been able to achieve this by using openvswitch and specifying which ports a specific tap* interface could access
In this way I've been able to limit the guest to access default untagged vlan, and tagged vlan 10 but not others. The only problem is that this configuration is not persistent across host reboots.
3) Is there any difference about using openvswitch over traditional linux bridging? Which is the best choice in your opinion?
Of course, I'm aware that I could create several virtual nics and assign the desired vlan tag to it, but for some application I need to manage tagging from inside the VM using one interface only.
Thanks,
Michele
My test host has 2 GbE nics bonded together through 802.3ad, and the switch is configured in a way that the bonded ports can access untagged default vlan and some tagged vlans (10,20,30) for different purposes. Coming from ESXi, I'm quite confused on how to deal with VLANs with proxmox, so here are my questions:
1) Is it possible to create different bridges using the same single bond?
For example I would like to create a bridge (eg. vmbr30) which is tagged to a specific VLAN by default (like configured tagged vswitches on esxi).
Is this possible?
2) By default, from guest VMs, I'm able to create virtual interfaces and access any vlan the host has access to.
Is there a way to limit which VLANs can be accessed from a particular VM or Bridge?
I've been able to achieve this by using openvswitch and specifying which ports a specific tap* interface could access
Code:
root@pve01:~# ovs-vsctl set port tap100i0 vlan_mode=trunk
root@pve01:~# ovs-vsctl set port tap100i0 trunk=0,10
3) Is there any difference about using openvswitch over traditional linux bridging? Which is the best choice in your opinion?
Of course, I'm aware that I could create several virtual nics and assign the desired vlan tag to it, but for some application I need to manage tagging from inside the VM using one interface only.
Thanks,
Michele
Last edited: