diff --git a/docs/XenMyWay-Routed.xml b/docs/XenMyWay-Routed.xml
index 224515946..da6e44095 100644
--- a/docs/XenMyWay-Routed.xml
+++ b/docs/XenMyWay-Routed.xml
@@ -331,8 +331,8 @@ bootentry = 'hda2:/boot/vmlinuz-xen,/boot/initrd-xen'
ethtool -K eth0 tx off
- Under SuSE 10.2, I placed the following
- in
+ Under OpenSuSE 10.2, I placed the
+ following in
/etc/sysconfig/network/ifcfg-eth-id-00:16:3e:b1:d7:90
(the config file for eth0):
@@ -350,10 +350,10 @@ bootentry = 'hda2:/boot/vmlinuz-xen,/boot/initrd-xen'
- Update. Under SuSE 10.2, communication from a domU works okay
- without running ethtool but traffic shaping in
- dom0 doesn't work! So it's a good idea to run it just to be
- safe.
+ Update. Under OpenSuSE 10.2, communication from a domU works
+ okay without running ethtool but traffic shaping
+ in dom0 doesn't work! So it's a good idea to run it just to
+ be safe.
@@ -377,8 +377,26 @@ bootentry = 'hda2:/boot/vmlinuz-xen,/boot/initrd-xen'
by the DHCP server running in Dom0 and when they are attached
wirelessly, the IP address is assigned by OpenVPN.
+ Readers who are paying attention will notice that eth4 has the
+ same public IP address (206.124.146.176) as eth0 (and eth3), yet the
+ test system connected to that interface
+ has an RFC 1918 address (192.168.1.7). That configuration is established
+ by Xen which clones the primary IP address of eth0 on all of the routed
+ virtual interfaces that it creates. test is configured with it's default route via
+ 192.168.1.254 which is the IP address of the firewall's br0. That works
+ because of the way that the Linux network stack treats local IPv4
+ addresses; by default, it will respond to ARP "who-has" broadcasts for
+ any local address and not just for the addresses on the interface that
+ received the broadcast (but of course the MAC address returned in the
+ "here-is" response is that of the interface that received the
+ broadcast). So when test broadcasts
+ "who-has 192.168.1.254", the firewall responds with "here-is
+ 192.168.1.254 00:16:3e:83:ad:28" (00:16:3e:83:ad:28 is the MAC of
+ virtual interface eth4).
+
The Shorewall configuration files are shown below. All routing and
- secondary IP addresses are handled in the SuSE network
+ secondary IP addresses are handled in the OpenSuSE network
configuration.
diff --git a/docs/images/network4a.dia b/docs/images/network4a.dia
index 0f616fe6e..462eb76f7 100644
Binary files a/docs/images/network4a.dia and b/docs/images/network4a.dia differ
diff --git a/docs/images/network4a.png b/docs/images/network4a.png
index 08ac4144b..53cf7462e 100755
Binary files a/docs/images/network4a.png and b/docs/images/network4a.png differ