diff --git a/docs/XenMyWay-Routed.xml b/docs/XenMyWay-Routed.xml index 224515946..da6e44095 100644 --- a/docs/XenMyWay-Routed.xml +++ b/docs/XenMyWay-Routed.xml @@ -331,8 +331,8 @@ bootentry = 'hda2:/boot/vmlinuz-xen,/boot/initrd-xen' ethtool -K eth0 tx off - Under SuSE 10.2, I placed the following - in + Under OpenSuSE 10.2, I placed the + following in /etc/sysconfig/network/ifcfg-eth-id-00:16:3e:b1:d7:90 (the config file for eth0): @@ -350,10 +350,10 @@ bootentry = 'hda2:/boot/vmlinuz-xen,/boot/initrd-xen' - Update. Under SuSE 10.2, communication from a domU works okay - without running ethtool but traffic shaping in - dom0 doesn't work! So it's a good idea to run it just to be - safe. + Update. Under OpenSuSE 10.2, communication from a domU works + okay without running ethtool but traffic shaping + in dom0 doesn't work! So it's a good idea to run it just to + be safe. @@ -377,8 +377,26 @@ bootentry = 'hda2:/boot/vmlinuz-xen,/boot/initrd-xen' by the DHCP server running in Dom0 and when they are attached wirelessly, the IP address is assigned by OpenVPN. + Readers who are paying attention will notice that eth4 has the + same public IP address (206.124.146.176) as eth0 (and eth3), yet the + test system connected to that interface + has an RFC 1918 address (192.168.1.7). That configuration is established + by Xen which clones the primary IP address of eth0 on all of the routed + virtual interfaces that it creates. test is configured with it's default route via + 192.168.1.254 which is the IP address of the firewall's br0. That works + because of the way that the Linux network stack treats local IPv4 + addresses; by default, it will respond to ARP "who-has" broadcasts for + any local address and not just for the addresses on the interface that + received the broadcast (but of course the MAC address returned in the + "here-is" response is that of the interface that received the + broadcast). So when test broadcasts + "who-has 192.168.1.254", the firewall responds with "here-is + 192.168.1.254 00:16:3e:83:ad:28" (00:16:3e:83:ad:28 is the MAC of + virtual interface eth4). + The Shorewall configuration files are shown below. All routing and - secondary IP addresses are handled in the SuSE network + secondary IP addresses are handled in the OpenSuSE network configuration.
diff --git a/docs/images/network4a.dia b/docs/images/network4a.dia index 0f616fe6e..462eb76f7 100644 Binary files a/docs/images/network4a.dia and b/docs/images/network4a.dia differ diff --git a/docs/images/network4a.png b/docs/images/network4a.png index 08ac4144b..53cf7462e 100755 Binary files a/docs/images/network4a.png and b/docs/images/network4a.png differ