日韩性视频-久久久蜜桃-www中文字幕-在线中文字幕av-亚洲欧美一区二区三区四区-撸久久-香蕉视频一区-久久无码精品丰满人妻-国产高潮av-激情福利社-日韩av网址大全-国产精品久久999-日本五十路在线-性欧美在线-久久99精品波多结衣一区-男女午夜免费视频-黑人极品ⅴideos精品欧美棵-人人妻人人澡人人爽精品欧美一区-日韩一区在线看-欧美a级在线免费观看

歡迎訪問 生活随笔!

生活随笔

當前位置: 首頁 > 编程资源 > 编程问答 >内容正文

编程问答

VPP教程 基本命令 记录

發布時間:2023/12/14 编程问答 26 豆豆
生活随笔 收集整理的這篇文章主要介紹了 VPP教程 基本命令 记录 小編覺得挺不錯的,現在分享給大家,幫大家做個參考.

基于官方指導教程。ubuntu18.04,已安裝vpp并測試,已有startup1.conf、startup2.conf(可以放在/etc/vpp路徑下)。root權限操作。

一 運行VPP

  • 啟動
  • /usr/bin/vpp -c startup1.conf
  • 運行VPP shell,進入vpp#
  • vppctl -s /run/vpp/cli-vpp1.sock

    二 創建Interface

    (vpp1,連接linux系統的veth interface通過AF_PACKET)

  • 在 Linux 中,有一種接口調用“veth”。將“veth”接口視為具有兩端(而不是一個)的接口。創建一個 veth 接口,一端名為vpp1out,另一端名為vpp1host
  • $ ip link add name vpp1out type veth peer name vpp1host
  • 啟動interface
  • $ ip link set dev vpp1out up $ ip link set dev vpp1host up
  • 配置ip地址
  • $ ip addr add 10.10.1.1/24 dev vpp1host $ ip addr show vpp1host # 刪除接口ipv4地址 vpp# set interface ip address del eth0 172.16.2.12/24 # 刪除接口ipv4 and ipv6 vpp# set interface ip address del eth0 all
  • VPP創建interface(類型:host-interface,連接到vpp1out上),查看Interface已創建
  • vpp# create host-interface name vpp1out vpp# show hardware
  • VPP啟動interface,查看interface狀態(比show hardware多看到MTU)
  • vpp# set int state host-vpp1out up vpp# show int
  • VPP配置interface IP地址,查看interface的IP地址
  • vpp# set int ip address host-vpp1out 10.10.1.2/24 vpp# show int addr

    三 trace追蹤包

  • VPP先查看記錄,清除之前的記錄
  • vpp# show trace vpp# clear trace
  • VPP設置trace過濾器(沒用到)
  • vpp# trace filter <include NODE COUNT | exclude NODE COUNT | none>

    Q:trace filter none可以,其他的好像不行?是過濾節點數量嗎?參考trace filter

  • VPP建立trace(指定追蹤節點,追蹤包數量)
  • vpp# trace add af-packet-input 10

    支持trace的節點
    af-packet-input

    avf-input

    bond-process

    dpdk-crypto-input

    dpdk-input

    handoff-trace

    ixge-input

    memif-input

    mrvl-pp2-input

    netmap-input

    p2p-ethernet-input

    pg-input

    punt-socket-rx

    rdma-input

    session-queue

    tuntap-rx

    vhost-user-input

    virtio-input

    vmxnet3-input

  • linux ping或者vpp ping,查看trace
  • vpp 中的ping不可以用-c指定數量

    $ ping -c 1 10.10.1.2 vpp# ping 10.10.1.1vpp# show trace

    trace內容解釋(待補充)
    時間、節點、包格式……(主要看下節點ip4-lookup、ip4-rewrite)

    Packet 105:05:52:711808: af-packet-inputaf_packet: hw_if_index 1 next-index 4tpacket2_hdr:status 0x20000001 len 98 snaplen 98 mac 66 net 80sec 0x6205d002 nsec 0x5f8011d vlan 0 vlan_tpid 0 05:05:52:711853: ethernet-inputIP4: f6:e3:e8:ef:9a:8d -> 02:fe:1b:ef:0a:d4 05:05:52:711863: ip4-inputICMP: 10.10.1.1 -> 10.10.2.2tos 0x00, ttl 64, length 84, checksum 0x7d7f dscp CS0 ecn NON_ECNfragment id 0xa613, flags DONT_FRAGMENTICMP echo_request checksum 0xfaed id 21893 05:05:52:711873: ip4-lookupfib 0 dpo-idx 5 flow hash: 0x00000000ICMP: 10.10.1.1 -> 10.10.2.2tos 0x00, ttl 64, length 84, checksum 0x7d7f dscp CS0 ecn NON_ECNfragment id 0xa613, flags DONT_FRAGMENTICMP echo_request checksum 0xfaed id 21893 05:05:52:711883: ip4-rewritetx_sw_if_index 2 dpo-idx 5 : ipv4 via 10.10.2.2 memif0/0: mtu:9000 next:4 02fe5f8a02f702fe42b3b6930800 flow hash: 0x0000000000000000: 02fe5f8a02f702fe42b3b693080045000054a61340003f017e7f0a0a01010a0a00000020: 02020800faed5585000102d0056200000000df860100000000001011 05:05:52:711887: memif0/0-outputmemif0/0 IP4: 02:fe:42:b3:b6:93 -> 02:fe:5f:8a:02:f7ICMP: 10.10.1.1 -> 10.10.2.2tos 0x00, ttl 63, length 84, checksum 0x7e7f dscp CS0 ecn NON_ECNfragment id 0xa613, flags DONT_FRAGMENTICMP echo_request checksum 0xfaed id 21893

    在vpp里可以抓包,文件在/tmp路徑

    # 抓1000個包,寫入文件vppcapture pcap dispatch trace on max 1000 file vppcapture buffer-trace dpdk-input 1000 pcap dispatch trace off
  • VPP查看ARP表(鄰接表)
  • vpp# show ip neighbors Time IP4 Flags Ethernet Interface 1101.5636 10.10.1.1 D e2:0f:1e:59:ec:f7 host-vpp1out
  • VPP查看路由表
  • (第一行vrf沒看懂)
    目的網絡
    單播/多播
    Q:dpo-load-balance
    dpo-load-balance[協議 序號 Q:buckets 單播反向路由查找 to via ]
    Q:動作?dpo-drop / ipv4 via 10.10.1.1 host-vpp1out / ipv4-glean/dpo-receive

    vpp# show ip fibipv4-VRF:0, fib_index:0, flow hash:[src dst sport dport proto ] locks:[src:plugin-hi:2, src:adjacency:1, src:default-route:1, ]0.0.0.0/0 unicast-ip4-chain [@0]: dpo-load-balance: [proto:ip4 index:1 buckets:1 uRPF:0 to:[0:0]][0] [@0]: dpo-drop ip40.0.0.0/32 unicast-ip4-chain [@0]: dpo-load-balance: [proto:ip4 index:2 buckets:1 uRPF:1 to:[0:0]][0] [@0]: dpo-drop ip410.10.1.0/32 unicast-ip4-chain [@0]: dpo-load-balance: [proto:ip4 index:10 buckets:1 uRPF:9 to:[0:0]][0] [@0]: dpo-drop ip410.10.1.1/32 unicast-ip4-chain [@0]: dpo-load-balance: [proto:ip4 index:13 buckets:1 uRPF:12 to:[5:420] via:[2:168]][0] [@5]: ipv4 via 10.10.1.1 host-vpp1out: mtu:9000 e20f1e59ecf702fed975d5b4080010.10.1.0/24 unicast-ip4-chain [@0]: dpo-load-balance: [proto:ip4 index:9 buckets:1 uRPF:8 to:[0:0]][0] [@4]: ipv4-glean: host-vpp1out: mtu:9000 ffffffffffff02fed975d5b4080610.10.1.2/32 unicast-ip4-chain [@0]: dpo-load-balance: [proto:ip4 index:12 buckets:1 uRPF:13 to:[7:588]][0] [@2]: dpo-receive: 10.10.1.2 on host-vpp1out10.10.1.255/32 unicast-ip4-chain [@0]: dpo-load-balance: [proto:ip4 index:11 buckets:1 uRPF:11 to:[0:0]][0] [@0]: dpo-drop ip4224.0.0.0/4 unicast-ip4-chain [@0]: dpo-load-balance: [proto:ip4 index:4 buckets:1 uRPF:3 to:[0:0]][0] [@0]: dpo-drop ip4240.0.0.0/4 unicast-ip4-chain [@0]: dpo-load-balance: [proto:ip4 index:3 buckets:1 uRPF:2 to:[0:0]][0] [@0]: dpo-drop ip4255.255.255.255/32 unicast-ip4-chain [@0]: dpo-load-balance: [proto:ip4 index:5 buckets:1 uRPF:4 to:[0:0]][0] [@0]: dpo-drop ip4

    四 連接兩個VPP


    vpp1和vpp2都已運行

  • VPP1創建interface(類型:memif ;id ;角色:master)
  • 這個interface name是memif0/0,master是vpp1在memif0/0中的角色

    vpp# create interface memif id 0 master
  • VPP1啟動memif0/0,添加IP,查看interface
  • vpp# set int state memif0/0 up vpp# set int ip address memif0/0 10.10.2.1/24 vpp# show int vpp# show int addr
  • VPP2創建interface(類型:memif ;id ;角色:slave)
  • vpp# create interface memif id 0 slave
  • VPP2啟動memif0/0,添加IP,查看interface(除了IP,其他和VPP1一樣)
  • vpp# set int ip address memif0/0 10.10.2.2/24
  • VPP1與2互相ping
  • vpp# ping 10.10.2.2 vpp# ping 10.10.2.1

    五 添加路由,拉通linux到VPP2(通過VPP1)

  • linux添加路由,目的地址是10.10.2.0/24,下一跳是10.10.1.2(vpp1)
  • $ ip route add 10.10.2.0/24 via 10.10.1.2$ ip route
  • VPP2設置返回路由,目的地址是10.10.1.0/24,下一跳是10.10.2.1(vpp1)
  • vpp# ip route add 10.10.1.0/24 via 10.10.2.1
  • 主機pingVPP2,trace追蹤包
    VPP1與VPP2之間用 memif driver,主機和VPP1之間用af-packet driver(Q:這兩個是啥?)
    要跟蹤來自主機的數據包,使用af-packet-input;從vpp1到vpp2,使用memif-input。
  • # VPP1 vpp# trace add af-packet-input 10# VPP2 vpp# trace add memif-input 10# host ping vpp2 $ ping 10.10.2.2# show trace vpp# show trace vpp# clear trace

    六 switch

  • 清除之前的配置
  • $ ps -ef | grep vpp | awk '{print $2}'| xargs sudo kill $ sudo ip link del dev vpp1host $ # do the next command if you are cleaning up from this example $ sudo ip link del dev vpp1vpp2
  • 運行 FD.io VPP 實例
    運行一個名為vpp1的 vpp 實例
  • $ /usr/bin/vpp -c startup1.conf $ vppctl -s /run/vpp/cli-vpp1.sock

    運行一個名為vpp2的 vpp 實例

    $ /usr/bin/vpp -c startup2.conf $ vppctl -s /run/vpp/cli-vpp2.sock
  • 將 vpp1 連接到主機
    創建一個 veth,一端命名為 vpp1host,另一端命名為 vpp1out。
    將 vpp1out 連接到 vpp1
    在vpp1host上添加ip地址10.10.1.1/24
  • $ ip link add name vpp1out type veth peer name vpp1host $ ip link set dev vpp1out up $ ip link set dev vpp1host up $ ip addr add 10.10.1.1/24 dev vpp1host vpp# create host-interface name vpp1out host-vpp1out vpp# set int state host-vpp1out up
  • 將 vpp1 連接到 vpp2
    創建一個 veth,一端命名為 vpp1vpp2,另一端命名為 vpp2vpp1。
    將 vpp1vpp2 連接到 vpp1。
    將 vpp2vpp1 連接到 vpp2。
  • $ ip link add name vpp2vpp1 type veth peer name vpp1vpp2 $ ip link set dev vpp1vpp2 up $ ip link set dev vpp2vpp1 up

    vpp1

    vpp# create host-interface name vpp1vpp2 host-vpp1vpp2 vpp# set int state host-vpp1vpp2 up vpp# show bridge-domin

    vpp2

    vpp# create host-interface name vpp2vpp1 host-vpp2vpp1 vpp# set int state host-vpp2vpp1 up
  • 在 vpp1 上配置網橋域
    如果只有默認的0,創建bridge domain 1
  • vpp# show bridge-domain vpp# set int l2 bridge host-vpp1out 1 vpp# set int l2 bridge host-vpp1vpp2 1 vpp# show bridge-domain 1 detail BD-ID Index BSN Age(min) Learning U-Forwrd UU-Flood Flooding ARP-Term arp-ufwd BVI-Intf 1 1 off on on flood on off off N/A span-l2-input l2-input-classify l2-input-feat-arc l2-policer-classify l2-input-acl vpath-input-l2 l2-ip-qos-record l2-input-vtr l2-gbp-lpm-classify gbp-src-classify gbp-null-classify l2-gbp-lpm-anon-classify gbp-learn-l2 l2-emulation l2-learn l2-rw l2-fwd gbp-fwd l2-flood l2-flood l2-output Interface If-idx ISN SHG BVI TxFlood VLAN-Tag-Rewrite host-vpp1out 1 1 0 - * none host-vpp1vpp2 2 1 0 - * none
  • 在 vpp2 上配置環回接口
  • vpp# create loopback interface loop0

    將ip地址10.10.1.2/24添加到vpp2接口loop0。將 vpp2 上的接口 loop0 的狀態設置為“up”

    vpp# set int ip address loop0 10.10.1.2/24 vpp# set int state loop0 up

    刪除用del loopback interface intfc loop0

  • 在 vpp2 上配置網橋域
    檢查以查看第一個可用的網橋域 ID(在這種情況下為 1)將接口 loop0 作為網橋虛擬接口 (bvi) 添加到網橋域 1,將接口 vpp2vpp1 添加到橋接域 1
  • vpp# set int l2 bridge loop0 1 bvi vpp# set int l2 bridge host-vpp2vpp1 1
  • 從主機 ping 到 vpp 和 vpp 到主機
    在 vpp1 和 vpp2 上添加跟蹤
    從主機 ping 到 10.10.1.2
    檢查并清除 vpp1 和 vpp2 上的跟蹤
  • vpp1&vpp2

    vpp# show trace ------------------- Start of thread 0 vpp_main ------------------- No packets in trace buffer vpp# clear trace vpp# trace add af-packet-input 10

    vpp1

    vpp# show trace ------------------- Start of thread 0 vpp_main ------------------- Packet 100:37:05:332912: af-packet-inputaf_packet: hw_if_index 1 next-index 4tpacket2_hdr:status 0x20000001 len 98 snaplen 98 mac 66 net 80sec 0x6209b8f7 nsec 0x2c877061 vlan 0 vlan_tpid 0 00:37:05:332955: ethernet-inputIP4: 12:9c:88:4f:ee:2d -> de:ad:00:00:00:00 00:37:05:332963: l2-inputl2-input: sw_if_index 1 dst de:ad:00:00:00:00 src 12:9c:88:4f:ee:2d [l2-learn l2-fwd l2-flood l2-flood ] 00:37:05:332969: l2-learnl2-learn: sw_if_index 1 dst de:ad:00:00:00:00 src 12:9c:88:4f:ee:2d bd_index 1 00:37:05:332973: l2-fwdl2-fwd: sw_if_index 1 dst de:ad:00:00:00:00 src 12:9c:88:4f:ee:2d bd_index 1 result [0x1220000000002, 2] none 00:37:05:332978: l2-outputl2-output: sw_if_index 2 dst de:ad:00:00:00:00 src 12:9c:88:4f:ee:2d data 08 00 45 00 00 54 d5 9e 40 00 40 01 00:37:05:332981: host-vpp1vpp2-outputhost-vpp1vpp2 IP4: 12:9c:88:4f:ee:2d -> de:ad:00:00:00:00ICMP: 10.10.1.1 -> 10.10.1.2tos 0x00, ttl 64, length 84, checksum 0x4ef4 dscp CS0 ecn NON_ECNfragment id 0xd59e, flags DONT_FRAGMENTICMP echo_request checksum 0xbe0d id 23197Packet 200:37:05:333367: af-packet-inputaf_packet: hw_if_index 2 next-index 4tpacket2_hdr:status 0x20000001 len 98 snaplen 98 mac 66 net 80sec 0x6209b8f7 nsec 0x2c968233 vlan 0 vlan_tpid 0 00:37:05:333374: ethernet-inputIP4: de:ad:00:00:00:00 -> 12:9c:88:4f:ee:2d 00:37:05:333379: l2-inputl2-input: sw_if_index 2 dst 12:9c:88:4f:ee:2d src de:ad:00:00:00:00 [l2-learn l2-fwd l2-flood l2-flood ] 00:37:05:333383: l2-learnl2-learn: sw_if_index 2 dst 12:9c:88:4f:ee:2d src de:ad:00:00:00:00 bd_index 1 00:37:05:333385: l2-fwdl2-fwd: sw_if_index 2 dst 12:9c:88:4f:ee:2d src de:ad:00:00:00:00 bd_index 1 result [0x1220000000001, 1] none 00:37:05:333387: l2-outputl2-output: sw_if_index 1 dst 12:9c:88:4f:ee:2d src de:ad:00:00:00:00 data 08 00 45 00 00 54 87 9f 40 00 40 01 00:37:05:333389: host-vpp1out-outputhost-vpp1out IP4: de:ad:00:00:00:00 -> 12:9c:88:4f:ee:2dICMP: 10.10.1.2 -> 10.10.1.1tos 0x00, ttl 64, length 84, checksum 0x9cf3 dscp CS0 ecn NON_ECNfragment id 0x879f, flags DONT_FRAGMENTICMP echo_reply checksum 0xc60d id 23197vpp# show l2fib verboseMac-Address BD-Idx If-Idx BSN-ISN Age(min) static filter bvi Interface-Name 56:dd:cb:23:8c:da 1 2 0/1 - - - - host-vpp1vpp2 de:ad:00:00:00:00 1 2 0/1 - - - - host-vpp1vpp2 12:9c:88:4f:ee:2d 1 1 0/1 - - - - host-vpp1out 8a:1f:7d:cb:0e:3f 1 1 0/1 - - - - host-vpp1out L2FIB total/learned entries: 4/4 Last scan time: 0.0000e0sec Learn limit: 16777216

    vpp2

    vpp# show trace ------------------- Start of thread 0 vpp_main ------------------- Packet 100:36:04:423430: af-packet-inputaf_packet: hw_if_index 1 next-index 4tpacket2_hdr:status 0x20000001 len 98 snaplen 98 mac 66 net 80sec 0x6209b8f7 nsec 0x2c922ba5 vlan 0 vlan_tpid 0 00:36:04:423456: ethernet-inputIP4: 12:9c:88:4f:ee:2d -> de:ad:00:00:00:00 00:36:04:423466: l2-inputl2-input: sw_if_index 1 dst de:ad:00:00:00:00 src 12:9c:88:4f:ee:2d [l2-learn l2-fwd l2-flood l2-flood ] 00:36:04:423470: l2-learnl2-learn: sw_if_index 1 dst de:ad:00:00:00:00 src 12:9c:88:4f:ee:2d bd_index 1 00:36:04:423473: l2-fwdl2-fwd: sw_if_index 1 dst de:ad:00:00:00:00 src 12:9c:88:4f:ee:2d bd_index 1 result [0x700000002, 2] static age-not bvi 00:36:04:423479: ip4-inputICMP: 10.10.1.1 -> 10.10.1.2tos 0x00, ttl 64, length 84, checksum 0x4ef4 dscp CS0 ecn NON_ECNfragment id 0xd59e, flags DONT_FRAGMENTICMP echo_request checksum 0xbe0d id 23197 00:36:04:423489: ip4-lookupfib 0 dpo-idx 7 flow hash: 0x00000000ICMP: 10.10.1.1 -> 10.10.1.2tos 0x00, ttl 64, length 84, checksum 0x4ef4 dscp CS0 ecn NON_ECNfragment id 0xd59e, flags DONT_FRAGMENTICMP echo_request checksum 0xbe0d id 23197 00:36:04:423512: ip4-localICMP: 10.10.1.1 -> 10.10.1.2tos 0x00, ttl 64, length 84, checksum 0x4ef4 dscp CS0 ecn NON_ECNfragment id 0xd59e, flags DONT_FRAGMENTICMP echo_request checksum 0xbe0d id 23197 00:36:04:423518: ip4-icmp-inputICMP: 10.10.1.1 -> 10.10.1.2tos 0x00, ttl 64, length 84, checksum 0x4ef4 dscp CS0 ecn NON_ECNfragment id 0xd59e, flags DONT_FRAGMENTICMP echo_request checksum 0xbe0d id 23197 00:36:04:423522: ip4-icmp-echo-requestICMP: 10.10.1.1 -> 10.10.1.2tos 0x00, ttl 64, length 84, checksum 0x4ef4 dscp CS0 ecn NON_ECNfragment id 0xd59e, flags DONT_FRAGMENTICMP echo_request checksum 0xbe0d id 23197 00:36:04:423529: ip4-load-balancefib 0 dpo-idx 2 flow hash: 0x00000000ICMP: 10.10.1.2 -> 10.10.1.1tos 0x00, ttl 64, length 84, checksum 0x9cf3 dscp CS0 ecn NON_ECNfragment id 0x879f, flags DONT_FRAGMENTICMP echo_reply checksum 0xc60d id 23197 00:36:04:423532: ip4-rewritetx_sw_if_index 2 dpo-idx 2 : ipv4 via 10.10.1.1 loop0: mtu:9000 next:3 129c884fee2ddead000000000800 flow hash: 0x0000000000000000: 129c884fee2ddead00000000080045000054879f400040019cf30a0a01020a0a00000020: 01010000c60d5a9d0001f7b809620000000014660b00000000001011 00:36:04:423536: loop0-outputloop0 IP4: de:ad:00:00:00:00 -> 12:9c:88:4f:ee:2dICMP: 10.10.1.2 -> 10.10.1.1tos 0x00, ttl 64, length 84, checksum 0x9cf3 dscp CS0 ecn NON_ECN 0000000000: 129c884fee2ddead00000000080045000054879f400040019cf30a0a01020a0a00000020: 01010000c60d5a9d0001f7b809620000000014660b00000000001011 00:36:04:423536: loop0-outputloop0 IP4: de:ad:00:00:00:00 -> 12:9c:88:4f:ee:2dICMP: 10.10.1.2 -> 10.10.1.1tos 0x00, ttl 64, length 84, checksum 0x9cf3 dscp CS0 ecn NON_ECNfragment id 0x879f, flags DONT_FRAGMENTICMP echo_reply checksum 0xc60d id 23197 00:36:04:423544: l2-inputl2-input: sw_if_index 2 dst 12:9c:88:4f:ee:2d src de:ad:00:00:00:00 [l2-fwd l2-flood l2-flood ] 00:36:04:423546: l2-fwdl2-fwd: sw_if_index 2 dst 12:9c:88:4f:ee:2d src de:ad:00:00:00:00 bd_index 1 result [0x1210000000001, 1] none 00:36:04:423547: l2-outputl2-output: sw_if_index 1 dst 12:9c:88:4f:ee:2d src de:ad:00:00:00:00 data 08 00 45 00 00 54 87 9f 40 00 40 01 00:36:04:423550: host-vpp2vpp1-outputhost-vpp2vpp1 IP4: de:ad:00:00:00:00 -> 12:9c:88:4f:ee:2dICMP: 10.10.1.2 -> 10.10.1.1tos 0x00, ttl 64, length 84, checksum 0x9cf3 dscp CS0 ecn NON_ECNfragment id 0x879f, flags DONT_FRAGMENTICMP echo_reply checksum 0xc60d id 23197Packet 200:36:09:639349: af-packet-inputaf_packet: hw_if_index 1 next-index 4tpacket2_hdr:status 0x20000001 len 42 snaplen 42 mac 66 net 80sec 0x6209b8fc nsec 0x397195c8 vlan 0 vlan_tpid 0 00:36:09:639370: ethernet-inputARP: 12:9c:88:4f:ee:2d -> de:ad:00:00:00:00 00:36:09:639381: l2-inputl2-input: sw_if_index 1 dst de:ad:00:00:00:00 src 12:9c:88:4f:ee:2d [l2-learn l2-fwd l2-flood l2-flood ] 00:36:09:639386: l2-learnl2-learn: sw_if_index 1 dst de:ad:00:00:00:00 src 12:9c:88:4f:ee:2d bd_index 1 00:36:09:639390: l2-fwdl2-fwd: sw_if_index 1 dst de:ad:00:00:00:00 src 12:9c:88:4f:ee:2d bd_index 1 result [0x700000002, 2] static age-not b vi 00:36:09:639398: arp-inputrequest, type ethernet/IP4, address size 6/412:9c:88:4f:ee:2d/10.10.1.1 -> 00:00:00:00:00:00/10.10.1.2 00:36:09:639402: arp-replyrequest, type ethernet/IP4, address size 6/412:9c:88:4f:ee:2d/10.10.1.1 -> 00:00:00:00:00:00/10.10.1.2 00:36:09:639443: loop0-outputloop0 ARP: de:ad:00:00:00:00 -> 12:9c:88:4f:ee:2dreply, type ethernet/IP4, address size 6/4de:ad:00:00:00:00/10.10.1.2 -> 12:9c:88:4f:ee:2d/10.10.1.1 00:36:09:639450: l2-inputl2-input: sw_if_index 2 dst 12:9c:88:4f:ee:2d src de:ad:00:00:00:00 [l2-fwd l2-flood l2-flood ] 00:36:09:639453: l2-fwdl2-fwd: sw_if_index 2 dst 12:9c:88:4f:ee:2d src de:ad:00:00:00:00 bd_index 1 result [0x1210000000001, 1] none 00:36:09:639455: l2-outputl2-output: sw_if_index 1 dst 12:9c:88:4f:ee:2d src de:ad:00:00:00:00 data 08 06 00 01 08 00 06 04 00 02 de ad 00:36:09:639458: host-vpp2vpp1-outputhost-vpp2vpp1 ARP: de:ad:00:00:00:00 -> 12:9c:88:4f:ee:2dreply, type ethernet/IP4, address size 6/4de:ad:00:00:00:00/10.10.1.2 -> 12:9c:88:4f:ee:2d/10.10.1.1vpp# show l2fib verboseMac-Address BD-Idx If-Idx BSN-ISN Age(min) static filter bvi Interface-Name de:ad:00:00:00:00 1 2 0/0 no * - * loop0 12:9c:88:4f:ee:2d 1 1 0/1 - - - - host-vpp2vpp1 8a:1f:7d:cb:0e:3f 1 1 0/1 - - - - host-vpp2vpp1 L2FIB total/learned entries: 3/2 Last scan time: 0.0000e0sec Learn limit: 16777216
  • 從 vpp2 ping 到 10.10.1.1
    檢查并清除 vpp1 和 vpp2 上的跟蹤
    vpp1
  • vpp# show l2fib verbose Mac-Address BD-Idx If-Idx BSN-ISN Age(min) static filter bvi Interface-Name 56:dd:cb:23:8c:da 1 2 0/1 - - - - host-vpp1vpp2 4e:db:02:b3:65:58 1 2 0/1 - - - - host-vpp1vpp2 de:ad:00:00:00:00 1 2 0/1 - - - - host-vpp1vpp2 12:9c:88:4f:ee:2d 1 1 0/1 - - - - host-vpp1out 8a:1f:7d:cb:0e:3f 1 1 0/1 - - - - host-vpp1out L2FIB total/learned entries: 5/5 Last scan time: 0.0000e0sec Learn limit: 16777216

    vpp2

    vpp# show l2fib verbose Mac-Address BD-Idx If-Idx BSN-ISN Age(min) static filter bvi Interface-Name 56:dd:cb:23:8c:da 1 1 0/1 - - - - host-vpp2vpp1 4e:db:02:b3:65:58 1 1 0/1 - - - - host-vpp2vpp1 de:ad:00:00:00:00 1 2 0/0 no * - * loop0 12:9c:88:4f:ee:2d 1 1 0/1 - - - - host-vpp2vpp1 8a:1f:7d:cb:0e:3f 1 1 0/1 - - - - host-vpp2vpp1 L2FIB total/learned entries: 5/4 Last scan time: 0.0000e0sec Learn limit: 16777216

    總結

    以上是生活随笔為你收集整理的VPP教程 基本命令 记录的全部內容,希望文章能夠幫你解決所遇到的問題。

    如果覺得生活随笔網站內容還不錯,歡迎將生活随笔推薦給好友。