Skip to content

[Dual-ToR] handle 'mux_tunnel_egress_acl' attrib in order to change ACL configuration (drop on ingress/egress) on standby ToR#2646

Merged
liat-grozovik merged 1 commit intosonic-net:masterfrom
ayurkiv-nvda:upstream_acl_ingress_master
Mar 1, 2023
Merged

[Dual-ToR] handle 'mux_tunnel_egress_acl' attrib in order to change ACL configuration (drop on ingress/egress) on standby ToR#2646
liat-grozovik merged 1 commit intosonic-net:masterfrom
ayurkiv-nvda:upstream_acl_ingress_master

Conversation

@ayurkiv-nvda
Copy link
Contributor

Signed-off-by: Andriy Yurkiv [email protected]

What I did
Use "mux_tunnel_ingress_acl" to set ACL rules on ingress/egress side depending on attribute value ("disabled/enabled").

Why I did it
We need to drop data-plane traffic and handle Control-plane traffic in the Dual-ToR scenario.
But we can't do it on Mellanox platform and process traffic on ingress.
To workaround it we can set ACL rules on egress ports, so will process control plane on ingress and drop Data-plane traffic that came from standby port on egress

How I verified it
check "show mux status" on standby ToR - Mux status should be healthy.
check "show what-just-happened" on standby ToR - no ICMP drop expected on standby ports.

Details if related

@ayurkiv-nvda ayurkiv-nvda requested a review from prsunny as a code owner January 30, 2023 11:17
@ayurkiv-nvda ayurkiv-nvda force-pushed the upstream_acl_ingress_master branch from 13b27d7 to e2acc5f Compare January 30, 2023 22:52
…CL configuration (drop on ingress/egress) on standby ToR

Signed-off-by: Andriy Yurkiv <[email protected]>
@liat-grozovik
Copy link
Collaborator

@bingwang-ms @volodymyrsamotiy could you please help to review?

@liat-grozovik
Copy link
Collaborator

@bingwang-ms can you please review and approve?

@liat-grozovik liat-grozovik merged commit 79afcb3 into sonic-net:master Mar 1, 2023
StormLiangMS pushed a commit that referenced this pull request Mar 7, 2023
…CL configuration (drop on ingress/egress) on standby ToR (#2646)

- What I did
Use "mux_tunnel_ingress_acl" to set ACL rules on ingress/egress side depending on attribute value ("disabled/enabled").

- Why I did it
We need to drop data-plane traffic and handle Control-plane traffic in the Dual-ToR scenario.
But we can't do it on Mellanox platform and process traffic on ingress.
To workaround it we can set ACL rules on egress ports, so will process control plane on ingress and drop Data-plane traffic that came from standby port on egress

- How I verified it
check "show mux status" on standby ToR - Mux status should be healthy.
check "show what-just-happened" on standby ToR - no ICMP drop expected on standby ports.

Signed-off-by: Andriy Yurkiv <[email protected]>
@bingwang-ms
Copy link
Contributor

@liat-grozovik Do we need this change in 202205?

@ayurkiv-nvda ayurkiv-nvda deleted the upstream_acl_ingress_master branch January 22, 2025 16:59
Janetxxx pushed a commit to Janetxxx/sonic-swss that referenced this pull request Nov 10, 2025
…CL configuration (drop on ingress/egress) on standby ToR (sonic-net#2646)

- What I did
Use "mux_tunnel_ingress_acl" to set ACL rules on ingress/egress side depending on attribute value ("disabled/enabled").

- Why I did it
We need to drop data-plane traffic and handle Control-plane traffic in the Dual-ToR scenario.
But we can't do it on Mellanox platform and process traffic on ingress.
To workaround it we can set ACL rules on egress ports, so will process control plane on ingress and drop Data-plane traffic that came from standby port on egress

- How I verified it
check "show mux status" on standby ToR - Mux status should be healthy.
check "show what-just-happened" on standby ToR - no ICMP drop expected on standby ports.

Signed-off-by: Andriy Yurkiv <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

5 participants