summaryrefslogtreecommitdiff
path: root/system.h
diff options
context:
space:
mode:
authorJohannes Kimmel <fff@bareminimum.eu>2020-09-04 04:59:40 +0200
committerHans Dedecker <dedeckeh@gmail.com>2020-09-12 21:04:42 +0200
commita3c033e2afc289672e0ed4b8d8a835d509715af8 (patch)
treee714d20e3d1e376d83a08069f92d2c4668959f33 /system.h
parentd7b614a86b815da711b5fecb10687297a70d859e (diff)
downloadnetifd-a3c033e2afc289672e0ed4b8d8a835d509715af8.tar.gz
netifd: vxlan: handle srcport range
This adds adds the ability to set the source port range for vxlan interfaces. By default vxlans will use a random port within the ephermal range as source ports for packets. This is done to aid scaleability within a datacenter. But with these defaults it's impossible to punch through NATs or traverese most stateful firewalls easily. One solution is to fix the srcport to the same as dstport. If only srcportmin is specified, then srcportmax is set in a way that outgoing packets will only use srcportmin. If a range is to be specified, srcportmin and srcportmax have to be specified. srcportmax is exclusive. If only srcportmax is specified, the value is ignored and defaults are used. Signed-off-by: Johannes Kimmel <fff@bareminimum.eu>
Diffstat (limited to 'system.h')
-rw-r--r--system.h2
1 files changed, 2 insertions, 0 deletions
diff --git a/system.h b/system.h
index 015987f..bf9e1d7 100644
--- a/system.h
+++ b/system.h
@@ -44,6 +44,8 @@ enum vxlan_data {
VXLAN_DATA_ATTR_MACADDR,
VXLAN_DATA_ATTR_RXCSUM,
VXLAN_DATA_ATTR_TXCSUM,
+ VXLAN_DATA_ATTR_SRCPORTMIN,
+ VXLAN_DATA_ATTR_SRCPORTMAX,
__VXLAN_DATA_ATTR_MAX
};