Editing Differences between venet and veth
Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.
The edit can be undone.
Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 1: | Line 1: | ||
− | + | = Differences between venet and veth = | |
− | + | * veth allows broadcasts in VE, so you can use even dhcp server inside VE or samba server with domain broadcasts or other such stuff. | |
− | * | + | * veth has some security implications, so is not recommended in untrusted environments like HSP. This is due to broadcasts, traffic sniffing, possible IP collisions etc. i.e. VE user can actually ruin your ethernet network with such direct access to ethernet layer. |
− | * | + | * With venet device, only node administrator can assign an IP to a VE. With veth device, network settings can be fully done on VE side. VE should setup correct GW, IP/mask etc and node admin then can only choose where your traffic goes. |
− | * With | + | * veth devices can be bridged together and/or with other devices. For example, in host system admin can bridge veth from 2 VEs with some VLAN eth0.X. In this case, these 2 VEs will be connected to this VLAN. |
− | * | + | * venet device is a bit faster and more efficient. |
− | * | + | * With veth devices IPv6 auto generates an address from MAC. |
− | * With | ||
The brief summary: | The brief summary: | ||
{| class="wikitable" style="text-align: center;" | {| class="wikitable" style="text-align: center;" | ||
|+ '''Differences between veth and venet''' | |+ '''Differences between veth and venet''' | ||
− | ! Feature !! | + | ! Feature !! veth !! venet |
|- | |- | ||
! MAC address | ! MAC address | ||
| {{yes}} || {{no}} | | {{yes}} || {{no}} | ||
|- | |- | ||
− | ! Broadcasts inside | + | ! Broadcasts inside VE |
| {{yes}} || {{no}} | | {{yes}} || {{no}} | ||
|- | |- | ||
Line 23: | Line 22: | ||
|- | |- | ||
! Network security | ! Network security | ||
− | | | + | | low <ref>Due to broadcasts, sniffing and possible IP collisions etc.</ref> || hi |
− | | | ||
|- | |- | ||
! Can be used in bridges | ! Can be used in bridges | ||
| {{yes}} || {{no}} | | {{yes}} || {{no}} | ||
− | |||
− | |||
− | |||
|- | |- | ||
! Performance | ! Performance | ||
− | | | + | | fast || fastest |
− | | | ||
|- | |- | ||
|} | |} |