Difference between revisions of "Using private IPs for Hardware Nodes"

From OpenVZ Virtuozzo Containers Wiki
Jump to: navigation, search
m (Robot: Automated text replacement (-VE0 +CT0))
m (VE->CT, container)
Line 4: Line 4:
  
 
== Prerequisites ==
 
== Prerequisites ==
This configuration was tested on a RHEL5 OpenVZ Hardware Node and a VE based on a Fedora Core 5 template.
+
This configuration was tested on a RHEL5 OpenVZ Hardware Node and a container based on a Fedora Core 5 template.
 
Other host OSs and templates might require some configuration changes, please add corresponding OS specific changes if you've faced any.
 
Other host OSs and templates might require some configuration changes, please add corresponding OS specific changes if you've faced any.
  
 
This article assumes the presence of 'brctl', 'ip' and 'ifconfig' utils. You may need to install missing packages like 'bridge-utils'/'iproute'/'net-tools' or others which contain those utilities.
 
This article assumes the presence of 'brctl', 'ip' and 'ifconfig' utils. You may need to install missing packages like 'bridge-utils'/'iproute'/'net-tools' or others which contain those utilities.
  
This article assumes you have already [[Quick installation|installed OpenVZ]], prepared the [[OS template cache]](s) and have [[Basic_operations_in_OpenVZ_environment|VE(s) created]]. If not, follow the links to perform the steps needed.
+
This article assumes you have already [[Quick installation|installed OpenVZ]],
{{Note|don't assign an IP after VE creation.}}
+
prepared the [[OS template cache]](s) and have
 +
[[Basic_operations_in_OpenVZ_environment|container(s) created]]. If not, follow the links to perform the steps needed.
 +
{{Note|don't assign an IP after container creation.}}
  
 
== An OVZ Hardware Node has the only one Ethernet interface ==
 
== An OVZ Hardware Node has the only one Ethernet interface ==
Line 49: Line 51:
 
  [HN]# /tmp/br_add >/dev/null 2>&1 &
 
  [HN]# /tmp/br_add >/dev/null 2>&1 &
  
=== VE configuration ===
+
=== Container configuration ===
  
==== Start a VE ====
+
==== Start a container ====
 
  [HN]# vzctl start 101
 
  [HN]# vzctl start 101
  
==== Add a [[Virtual_Ethernet_device|veth interface]] to the VE ====
+
==== Add a [[Virtual_Ethernet_device|veth interface]] to the container ====
 
  [HN]# vzctl set 101 --netif_add eth0 --save
 
  [HN]# vzctl set 101 --netif_add eth0 --save
  
==== Set up an IP to the newly created VE's veth interface ====
+
==== Set up an IP to the newly created container's veth interface ====
 
  [HN]# vzctl exec 101 ifconfig eth0 85.86.87.195/26
 
  [HN]# vzctl exec 101 ifconfig eth0 85.86.87.195/26
 
   
 
   
==== Add the VE's veth interface to the bridge ====
+
==== Add the container's veth interface to the bridge ====
 
  [HN]# brctl addif br0 veth101.0
 
  [HN]# brctl addif br0 veth101.0
  
Line 66: Line 68:
 
<!-- /sys/class/net/$BR_NAME/bridge/forward_delay in SEC*USER_HZ -->}}
 
<!-- /sys/class/net/$BR_NAME/bridge/forward_delay in SEC*USER_HZ -->}}
  
==== Set up the default route for the VE ====
+
==== Set up the default route for the container ====
 
  [HN]# vzctl exec 101 ip route add default via 85.86.87.193 dev eth0
 
  [HN]# vzctl exec 101 ip route add default via 85.86.87.193 dev eth0
 
   
 
   
==== (Optional) Add VE↔HN routes ====
+
==== (Optional) Add CT↔HN routes ====
 
The above configuration provides the following connections:
 
The above configuration provides the following connections:
* VE X ↔ VE Y (where VE X and VE Y can locate on any OVZ HN)
+
* CT X ↔ CT Y (where CT X and CT Y can locate on any OVZ HN)
* VE   ↔ Internet
+
* CT   ↔ Internet
  
 
Note that
 
Note that
  
* The accessability of the VE from the HN depends on the local gateway providing NAT(probably - yes)
+
* The accessability of the CT from the HN depends on the local gateway providing NAT (probably - yes)
  
* The accessability of the HN from the VE depends on the ISP gateway being aware of the local network(probably not)
+
* The accessability of the HN from the CT depends on the ISP gateway being aware of the local network (probably not)
  
 
+
So to provide CT ↔ HN accessibility despite the gateways' configuration you can add the following routes:
So to provide VE ↔ HN accessibility despite the gateways' configuration you can add the following routes:
 
  
 
  [HN]# ip route add 85.86.87.195 dev br0
 
  [HN]# ip route add 85.86.87.195 dev br0
Line 120: Line 121:
 
</pre>
 
</pre>
  
==== Edit the VE's configuration ====
+
==== Edit the container's configuration ====
Add these parameters to the <code>/etc/vz/conf/$VEID.conf</code> file which will be used during the network configuration:
+
Add these parameters to the <code>/etc/vz/conf/$CTID.conf</code> file which will be used during the network configuration:
* Add/change <code>CONFIG_CUSTOMIZED="yes"</code> (indicates that a custom script should be run on a VE start)
+
* Add/change <code>CONFIG_CUSTOMIZED="yes"</code> (indicates that a custom
* Add <code>VETH_IP_ADDRESS="VE IP/MASK"</code> (a VE can have multiple IPs separated by spaces)
+
  script should be run on a container start)
* Add <code>VE_DEFAULT_GATEWAY="VE DEFAULT GATEWAY"</code>
+
* Add <code>VETH_IP_ADDRESS="IP/MASK"</code> (a container can have multiple
* Add <code>BRIDGEDEV="BRIDGE NAME"</code> (a bridge name to which the VE veth interface should be added)
+
  IPs separated by spaces)
 +
* Add <code>VE_DEFAULT_GATEWAY="CT DEFAULT GATEWAY"</code>
 +
* Add <code>BRIDGEDEV="BRIDGE NAME"</code> (a bridge name to which the
 +
  container veth interface should be added)
  
 
An example:
 
An example:
Line 137: Line 141:
  
 
==== Create a custom network configuration script ====
 
==== Create a custom network configuration script ====
which should be called each time a VE is started (e.g. <code>/usr/sbin/vznetcfg.custom</code>):
+
which should be called each time a container is started (e.g. <code>/usr/sbin/vznetcfg.custom</code>):
 
<pre>
 
<pre>
 
#!/bin/bash
 
#!/bin/bash
 
# /usr/sbin/vznetcfg.custom
 
# /usr/sbin/vznetcfg.custom
# a script to bring up bridged network interfaces (veth's) in a VE
+
# a script to bring up bridged network interfaces (veth's) in a container
  
 
GLOBALCONFIGFILE=/etc/vz/vz.conf
 
GLOBALCONFIGFILE=/etc/vz/vz.conf
VECONFIGFILE=/etc/vz/conf/$VEID.conf
+
CTCONFIGFILE=/etc/vz/conf/$VEID.conf
 
vzctl=/usr/sbin/vzctl
 
vzctl=/usr/sbin/vzctl
 
brctl=/usr/sbin/brctl
 
brctl=/usr/sbin/brctl
Line 150: Line 154:
 
ifconfig=/sbin/ifconfig
 
ifconfig=/sbin/ifconfig
 
. $GLOBALCONFIGFILE
 
. $GLOBALCONFIGFILE
. $VECONFIGFILE
+
. $CTCONFIGFILE
  
 
NETIF_OPTIONS=`echo $NETIF | sed 's/,/\n/g'`
 
NETIF_OPTIONS=`echo $NETIF | sed 's/,/\n/g'`
Line 157: Line 161:
 
         if [[ "$str" =~ "^ifname=" ]]; then
 
         if [[ "$str" =~ "^ifname=" ]]; then
 
                 # remove the parameter name from the string (along with '=')
 
                 # remove the parameter name from the string (along with '=')
                 VEIFNAME=${str#*=};
+
                 CTIFNAME=${str#*=};
 
         fi
 
         fi
 
         # getting 'host_ifname' parameter value
 
         # getting 'host_ifname' parameter value
Line 167: Line 171:
  
 
if [ ! -n "$VETH_IP_ADDRESS" ]; then
 
if [ ! -n "$VETH_IP_ADDRESS" ]; then
   echo "According to $CONFIGFILE VE$VEID has no veth IPs configured."
+
   echo "According to $CONFIGFILE CT$VEID has no veth IPs configured."
 
   exit 1
 
   exit 1
 
fi
 
fi
  
 
if [ ! -n "$VZHOSTIF" ]; then
 
if [ ! -n "$VZHOSTIF" ]; then
   echo "According to $CONFIGFILE VE$VEID has no veth interface configured."
+
   echo "According to $CONFIGFILE CT$VEID has no veth interface configured."
 
   exit 1
 
   exit 1
 
fi
 
fi
  
if [ ! -n "$VEIFNAME" ]; then
+
if [ ! -n "$CTIFNAME" ]; then
 
   echo "Corrupted $CONFIGFILE: no 'ifname' defined for host_ifname $VZHOSTIF."
 
   echo "Corrupted $CONFIGFILE: no 'ifname' defined for host_ifname $VZHOSTIF."
 
   exit 1
 
   exit 1
 
fi
 
fi
  
echo "Initializing interface $VZHOSTIF for VE$VEID."
+
echo "Initializing interface $VZHOSTIF for CT$VEID."
 
$ifconfig $VZHOSTIF 0
 
$ifconfig $VZHOSTIF 0
  
VEROUTEDEV=$VZHOSTIF
+
CTROUTEDEV=$VZHOSTIF
  
 
if [ -n "$BRIDGEDEV" ]; then
 
if [ -n "$BRIDGEDEV" ]; then
 
   echo "Adding interface $VZHOSTIF to the bridge $BRIDGEDEV."
 
   echo "Adding interface $VZHOSTIF to the bridge $BRIDGEDEV."
   VEROUTEDEV=$BRIDGEDEV
+
   CTROUTEDEV=$BRIDGEDEV
 
   $brctl addif $BRIDGEDEV $VZHOSTIF
 
   $brctl addif $BRIDGEDEV $VZHOSTIF
 
fi
 
fi
  
# Up the interface $VEIFNAME link in VE$VEID
+
# Up the interface $CTIFNAME link in CT$VEID
$vzctl exec $VEID $ip link set $VEIFNAME up
+
$vzctl exec $VEID $ip link set $CTIFNAME up
  
 
for IP in $VETH_IP_ADDRESS; do
 
for IP in $VETH_IP_ADDRESS; do
   echo "Adding an IP $IP to the $VEIFNAME for VE$VEID."
+
   echo "Adding an IP $IP to the $CTIFNAME for CT$VEID."
   $vzctl exec $VEID $ip address add $IP dev $VEIFNAME
+
   $vzctl exec $VEID $ip address add $IP dev $CTIFNAME
  
 
   # removing the netmask
 
   # removing the netmask
 
   IP_STRIP=${IP%%/*};
 
   IP_STRIP=${IP%%/*};
  
   echo "Adding a route from CT0 to VE$VEID."
+
   echo "Adding a route from CT0 to CT$VEID."
   $ip route add $IP_STRIP dev $VEROUTEDEV
+
   $ip route add $IP_STRIP dev $CTROUTEDEV
 
done
 
done
  
 
if [ -n "$CT0_IP" ]; then
 
if [ -n "$CT0_IP" ]; then
   echo "Adding a route from VE$VEID to CT0."
+
   echo "Adding a route from CT$VEID to CT0."
   $vzctl exec $VEID $ip route add $CT0_IP dev $VEIFNAME
+
   $vzctl exec $VEID $ip route add $CT0_IP dev $CTIFNAME
 
fi
 
fi
  
 
if [ -n "$VE_DEFAULT_GATEWAY" ]; then
 
if [ -n "$VE_DEFAULT_GATEWAY" ]; then
   echo "Setting $VE_DEFAULT_GATEWAY as a default gateway for VE$VEID."
+
   echo "Setting $VE_DEFAULT_GATEWAY as a default gateway for CT$VEID."
 
   $vzctl exec $VEID \
 
   $vzctl exec $VEID \
         $ip route add default via $VE_DEFAULT_GATEWAY dev $VEIFNAME
+
         $ip route add default via $VE_DEFAULT_GATEWAY dev $CTIFNAME
 
fi
 
fi
  
Line 221: Line 225:
 
<p><small>Note: this script can be easily extended to work for multiple triples &lt;bridge, ip address, veth device&gt;, see http://vireso.blogspot.com/2008/02/2-veth-with-2-brindges-on-openvz-at.html </small></p>
 
<p><small>Note: this script can be easily extended to work for multiple triples &lt;bridge, ip address, veth device&gt;, see http://vireso.blogspot.com/2008/02/2-veth-with-2-brindges-on-openvz-at.html </small></p>
  
==== Make the script to be run on a VE start ====
+
==== Make the script to be run on a container start ====
In order to run above script on a VE start create the file <code>/etc/vz/vznet.conf</code> with the following contents:
+
In order to run above script on a container start create the file
 +
<code>/etc/vz/vznet.conf</code> with the following contents:
  
 
  EXTERNAL_SCRIPT="/usr/sbin/vznetcfg.custom"
 
  EXTERNAL_SCRIPT="/usr/sbin/vznetcfg.custom"
  
{{Note|<code>/usr/sbin/vznetcfg.custom</code> should be executable.(chmod +x /usr/sbin/vznetcfg.custom)}}
+
{{Note|<code>/usr/sbin/vznetcfg.custom</code> should be executable (chmod +x /usr/sbin/vznetcfg.custom)}}
  
==== Setting the route VE → HN ====
+
==== Setting the route CT → HN ====
To set up a route from the VE to the HN, the custom script has to get a HN IP (the $CT0_IP variable in the script). There are several ways to specify it:
+
To set up a route from the CT to the HN, the custom script has to get a HN IP (the $CT0_IP variable in the script). There are several ways to specify it:
  
 
# Add an entry CT0_IP="CT0 IP" to the <code>$VEID.conf</code>
 
# Add an entry CT0_IP="CT0 IP" to the <code>$VEID.conf</code>
Line 241: Line 246:
 
Let's assign eth0 for the external traffic and eth1 for the local one.
 
Let's assign eth0 for the external traffic and eth1 for the local one.
  
If there is no need to make the VE accessible from the HN and vice versa, it's enough to replace 'br0' with 'eth1' in the following steps of the above configuration:
+
If there is no need to make the container accessible from the HN and vice versa, it's enough to replace 'br0' with 'eth1' in the following steps of the above configuration:
 
* Hardware Node configuration → [[Using_private_IPs_for_Hardware_Nodes#Assign_the_IP_to_the_bridge|Assign the IP to the bridge]]
 
* Hardware Node configuration → [[Using_private_IPs_for_Hardware_Nodes#Assign_the_IP_to_the_bridge|Assign the IP to the bridge]]
 
* Hardware Node configuration → [[Using_private_IPs_for_Hardware_Nodes#Resurrect_the_default_routing|Resurrect the default routing]]
 
* Hardware Node configuration → [[Using_private_IPs_for_Hardware_Nodes#Resurrect_the_default_routing|Resurrect the default routing]]
  
It is nesessary to set a local IP for 'br0' to ensure VE ↔ HN connection availability.
+
It is nesessary to set a local IP for 'br0' to ensure CT ↔ HN connection availability.
  
 
== Putting containers to different subnetworks ==
 
== Putting containers to different subnetworks ==
 
It's enough to set up the correct $VETH_IP_ADDRESS and $VE_DEFAULT_GATEWAY values in the  
 
It's enough to set up the correct $VETH_IP_ADDRESS and $VE_DEFAULT_GATEWAY values in the  
[[Using_private_IPs_for_Hardware_Nodes#Edit_the_VE.27s_configuration|above configuration]].
+
[[Using_private_IPs_for_Hardware_Nodes#Edit_the_container.27s_configuration|above configuration]].
  
 
== See also ==
 
== See also ==

Revision as of 13:12, 11 March 2008

This article describes how to assign public IPs to containers running on OVZ Hardware Nodes in case you have a following network topology:

An initial network topology

Prerequisites

This configuration was tested on a RHEL5 OpenVZ Hardware Node and a container based on a Fedora Core 5 template. Other host OSs and templates might require some configuration changes, please add corresponding OS specific changes if you've faced any.

This article assumes the presence of 'brctl', 'ip' and 'ifconfig' utils. You may need to install missing packages like 'bridge-utils'/'iproute'/'net-tools' or others which contain those utilities.

This article assumes you have already installed OpenVZ, prepared the OS template cache(s) and have container(s) created. If not, follow the links to perform the steps needed.

Yellowpin.svg Note: don't assign an IP after container creation.

An OVZ Hardware Node has the only one Ethernet interface

(assume eth0)

Hardware Node configuration

Create a bridge device

[HN]# brctl addbr br0

Remove an IP from eth0 interface

[HN]# ifconfig eth0 0

Add eth0 interface into the bridge

[HN]# brctl addif br0 eth0

Assign the IP to the bridge

(the same that was assigned on eth0 earlier)

[HN]# ifconfig br0 10.0.0.2/24

Resurrect the default routing

[HN]# ip route add default via 10.0.0.1 dev br0

Warning.svg Warning: if you are configuring the node remotely you must prepare a script with the above commands and run it in background with the redirected output or you'll lose the access to the Node.

A script example

[HN]# cat /tmp/br_add 
#!/bin/bash

brctl addbr br0
ifconfig eth0 0 
brctl addif br0 eth0 
ifconfig br0 10.0.0.2/24 
ip route add default via 10.0.0.1 dev br0
[HN]# /tmp/br_add >/dev/null 2>&1 &

Container configuration

Start a container

[HN]# vzctl start 101

Add a veth interface to the container

[HN]# vzctl set 101 --netif_add eth0 --save

Set up an IP to the newly created container's veth interface

[HN]# vzctl exec 101 ifconfig eth0 85.86.87.195/26

Add the container's veth interface to the bridge

[HN]# brctl addif br0 veth101.0
Yellowpin.svg Note: There will be a delay of about 15 seconds(default for 2.6.18 kernel) while the bridge software runs STP to detect loops and transitions the veth interface to the forwarding state.

Set up the default route for the container

[HN]# vzctl exec 101 ip route add default via 85.86.87.193 dev eth0

(Optional) Add CT↔HN routes

The above configuration provides the following connections:

  • CT X ↔ CT Y (where CT X and CT Y can locate on any OVZ HN)
  • CT ↔ Internet

Note that

  • The accessability of the CT from the HN depends on the local gateway providing NAT (probably - yes)
  • The accessability of the HN from the CT depends on the ISP gateway being aware of the local network (probably not)

So to provide CT ↔ HN accessibility despite the gateways' configuration you can add the following routes:

[HN]# ip route add 85.86.87.195 dev br0
[HN]# vzctl exec 101 ip route add 10.0.0.2 dev eth0

Resulting OpenVZ Node configuration

Resulting OpenVZ Node configuration

Making the configuration persistent

Set up a bridge on a HN

This can be done by configuring the ifcfg-* files located in /etc/sysconfig/network-scripts/.

Assuming you had a configuration file (e.g. ifcfg-eth0) like:

DEVICE=eth0
ONBOOT=yes
IPADDR=10.0.0.2
NETMASK=255.255.255.0
GATEWAY=10.0.0.1

To automatically create bridge br0 you can create ifcfg-br0:

DEVICE=br0
TYPE=Bridge
ONBOOT=yes
IPADDR=10.0.0.2
NETMASK=255.255.255.0
GATEWAY=10.0.0.1

and edit ifcfg-eth0 to add the eth0 interface into the bridge br0:

DEVICE=eth0
ONBOOT=yes
BRIDGE=br0

Edit the container's configuration

Add these parameters to the /etc/vz/conf/$CTID.conf file which will be used during the network configuration:

  • Add/change CONFIG_CUSTOMIZED="yes" (indicates that a custom
 script should be run on a container start)
  • Add VETH_IP_ADDRESS="IP/MASK" (a container can have multiple
 IPs separated by spaces)
  • Add VE_DEFAULT_GATEWAY="CT DEFAULT GATEWAY"
  • Add BRIDGEDEV="BRIDGE NAME" (a bridge name to which the
 container veth interface should be added)

An example:

# Network customization section
CONFIG_CUSTOMIZED="yes"
VETH_IP_ADDRESS="85.86.87.195/26"
VE_DEFAULT_GATEWAY="85.86.87.193"
BRIDGEDEV="br0"

Create a custom network configuration script

which should be called each time a container is started (e.g. /usr/sbin/vznetcfg.custom):

#!/bin/bash
# /usr/sbin/vznetcfg.custom
# a script to bring up bridged network interfaces (veth's) in a container

GLOBALCONFIGFILE=/etc/vz/vz.conf
CTCONFIGFILE=/etc/vz/conf/$VEID.conf
vzctl=/usr/sbin/vzctl
brctl=/usr/sbin/brctl
ip=/sbin/ip
ifconfig=/sbin/ifconfig
. $GLOBALCONFIGFILE
. $CTCONFIGFILE

NETIF_OPTIONS=`echo $NETIF | sed 's/,/\n/g'`
for str in $NETIF_OPTIONS; do \
        # getting 'ifname' parameter value
        if [[ "$str" =~ "^ifname=" ]]; then
                # remove the parameter name from the string (along with '=')
                CTIFNAME=${str#*=};
        fi
        # getting 'host_ifname' parameter value
        if [[ "$str" =~ "^host_ifname=" ]]; then
                # remove the parameter name from the string (along with '=')
                VZHOSTIF=${str#*=};
        fi
done

if [ ! -n "$VETH_IP_ADDRESS" ]; then
   echo "According to $CONFIGFILE CT$VEID has no veth IPs configured."
   exit 1
fi

if [ ! -n "$VZHOSTIF" ]; then
   echo "According to $CONFIGFILE CT$VEID has no veth interface configured."
   exit 1
fi

if [ ! -n "$CTIFNAME" ]; then
   echo "Corrupted $CONFIGFILE: no 'ifname' defined for host_ifname $VZHOSTIF."
   exit 1
fi

echo "Initializing interface $VZHOSTIF for CT$VEID."
$ifconfig $VZHOSTIF 0

CTROUTEDEV=$VZHOSTIF

if [ -n "$BRIDGEDEV" ]; then
   echo "Adding interface $VZHOSTIF to the bridge $BRIDGEDEV."
   CTROUTEDEV=$BRIDGEDEV
   $brctl addif $BRIDGEDEV $VZHOSTIF
fi

# Up the interface $CTIFNAME link in CT$VEID
$vzctl exec $VEID $ip link set $CTIFNAME up

for IP in $VETH_IP_ADDRESS; do
   echo "Adding an IP $IP to the $CTIFNAME for CT$VEID."
   $vzctl exec $VEID $ip address add $IP dev $CTIFNAME

   # removing the netmask
   IP_STRIP=${IP%%/*};

   echo "Adding a route from CT0 to CT$VEID."
   $ip route add $IP_STRIP dev $CTROUTEDEV
done

if [ -n "$CT0_IP" ]; then
   echo "Adding a route from CT$VEID to CT0."
   $vzctl exec $VEID $ip route add $CT0_IP dev $CTIFNAME
fi

if [ -n "$VE_DEFAULT_GATEWAY" ]; then
   echo "Setting $VE_DEFAULT_GATEWAY as a default gateway for CT$VEID."
   $vzctl exec $VEID \
        $ip route add default via $VE_DEFAULT_GATEWAY dev $CTIFNAME
fi

exit 0

Note: this script can be easily extended to work for multiple triples <bridge, ip address, veth device>, see http://vireso.blogspot.com/2008/02/2-veth-with-2-brindges-on-openvz-at.html

Make the script to be run on a container start

In order to run above script on a container start create the file /etc/vz/vznet.conf with the following contents:

EXTERNAL_SCRIPT="/usr/sbin/vznetcfg.custom"
Yellowpin.svg Note: /usr/sbin/vznetcfg.custom should be executable (chmod +x /usr/sbin/vznetcfg.custom)

Setting the route CT → HN

To set up a route from the CT to the HN, the custom script has to get a HN IP (the $CT0_IP variable in the script). There are several ways to specify it:

  1. Add an entry CT0_IP="CT0 IP" to the $VEID.conf
  2. Add an entry CT0_IP="CT0 IP" to the /etc/vz/vz.conf (the global configuration config file)
  3. Implement some smart algorithm to determine the CT0 IP right in the custom network configuration script

Each variant has its pros and cons, nevertheless for HN static IP configuration variant 2 seems to be acceptable (and the most simple).

An OpenVZ Hardware Node has two Ethernet interfaces

Assuming you have 2 interfaces eth0 and eth1 and want to separate local traffic (10.0.0.0/24) from external traffic. Let's assign eth0 for the external traffic and eth1 for the local one.

If there is no need to make the container accessible from the HN and vice versa, it's enough to replace 'br0' with 'eth1' in the following steps of the above configuration:

It is nesessary to set a local IP for 'br0' to ensure CT ↔ HN connection availability.

Putting containers to different subnetworks

It's enough to set up the correct $VETH_IP_ADDRESS and $VE_DEFAULT_GATEWAY values in the above configuration.

See also