Hi Andrew, Andrew Lunn <and...@lunn.ch> writes:
> On Thu, Mar 30, 2017 at 05:37:15PM -0400, Vivien Didelot wrote: >> Implement the DSA cross-chip bridging operations by remapping the local >> ports an external source port can egress frames to, when this cross-chip >> port joins or leaves a bridge. >> >> The PVT is no longer configured with all ones allowing any external >> frame to egress any local port. Only DSA and CPU ports, as well as >> bridge group members, can egress frames on local ports. > > With the ZII devel B, we have two switches with PVT, and one > without. What happens in this setup? Can the non-PVT switch leak > frames out user ports which should otherwise be blocked? If CONFIG_BRIDGE_VLAN_FILTERING isn't enabled in the kernel, the non-PVT switch would indeed have no mean to restrict arbitrary external frames. So in that setup, yes the switch can theorically leak frames. With a VLAN-filtering aware system, the VTU policy and 802.1Q Secure port mode should guard against that. Thanks, Vivien