What I want, maybe, is an interface
-device
combo, without untagged (vlan:0) traffic?
What's my issue? (Ignore the time)
(Edit: Yes, of course: Its an old ath79 device using swconfig
.)
Mon Sep 23 19:54:21 2024 kern.warn kernel: [ 3293.329954] br-vlan17: received packet on bat0.17 with own address as source address (addr:cc:32:e5:fa:e7:37, vlan:0)
Mon Sep 23 19:54:21 2024 kern.warn kernel: [ 3293.341012] br-vlan64: received packet on bat0.64 with own address as source address (addr:cc:32:e5:fa:e7:37, vlan:0)
Mon Sep 23 19:54:21 2024 kern.warn kernel: [ 3293.352065] br-vlan16: received packet on bat0.16 with own address as source address (addr:cc:32:e5:fa:e7:37, vlan:0)
Mon Sep 23 19:54:21 2024 kern.warn kernel: [ 3293.363124] br-vlan49: received packet on bat0.49 with own address as source address (addr:cc:32:e5:fa:e7:37, vlan:0)
Mon Sep 23 19:54:21 2024 kern.warn kernel: [ 3293.374183] br-vlan56: received packet on bat0.56 with own address as source address (addr:cc:32:e5:fa:e7:37, vlan:0)
Mon Sep 23 19:54:21 2024 kern.warn kernel: [ 3293.385239] br-vlan76: received packet on bat0.76 with own address as source address (addr:cc:32:e5:fa:e7:37, vlan:0)
Mon Sep 23 19:54:21 2024 kern.warn kernel: [ 3293.396295] br-vlan71: received packet on bat0.71 with own address as source address (addr:cc:32:e5:fa:e7:37, vlan:0)
Mon Sep 23 19:54:31 2024 kern.warn kernel: [ 3303.536541] br-vlan65: received packet on bat0.65 with own address as source address (addr:cc:32:e5:fa:e7:37, vlan:0)
Mon Sep 23 19:54:31 2024 kern.warn kernel: [ 3303.547703] br-vlan24: received packet on bat0.24 with own address as source address (addr:cc:32:e5:fa:e7:37, vlan:0)
Mon Sep 23 19:54:31 2024 kern.warn kernel: [ 3303.558770] br-vlan77: received packet on bat0.77 with own address as source address (addr:cc:32:e5:fa:e7:37, vlan:0)
Mon Sep 23 19:54:31 2024 kern.warn kernel: [ 3303.569835] br-vlan17: received packet on bat0.17 with own address as source address (addr:cc:32:e5:fa:e7:37, vlan:0)
Mon Sep 23 19:54:31 2024 kern.warn kernel: [ 3303.580869] br-vlan64: received packet on bat0.64 with own address as source address (addr:cc:32:e5:fa:e7:37, vlan:0)
Mon Sep 23 19:54:31 2024 kern.warn kernel: [ 3303.591893] br-vlan16: received packet on bat0.16 with own address as source address (addr:cc:32:e5:fa:e7:37, vlan:0)
Mon Sep 23 19:54:31 2024 kern.warn kernel: [ 3303.602913] br-vlan49: received packet on bat0.49 with own address as source address (addr:cc:32:e5:fa:e7:37, vlan:0)
Mon Sep 23 19:54:31 2024 kern.warn kernel: [ 3303.613935] br-vlan56: received packet on bat0.56 with own address as source address (addr:cc:32:e5:fa:e7:37, vlan:0)
Mon Sep 23 19:54:31 2024 kern.warn kernel: [ 3303.624964] br-vlan76: received packet on bat0.76 with own address as source address (addr:cc:32:e5:fa:e7:37, vlan:0)
Mon Sep 23 19:54:31 2024 kern.warn kernel: [ 3303.635986] br-vlan71: received packet on bat0.71 with own address as source address (addr:cc:32:e5:fa:e7:37, vlan:0)
Mon Sep 23 19:54:41 2024 kern.warn kernel: [ 3313.776473] br-vlan65: received packet on bat0.65 with own address as source address (addr:cc:32:e5:fa:e7:37, vlan:0)
Mon Sep 23 19:54:41 2024 kern.warn kernel: [ 3313.787629] br-vlan24: received packet on bat0.24 with own address as source address (addr:cc:32:e5:fa:e7:37, vlan:0)
Mon Sep 23 19:54:41 2024 kern.warn kernel: [ 3313.798696] br-vlan77: received packet on bat0.77 with own address as source address (addr:cc:32:e5:fa:e7:37, vlan:0)
Mon Sep 23 19:54:41 2024 kern.warn kernel: [ 3313.809758] br-vlan17: received packet on bat0.17 with own address as source address (addr:cc:32:e5:fa:e7:37, vlan:0)
Mon Sep 23 19:54:41 2024 kern.warn kernel: [ 3313.820796] br-vlan64: received packet on bat0.64 with own address as source address (addr:cc:32:e5:fa:e7:37, vlan:0)
Mon Sep 23 19:54:41 2024 kern.warn kernel: [ 3313.831822] br-vlan16: received packet on bat0.16 with own address as source address (addr:cc:32:e5:fa:e7:37, vlan:0)
Mon Sep 23 19:54:41 2024 kern.warn kernel: [ 3313.842850] br-vlan49: received packet on bat0.49 with own address as source address (addr:cc:32:e5:fa:e7:37, vlan:0)
Mon Sep 23 19:54:41 2024 kern.warn kernel: [ 3313.853872] br-vlan56: received packet on bat0.56 with own address as source address (addr:cc:32:e5:fa:e7:37, vlan:0)
Mon Sep 23 19:54:41 2024 kern.warn kernel: [ 3313.864901] br-vlan76: received packet on bat0.76 with own address as source address (addr:cc:32:e5:fa:e7:37, vlan:0)
Mon Sep 23 19:54:41 2024 kern.warn kernel: [ 3313.875921] br-vlan71: received packet on bat0.71 with own address as source address (addr:cc:32:e5:fa:e7:37, vlan:0)
# brctl show
bridge name bridge id STP enabled interfaces
br-vlan16 7fff.020010010010 no eth0.16
bat0.16
br-vlan17 7fff.020010010011 no bat0.17
eth0.17
br-vlan24 7fff.020010010018 no eth0.24
bat0.24
br-vlan49 7fff.020010010031 no bat0.49
eth0.49
br-vlan56 7fff.020010010038 no bat0.56
eth0.56
br-vlan64 7fff.020010010040 no bat0.64
eth0.64
br-vlan65 7fff.020010010041 no bat0.65
eth0.65
br-vlan71 7fff.020010010047 no bat0.71
eth0.71
br-vlan76 7fff.02001001004c no bat0.76
eth0.76
br-vlan77 7fff.02001001004d no bat0.77
eth0.77
br-vlan4094 7fff.020010010ffe no eth0.4094
As far as I can tell, eth0
and bat0
are nowwhere used "untagged", but of course the "interface" must be UP, otherwise there couldn't be an sub-interface, right?
My assumption is, because of
config device
option name 'bat0'
option macaddr '02:00:10:00:00:01'
config interface 'bat0'
option proto 'batadv'
option routing_algo 'BATMAN_IV'
config interface 'bat0_mesh0'
option proto 'batadv_hardif'
option master 'bat0'
config interface 'bat0_mesh1'
option proto 'batadv_hardif'
option master 'bat0'
config interface 'bat0_eth0'
option proto 'batadv_hardif'
option master 'bat0'
option device 'eth0'
eth0
is directly attached to bat0
.
- Do have to(?) add each
eth0.<N>
aslist device
onconfig interface 'bat0_eth0'
? - Can I prevent untagged (vlan:0) traffic on
eth0
, or even onbat0
, too? Is this even near a sane solution? - What do I miss here?
Thanks.