public inbox for cip-dev@lists.cip-project.org
 help / color / mirror / Atom feed
* [cip-dev] B@D network setup
@ 2017-11-06  9:49 Daniel Wagner
  2017-11-07  2:40 ` Daniel Sangorrin
  0 siblings, 1 reply; 9+ messages in thread
From: Daniel Wagner @ 2017-11-06  9:49 UTC (permalink / raw)
  To: cip-dev

Hi Robert,

Finally I found some time to test/setup the B at D VM. I struggle a bit
with the network setup. If I understand it correctly, the VM needs to be
bridged to the main network:

  # Forward port 8888 for the internal REST server
  config.vm.network :forwarded_port, guest: 8888, host: 8888
  # Forward port 8010 for the Storage Server
  config.vm.network :forwarded_port, guest: 8010, host: 8010
  # Forward port 5000 for the KernelCI Frontend Web Server
  config.vm.network :forwarded_port, guest: 5000, host: 5000
  # Forward port 80 for the http Lava Frontend Web Server
  config.vm.network :forwarded_port, guest: 8080, host: 8080
  # Forward port 443 for the https Lava Frontend Web Server
  config.vm.network :forwarded_port, guest: 443, host: 4443
  # Configure network accessibility for tftp server
  config.vm.network "public_network", use_dhcp_assigned_default_route: true


At least the documentation is pointing in this direction:

"""
Public Networks

Network identifier: public_network

Vagrant public networks are less private than private networks, and the
exact meaning actually varies from provider to provider, hence the
ambiguous definition. The idea is that while private networks should
never allow the general public access to your machine, public networks can.

Confused? We kind of are, too. It is likely that public networks will be
replaced by :bridged in a future release, since that is in general what
should be done with public networks, and providers that do not support
bridging generally do not have any other features that map to public
networks either.
"""

This is a problem in our corporate network. I am not allowed to attach
devices to our network without permission. That normally means I need a
certificate for Ethernet port authentication. This will not really work
with TFTP booting.

Furthermore, I wouldn't be surprised if your switches are filtering the
BOOTP/DHCP protocol out. Sysadmins usually are not too happy if a rouge
BOOTP/DHCP servers are active in the network.

So my question is, couldn't we add additional network interface, e.g.
USB Ethernet adapter, and attach the device under test to this
interface? I don't know if Vagrant is offering such an option. In the
past I've done this with Qemu.

Thanks,
Daniel

^ permalink raw reply	[flat|nested] 9+ messages in thread

end of thread, other threads:[~2017-11-07 14:19 UTC | newest]

Thread overview: 9+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2017-11-06  9:49 [cip-dev] B@D network setup Daniel Wagner
2017-11-07  2:40 ` Daniel Sangorrin
2017-11-07  8:47   ` Daniel Wagner
2017-11-07 10:54     ` Robert Marshall
2017-11-07 11:42       ` Daniel Wagner
2017-11-07 11:58     ` Agustin Benito Bethencourt
2017-11-07 12:09       ` Robert Marshall
2017-11-07 14:13         ` Daniel Wagner
2017-11-07 14:19           ` Robert Marshall

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox