Ok, I have a /30 on the wireless
VPLS on the /30
Bridge between ether1 and vpls1
Damned ugly way to do it, but it works!
IP路由流量是智慧h no more redirects. YAY!
VLAN traffic is being bridged over the VPLS tunnel. YAY!
Layer3 broadcast traffic is also bridged over VPLS. BOO!
Now, I'm the sort of guy who loves to play with things, and normally, I'm not afraid to break things. However, I've already killed 2 routers attempting to figure this out, and I'm not sure I want to risk another until I get some feedback.
How, specifically, do I keep the crap off the bridge? A filter to block all IP traffic scares the crap out of me because ROS behaves as if the IP is bound to the bridge, and not to the physical interface. Behold:
[admin@some_dumb_router] > /ip ad pr Flags: X - disabled, I - invalid, D - dynamic # ADDRESS NETWORK INTERFACE 0 aaa.bb.cc.29/32 aaa.bb.cc.29 lo0 1 aaa.bb.cc.218/30 aaa.bb.cc.216 backhaul 2 aaa.bb.cc.177/28 aaa.bb.cc.176 ether1 [admin@some_dumb_router] > /ip arp pr Flags: X - disabled, I - invalid, H - DHCP, D - dynamic # ADDRESS MAC-ADDRESS INTERFACE 0 D aaa.bb.cc.180 00:XX:XX:XX:XX:74 bridge1 1 D aaa.bb.cc.179 00:XX:XX:XX:XX:56 bridge1 2 D aaa.bb.cc.217 00:XX:XX:XX:XX:E9 backhaul 3 D aaa.bb.cc.178 00:XX:XX:XX:XX:41 bridge1
If I block non-vlan traffic, won't that prevent packets from getting to the IP, which ROS treats as being on the bridge rather than on the physical interface?