Hi, Indeed ARP spoofing is prevented by default, but AFAIK, if you want it enabled for a port / network, you can simply disable the security groups on that neutron network / port.
Best regards, Claudiu Belu ________________________________ From: Татьяна Холкина [holk...@selectel.ru] Sent: Tuesday, March 13, 2018 12:54 PM To: email@example.com Subject: [openstack-dev] [neutron] Prevent ARP spoofing Hi, I'm using an ocata release of OpenStack where the option prevent_arp_spoofing can be managed via conf. But later in pike it was removed and it was decided to prevent spoofing by default. There are cases where security features should be disabled. As I can see now we can use a port_security option for these cases. But this option should be set for a particular port or network on create. The default value is set to True  and itt is impossible to change it. I'd like to suggest to get default value for port_security  from config option. It would be nice to know your opinion.  https://github.com/openstack/neutron-lib/blob/stable/queens/neutron_lib/api/definitions/port_security.py#L21  https://github.com/openstack/neutron/blob/stable/queens/neutron/objects/extensions/port_security.py#L24 Best regards, Tatiana
__________________________________________________________________________ OpenStack Development Mailing List (not for usage questions) Unsubscribe: openstack-dev-requ...@lists.openstack.org?subject:unsubscribe http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev