Hi,

Some of the people working for OPNFV in Madrid are involved in the ETSI NFV 
Plugtest where interoperability among different MANO orchestrators, NFVis and 
VNFs is being tested. There we have brought an OPNFV Colorado environment 
configured to deploy Service Chaining (including Openstack + Openstack Tacker + 
ODL Boron), however most of the requirements are related to basic connectivity 
to be provided by ODL as a Neutron backend. In our case, and given we are using 
SFC module the Neutron back-end is old Netvirt, since integration with new 
Netvirt is not finished.

I don't know how the final results of the Plugtest will be published by ETSI, 
but in general I would say tests have gone quite well for OPNFV, but we have 
found some issues we have not been able to solve and we wonder if you guys are 
thinking on solving them (or are already solved) in new Netvirt or maybe we 
have done something wrong and not taken something into account:


1.       Attach to flat provider network:

We are not completely sure, whether this is provided by ODL, but it seems not 
to be provided by Networking ODL in Openstack yet. Please, see the following 
proposed change in Networking ODL (not approved yet): 
https://review.openstack.org/#/c/425246/


2.       Some VNFs were working as a pure bump in the wire, re-injecting 
traffic received from a user, including a MAC/IP different than the VM's (i.e. 
not doing MAC re-writing). In these situations, Openstack port security was 
preventing from what it is considering an anti-spoofing attack. In that sense 
we considered three different options:


-          Disable completely port security in 
/etc/neutron/plugins/ml2/ml2_conf.ini, by setting port_security_enabled to 
false. This solution is too wide and unsecure, so we did not apply it. On the 
other hand, we already had some other VMs running with security groups 
associated, so we were not sure if that might be a problem.

-          Disable port security in the network to be used. Unfortunately, this 
possibility that is available from Mitaka (included in August) was not still 
available in the Mirantis Openstack version 
(https://review.openstack.org/#/c/306470/) we were using, but we wonder if this 
is supported by ODL-Netvirt (old and new). The neutron command would be the 
following:

o   neutron net-create <whatever_network> --port_security_enabled=False

-          Finally, the last option we saw, was disabling port security and 
security groups in each and every port. The VM is attached to a network without 
disabling security groups, but as a next step, port security is disabled in the 
port using the following commands:

o   neutron port-update --no-security-groups PORT_ID

o   neutron port-update  --port-security-enabled=False

This option was crashing in ODL throwing a java exception, is that supported in 
new Netvirt?

 So, to sum up, are you aware of these issues in old Netvirt? Are they really 
issues? Is there a workaround? And the most important thing, in case they are 
real issues, are they already solved in new netvirt or will they be solved?

My apologies if you have received this e-mail twice, I already sent it some 
minutes ago, but I'm not sure if was properly sent

Thanks and best regards,

Juanma

[Ericsson]<http://www.ericsson.com/>
JUAN MANUEL FERNANDEZ
SDN System Engineer

Ericsson
Via de los Poblados 13
28043, Spain
Phone +34 913392408
Mobile +34 618837205
Office 8402408
[email protected]<mailto:[email protected]>
www.ericsson.com<http://www.ericsson.com>


Legal entity: Ericsson EspaƱa, S.A., registered office in Madrid. This 
Communication is Confidential. We only send and receive email on the basis of 
the terms set out at 
www.ericsson.com/email_disclaimer<http://www.ericsson.com/email_disclaimer>

_______________________________________________
sfc-dev mailing list
[email protected]
https://lists.opendaylight.org/mailman/listinfo/sfc-dev

Reply via email to