Srikanth,

Its also possible to make the vxlan_tool.py be a firewall by blocking certain 
TCP ports. We even setup a demo once using this tool to read any of the NSH 
C1-C4 and use them accordingly. In that specific demo we had the classifier put 
the symmetric chain id in C3 and when the vxlan_tool blocked a port, instead of 
dropping the packets, we replied with a TCP reset to the symmetric chain id.

The tool should probably be renamed to nsh_tool.py since now it supports both 
vxgpe+nsh and eth+nsh.

Regards,

Brady

-----Original Message-----
From: Jaime Caamaño Ruiz 
<[email protected]<mailto:jaime%20%3d%3fiso-8859-1%3fq%3fcaama%3df1o%3f%3d%20ruiz%20%[email protected]%3e>>
To: [email protected] 
<[email protected]<mailto:%[email protected]%22%20%[email protected]%3e>>, 
[email protected] 
<[email protected]<mailto:%[email protected]%22%20%[email protected]%3e>>
Cc: [email protected] 
<[email protected]<mailto:%[email protected]%22%20%[email protected]%3e>>,
 [email protected] 
<[email protected]<mailto:%[email protected]%22%20%[email protected]%3e>>
Subject: Re: [sfc-dev] [opnfv-tech-discuss] Regarding vxlan_tool.py in SFC vNF
Date: Fri, 21 Apr 2017 11:11:23 +0000


Hello

Another option is

sfc/sfc-test/sfc-docker/sf_hhe/sf_hhe/sf_hhe.py

This is a basic header enrichment nsh enabled SF for testing purposes.
It has many caveats detailed in the parent dir README but may be useful
to some and can be improved.

BR
Jaime.

On jue, 2017-04-20 at 16:54 -0400, Tim Rozet wrote:


Hi Srikanth,
It just decrements the NSH service index and sends it back out, like
a dummy VNF.  I don't think it does anything else.  Would be nice to
have a real NSH enabled VNF to demo with in the future.

Tim Rozet
Red Hat SDN Team

----- Original Message -----
From: "Srikanth Lingala" 
<[email protected]<mailto:[email protected]>>
To: [email protected]<mailto:[email protected]>, 
[email protected]<mailto:[email protected]>
g
Sent: Thursday, April 20, 2017 3:53:26 PM
Subject: [opnfv-tech-discuss] Regarding vxlan_tool.py in SFC vNF


Hi,
I am working on ODL SFC. I am able to execute the basic SFC usecase.
But, I just want to understand, what vxlan_tool.py does in SFC vNF.
Is it forward packets to next vNF based on NSH header?
Can anyone please let me know, what are the specific tasks, which are
handled by vxlan_tool.py?

Regards,
Srikanth.
_______________________________________________
opnfv-tech-discuss mailing list
[email protected]<mailto:[email protected]>
https://lists.opnfv.org/mailman/listinfo/opnfv-tech-discuss
_______________________________________________
sfc-dev mailing list
[email protected]<mailto:[email protected]>
https://lists.opendaylight.org/mailman/listinfo/sfc-dev


_______________________________________________
sfc-dev mailing list
[email protected]<mailto:[email protected]>
https://lists.opendaylight.org/mailman/listinfo/sfc-dev

_______________________________________________
sfc-dev mailing list
[email protected]
https://lists.opendaylight.org/mailman/listinfo/sfc-dev

Reply via email to