Uploaded image for project: 'Red Hat OpenStack Services on OpenShift'
  1. Red Hat OpenStack Services on OpenShift
  2. OSPRH-19148

When port security is disabled (RHOSP17.1.4), packets are not passed through the tap of that port

XMLWordPrintable

    • Icon: Bug Bug
    • Resolution: Not a Bug
    • Icon: Normal Normal
    • None
    • None
    • neutron-operator
    • None
    • False
    • Hide

      None

      Show
      None
    • False
    • ?
    • None
    • Moderate

      When port security is disabled on a port (RHOSP17.1.4), all packets are not passed (flooded) through the tap of that port.   In some cases, operators expect a behavior similar to a promiscuous mode set on a physical interface .    There's an explicit flow that drops all traffic:

      recirc_id(0),in_port(4),eth(src=20:ed:47:00:00:00,dst=60:15:2b:00:00:00),eth_type(0x8100),vlan(vid=500),encap(eth_type(0x0800),ipv4(frag=no)), packets:55202, bytes:3896218, used:1.130s, flags:SPR., actions:drop
       

      which prevents the traffic from actually reaching the TAP.

              mtomaska@redhat.com Miro Tomaska
              rhn-support-dhill Dave Hill
              rhos-dfg-networking-squad-neutron
              Votes:
              0 Vote for this issue
              Watchers:
              4 Start watching this issue

                Created:
                Updated:
                Resolved: