RP spoofing
>>>>> mechanism. Example: I use security groups but I don't want to use ARP
>>>>> spoofing protection. How do I can disable the protection?
>>>>>
>>>>> 2018-03-14 10:26 GMT+03:00 Tatiana Kholkina <holk...@selectel.ru>:
>>>>&g
rts.
>>>>> It looks a bit complicated to me and I think it would be better to
>>>>> have an ability to set default port security via config file.
>>>>>
>>>>> Best regards,
>>>>> Tatiana
>>>>>
>>>>> 201
t security via config file.
>>>>
>>>> Best regards,
>>>> Tatiana
>>>>
>>>> 2018-03-13 15:10 GMT+03:00 Claudiu Belu <cb...@cloudbasesolutions.com>:
>>>>
>>>>> Hi,
>>>>>
>>>>> Inde
ault, but AFAIK, if you want it
>>>> enabled for a port / network, you can simply disable the security groups on
>>>> that neutron network / port.
>>>>
>>>> Best regards,
>>>>
>>>> Claudiu Belu
>>>>
>>>>
ou want it
>>> enabled for a port / network, you can simply disable the security groups on
>>> that neutron network / port.
>>>
>>> Best regards,
>>>
>>> Claudiu Belu
>>>
>>> --
>>> *From:* Татьяна Холкин
work, you can simply disable the security groups on
>> that neutron network / port.
>>
>> Best regards,
>>
>> Claudiu Belu
>>
>> --
>> *From:* Татьяна Холкина [holk...@selectel.ru]
>> *Sent:* Tuesday, March 13, 2018
ork, you can simply disable the security groups on
>> that neutron network / port.
>>
>> Best regards,
>>
>> Claudiu Belu
>>
>> --
>> *From:* Татьяна Холкина [holk...@selectel.ru]
>> *Sent:* Tuesday, March 13, 2018 1
t regards,
>
> Claudiu Belu
>
> --
> *From:* Татьяна Холкина [holk...@selectel.ru]
> *Sent:* Tuesday, March 13, 2018 12:54 PM
> *To:* openstack-dev@lists.openstack.org
> *Subject:* [openstack-dev] [neutron] Prevent ARP spoofing
>
> Hi,
&
: Tuesday, March 13, 2018 12:54 PM
To: openstack-dev@lists.openstack.org
Subject: [openstack-dev] [neutron] Prevent ARP spoofing
Hi,
I'm using an ocata release of OpenStack where the option prevent_arp_spoofing
can be managed via conf. But later in pike it was removed and it was decided to
prevent
Hi,
I'm using an ocata release of OpenStack where the option
prevent_arp_spoofing can be managed via conf. But later in pike it was
removed and it was decided to prevent spoofing by default.
There are cases where security features should be disabled. As I can see
now we can use a port_security
10 matches
Mail list logo