Thanks Danny for the reply. If I understand we can not analyse the traffic on SFs since the real one is encapsulated by NSH.
Someone has already tried SFC-103 demo on Openstack platform ? Regards, On 5 September 2016 at 01:30, Zhou, Danny <[email protected]> wrote: > The SFC-103 only includes the NSH aware SF, which means the SF recognizes > the NSH as well as transports (e.g. VxLAN-GPE, Eth) in > > front of the original frame (say the TCP/HTTP packet in your case), so the > SFF should keep the NSH instead of removing them. > > > > The SFC-104 demo post Boron will be including VPP based NSH proxy which > could remove the NSH when steering traffic to > > NSH unaware SFs. > > > > *From:* [email protected] [mailto: > [email protected]] *On Behalf Of *Alioune > *Sent:* Monday, September 5, 2016 5:40 AM > *To:* sfc-dev opendaylight <[email protected]> > *Subject:* [sfc-dev] SFC-103 SF NSH aware > > > > Hi all, > > I'm testing the SFC 103 demo, after launching the demo.sh all nodes and > SFC services are corretlly configured. > > I run tcpdump on eth0 in SF1 and I expect to se e the HTTP traffic but it > is encapsulated in UDP frames. > > > > Why does the SFF1 not remove the NSH headers ? > > Is there specific configuration for doing that ? > > > > Regards, >
_______________________________________________ sfc-dev mailing list [email protected] https://lists.opendaylight.org/mailman/listinfo/sfc-dev
