You can absolutely analysis the NSH traffics with NSH and transport header,
using tcpdump and Wireshark which needs to
install a NSH decoder, see attached for details about that decoder.
SFC-103 starts OVS and SF using scripts, so it cannot work directly on
Openstack platform, but Tim had integrated ODL SFC
with Openstack as well as Tacker for a similar setup for SFC@OPNFV project.
From: Alioune [mailto:[email protected]]
Sent: Monday, September 5, 2016 7:48 AM
To: Zhou, Danny <[email protected]>
Cc: sfc-dev opendaylight <[email protected]>
Subject: Re: [sfc-dev] SFC-103 SF NSH aware
Thanks Danny for the reply.
If I understand we can not analyse the traffic on SFs since the real one is
encapsulated by NSH.
Someone has already tried SFC-103 demo on Openstack platform ?
Regards,
On 5 September 2016 at 01:30, Zhou, Danny
<[email protected]<mailto:[email protected]>> wrote:
The SFC-103 only includes the NSH aware SF, which means the SF recognizes the
NSH as well as transports (e.g. VxLAN-GPE, Eth) in
front of the original frame (say the TCP/HTTP packet in your case), so the SFF
should keep the NSH instead of removing them.
The SFC-104 demo post Boron will be including VPP based NSH proxy which could
remove the NSH when steering traffic to
NSH unaware SFs.
From:
[email protected]<mailto:[email protected]>
[mailto:[email protected]<mailto:[email protected]>]
On Behalf Of Alioune
Sent: Monday, September 5, 2016 5:40 AM
To: sfc-dev opendaylight
<[email protected]<mailto:[email protected]>>
Subject: [sfc-dev] SFC-103 SF NSH aware
Hi all,
I'm testing the SFC 103 demo, after launching the demo.sh all nodes and SFC
services are corretlly configured.
I run tcpdump on eth0 in SF1 and I expect to se e the HTTP traffic but it is
encapsulated in UDP frames.
Why does the SFF1 not remove the NSH headers ?
Is there specific configuration for doing that ?
Regards,
--- Begin Message ---
I just modified a lua script that I found some time ago in order to make it
compatible with VXLAN GPE + ETH + NSH for troubleshooting purporses of the SFC
demos with the new Yi Yang Patches.
It supports Protocol detection, however now VxLAN-GPE protocol ID 0x04 is
hardcoded to Ethernet and header detection and lookup of ethertype 0x894F for
NSH decoding until both OVS and ODL are moved to the 0x03 ID.
It can be downloaded from here
curl
https://raw.githubusercontent.com/platini2/sfc/master/vxlangpe-nsh-draft-ietf-nvo3.lua
tshark -i any -Y “(udp.port==6633)" -X
lua_script:vxlangpe-nsh-draft-ietf-nvo3.lua
Remember that lua scripts must be run with a user without any root/sudo
privileges.
Enjoy and let me know any comments
Patricio
_______________________________________________
sfc-dev mailing list
[email protected]
https://lists.opendaylight.org/mailman/listinfo/sfc-dev
--- End Message ---
_______________________________________________
sfc-dev mailing list
[email protected]
https://lists.opendaylight.org/mailman/listinfo/sfc-dev