You can absolutely analysis the NSH traffics with NSH and transport header, 
using tcpdump and Wireshark which needs to
install a NSH  decoder, see attached for details about that decoder.

SFC-103 starts OVS and SF using scripts, so it cannot work directly on 
Openstack platform, but Tim had integrated ODL SFC
with Openstack as well as Tacker for a similar setup for SFC@OPNFV project.

From: Alioune [mailto:[email protected]]
Sent: Monday, September 5, 2016 7:48 AM
To: Zhou, Danny <[email protected]>
Cc: sfc-dev opendaylight <[email protected]>
Subject: Re: [sfc-dev] SFC-103 SF NSH aware

Thanks Danny for the reply.

If I understand we can not analyse the traffic on SFs since the real one is 
encapsulated by NSH.

Someone has already tried SFC-103 demo on Openstack platform ?

Regards,

On 5 September 2016 at 01:30, Zhou, Danny 
<[email protected]<mailto:[email protected]>> wrote:
The SFC-103 only includes the NSH aware SF, which means the SF recognizes the 
NSH as well as transports (e.g. VxLAN-GPE, Eth) in
front of the original frame (say the TCP/HTTP packet in your case), so the SFF 
should keep the NSH instead of removing them.

The SFC-104 demo post Boron will be including VPP based NSH proxy which could 
remove the NSH when steering traffic to
NSH unaware SFs.

From: 
[email protected]<mailto:[email protected]>
 
[mailto:[email protected]<mailto:[email protected]>]
 On Behalf Of Alioune
Sent: Monday, September 5, 2016 5:40 AM
To: sfc-dev opendaylight 
<[email protected]<mailto:[email protected]>>
Subject: [sfc-dev] SFC-103 SF NSH aware

Hi all,
I'm testing the SFC 103 demo, after launching the demo.sh all nodes and SFC 
services are corretlly configured.
I run tcpdump on eth0 in SF1 and I expect to se e the HTTP traffic but it is 
encapsulated in UDP frames.

Why does the SFF1 not remove the NSH headers ?
Is there specific configuration for doing that ?

Regards,

--- Begin Message ---
I just modified a lua script that I found some time ago  in order to make it 
compatible with VXLAN GPE + ETH + NSH for troubleshooting purporses of the SFC 
demos with the new Yi Yang Patches.

It supports Protocol detection, however now VxLAN-GPE protocol ID 0x04 is 
hardcoded to Ethernet and header detection and lookup of ethertype 0x894F for 
NSH decoding until both OVS and ODL are moved to the 0x03 ID.

It can be downloaded from here

curl 
https://raw.githubusercontent.com/platini2/sfc/master/vxlangpe-nsh-draft-ietf-nvo3.lua

tshark -i any -Y “(udp.port==6633)" -X 
lua_script:vxlangpe-nsh-draft-ietf-nvo3.lua

Remember that lua scripts must be run with a user without any root/sudo 
privileges.

Enjoy and let me know any comments

Patricio
_______________________________________________
sfc-dev mailing list
[email protected]
https://lists.opendaylight.org/mailman/listinfo/sfc-dev

--- End Message ---
_______________________________________________
sfc-dev mailing list
[email protected]
https://lists.opendaylight.org/mailman/listinfo/sfc-dev

Reply via email to