Goodmorning everybody,

As in object I've some problems modifying the MAC destination address of packets that come through the switch.

I thought it was a controller issue. To check I decided to connect to a controller with no rules (to make the switch not acting as an L2 learing switch bypassing manual flows inserted...) and then I inserded a new flow with the command ovs-ofctl add-flow ...

The error remains the same:

1) WRONG: ovs-ofctl add-flow br0 priority=50,hard_timeout=0,idle_timeout=0,dl_dst=00:50:56:8a:14:13,dl_type=0x800,
    nw_proto=6,tp_dst=35000,action=mod_dl_dst:00:50:56:8a:14:20,output:1

-----> After generating from a client a packet (for example telnet google.com 35000) directed to the switch, if I tcpdump on eth1 (port 1 of the OVS) I see the following:

/15:47:31.931509 08:00:01:00:01:00 (oui Unknown) Unknown SSAP 0x8a > 00:50:56:8a:14:20 (oui Unknown) Unknown DSAP 0x56 Information, send seq 10, rcv seq 16, Flags [Command], length 60 15:47:32.933446 08:00:01:00:01:00 (oui Unknown) Unknown SSAP 0x8a > 00:50:56:8a:14:20 (oui Unknown) Unknown DSAP 0x56 Information, send seq 10, rcv seq 16, Flags [Command], length 60 15:47:34.939462 08:00:01:00:01:00 (oui Unknown) Unknown SSAP 0x8a > 00:50:56:8a:14:20 (oui Unknown) Unknown DSAP 0x56 Information, send seq 10, rcv seq 16, Flags [Command], length 60 15:47:31.931509 08:00:01:00:01:00 (oui Unknown) Unknown SSAP 0x8a > 00:50:56:8a:14:20 (oui Unknown) Unknown DSAP 0x56 Information, send seq 10, rcv seq 16, Flags [Command], length 60 15:47:32.933446 08:00:01:00:01:00 (oui Unknown) Unknown SSAP 0x8a > 00:50:56:8a:14:20 (oui Unknown) Unknown DSAP 0x56 Information, send seq 10, rcv seq 16, Flags [Command], length 60 15:47:34.939462 08:00:01:00:01:00 (oui Unknown) Unknown SSAP 0x8a > 00:50:56:8a:14:20 (oui Unknown) Unknown DSAP 0x56 Information, send seq 10, rcv seq 16, Flags [Command], length 60/

2) CORRECT (but without modyfing the destination MAC address): ovs-ofctl add-flow br0 priority=50,hard_timeout=0,idle_timeout=0,dl_dst=00:50:56:8a:14:13,dl_type=0x800, nw_proto=6,tp_dst=35000,action=output:1

-----> After generating from a client a packet (for example telnet google.com 35000) directed to the switch, In this case with tcpdump on eth1 (port 1) this is what I see: /15:53:33.459905 IP 10.0.1.1.49217 > mil01s16-in-f2.1e100.net.35000: Flags [S], seq 86657103, win 14600, options [mss 1460,sackOK,TS val 1300076888 ecr 0,nop,wscale 4], length 0/

Of course this means that packet goes out correctly from port 1, but in this way I didn't modify the MAC.....Does anyone know how could I do this correctly? Maybe something wrong? Another thing: when I write idle_timeout=0 and hard_timeout=0 I expect (as documentation says) that flow never expire, but this doesn't happen....after few seconds of inactivity it's deleted.


Luca Prete

_______________________________________________
discuss mailing list
discuss@openvswitch.org
http://openvswitch.org/mailman/listinfo/discuss

Reply via email to