Sharing the steps I used for establishing CAPWAP tunnel between 2 Linux machines running OVS. Please find them below:
Linux machine 1: 1. ovsdb-tool create /usr/local/etc/openvswitch/conf.db vswitchd/vswitch.ovsschema 2. ovsdb-server --remote=punix:/usr/local/var/run/openvswitch/db.sock \ --remote=db:Open_vSwitch,Open_vSwitch,manager_options \ --private-key=db:Open_vSwitch,SSL,private_key \ --certificate=db:Open_vSwitch,SSL,certificate \ --bootstrap-ca-cert=db:Open_vSwitch,SSL,ca_cert \ --pidfile --detach 3. ovs-vsctl --no-wait init 4. ovs-vswitchd --pidfile -detach (Kill all instances of DHCP Client.) 5. ifconfig eth0 0.0.0.0 6. ovs-vsctl add-br br0 7. ovs-vsctl add-port br0 eth0 8. ifconfig br0 192.168.1.5 9. ovs-vsctl add-port br0 p0 10. ovs-vsctl set interface p0 type=internal 11. ip link set p0 up 12. ifconfig p0 10.0.0.1 13. ovs-vsctl add-port br0 cw0 14. ovs-vsctl set interface cw0 type=capwap options:local_ip=10.0.0.1 options:remote_ip=10.0.0.2 options:key=1234 Linux machine 2: 1. ovsdb-tool create /usr/local/etc/openvswitch/conf.db vswitchd/vswitch.ovsschema 2. ovsdb-server --remote=punix:/usr/local/var/run/openvswitch/db.sock \ --remote=db:Open_vSwitch,Open_vSwitch,manager_options \ --private-key=db:Open_vSwitch,SSL,private_key \ --certificate=db:Open_vSwitch,SSL,certificate \ --bootstrap-ca-cert=db:Open_vSwitch,SSL,ca_cert \ --pidfile --detach 3. ovs-vsctl --no-wait init 4. ovs-vswitchd --pidfile -detach (Kill all instances of DHCP Client.) 5. ifconfig eth0 0.0.0.0 6. ovs-vsctl add-br br0 7. ovs-vsctl add-port br0 eth0 8. ifconfig br0 192.168.1.6 9. ovs-vsctl add-port br0 p0 10. ovs-vsctl set interface p0 type=internal 11. ip link set p0 up 12. ifconfig p0 10.0.0.2 13. ovs-vsctl add-port br0 cw0 14. ovs-vsctl set interface cw0 type=capwap options:local_ip=10.0.0.2 options:remote_ip=10.0.0.1 options:key=1234 Thanks Vivek
_______________________________________________ discuss mailing list discuss@openvswitch.org http://openvswitch.org/mailman/listinfo/discuss