Thanks, Justin.

How would you describe the tradeoffs between the two choices? Is it
accurate to say reflexive learning is not as performant as it cuts into how
many flows a megaflow can wildcard, e.g. the less that can be wildcarded,
the more OVS will have to hit userspace for flows?

Amir


On Mon, Dec 16, 2013 at 10:48 AM, Justin Pettit <jpet...@nicira.com> wrote:

> Those are the current best methods.  I've been looking at using Linux's
> conntracker and then having the ability for OVS to match the connection
> state.  I have a prototype working, but it's too early to know whether it's
> a viable approach (both from a technical and upstream-able perspective).
>  If it works out, I think it will provide a good combination of speed and
> correctness.  We should know more about its viability in the next few weeks.
>
> --Justin
>
>
> On Dec 16, 2013, at 8:33 AM, Amir Sadoughi <amir.sadou...@gmail.com>
> wrote:
>
> > How many different ways are there to create firewalls with OVS? So far,
> I know of:
> >
> > 1. reflexive learn actions
> >
> > 2. stateless ACLs with tcp_flags=ack
> >
> > Are there are any other (better?) ways I am missing? My motivation being
> creating Open vSwitch-based security groups in OpenStack Neutron <
> https://blueprints.launchpad.net/neutron/+spec/ovs-firewall-driver>.
> >
> > Thanks in advance,
> >
> > Amir Sadoughi
> >
> >
> >
> >
> > _______________________________________________
> > discuss mailing list
> > discuss@openvswitch.org
> > http://openvswitch.org/mailman/listinfo/discuss
>
>
_______________________________________________
discuss mailing list
discuss@openvswitch.org
http://openvswitch.org/mailman/listinfo/discuss

Reply via email to