Re: [ovs-discuss] Is it possible to protect CAPWAP tunnel through IPSec?

2011-05-05 Thread Jesse Gross
On Thu, May 5, 2011 at 11:21 AM, Rajesh Kumar G wrote: > Hi Jesse, > > I was trying to see if the performance degrade that is observed with > GRE+IPSec as mentioned in this mail thread > > http://www.mail-archive.com/discuss@openvswitch.org/msg00915.html > > can be overcome by trying CAPWAP tunnel

Re: [ovs-discuss] Is it possible to protect CAPWAP tunnel through IPSec?

2011-05-05 Thread Rajesh Kumar G
Hi Jesse, I was trying to see if the performance degrade that is observed with GRE+IPSec as mentioned in this mail thread http://www.mail-archive.com/discuss@openvswitch.org/msg00915.html can be overcome by trying CAPWAP tunnel instead. Is there any fix for the GRE+IPSec performance degrade yet?

Re: [ovs-discuss] Is it possible to protect CAPWAP tunnel through IPSec?

2011-05-05 Thread Jesse Gross
On Thu, May 5, 2011 at 7:39 AM, Rajesh Kumar G wrote: > Hi, > > Greetings, > > I would like to know if it is possible to protect an OVS CAPWAP tunnel using > IPSec? If Yes, what should be the SA, SP created to make the traffic hit > that? When Open vSwitch sets up IPsec tunnels itself it changes

Re: [ovs-discuss] Open vSwitch, brcompatd & OpenVZ on Debian

2011-05-05 Thread Jesse Gross
On Thu, May 5, 2011 at 4:20 AM, Sam Gaw wrote: > Thanks Gregor. > > That's what I thought but if I configure the bridge, either with ovs-vsctl or > brctl, and do an ifup the box kernel panics. If I follow the cookbook example > and then join the veth interface to it I can't see the container but

Re: [ovs-discuss] Anti-spoof rules with vlans on XCP (XENSERVER)...

2011-05-05 Thread Justin Pettit
On May 5, 2011, at 4:03 AM, Kristoffer Egefelt wrote: > From the pool master i get: > > #ovs-vsctl get-controller xapi5 > ssl:10.10.3.250:6633 > > Probably because I tried the Citrix controller at some point - should it work > if I delete it with: > > #ovs-vsctl del-controller xapi5 > > is i

[ovs-discuss] Is it possible to protect CAPWAP tunnel through IPSec?

2011-05-05 Thread Rajesh Kumar G
Hi, Greetings, I would like to know if it is possible to protect an OVS CAPWAP tunnel using IPSec? If Yes, what should be the SA, SP created to make the traffic hit that? My setup is, Host A Host B OVS - VPORT-CAPWAP <---> VPORT-CAPWAP - OVS

Re: [ovs-discuss] Open vSwitch, brcompatd & OpenVZ on Debian

2011-05-05 Thread Sam Gaw
Thanks Gregor. That's what I thought but if I configure the bridge, either with ovs-vsctl or brctl, and do an ifup the box kernel panics. If I follow the cookbook example and then join the veth interface to it I can't see the container but get a response from pings; if I assign an IP to the bri

Re: [ovs-discuss] Anti-spoof rules with vlans on XCP (XENSERVER)...

2011-05-05 Thread Kristoffer Egefelt
>From the pool master i get: #ovs-vsctl get-controller xapi5 ssl:10.10.3.250:6633 Probably because I tried the Citrix controller at some point - should it work if I delete it with: #ovs-vsctl del-controller xapi5 is it safe? Running: ovs-vsctl get-fail-mode xapi5 returns nothing... Thanks On

Re: [ovs-discuss] Open vSwitch, brcompatd & OpenVZ on Debian

2011-05-05 Thread Gregor Schaffrath
With brcompat, you should be able to set things up as they were before... However - beware two issues I personally stumbled across: 1) if you don't start with a blank ovs configuration database at boot time, you'll end up with redundant entries in it, because the debian startup scripts will add

[ovs-discuss] Open vSwitch, brcompatd & OpenVZ on Debian

2011-05-05 Thread Sam Gaw
I've been experimenting with OVS (1.1.0pre2) alongside OpenVZ running on Debian Squeeze (2.6.32-5) and was wondering if anyone had any experience or advice with this sort of setup? Normally with OpenVZ I would create a bridge and add the containers' veth interfaces to the bridge. The config in

Re: [ovs-discuss] Anti-spoof rules with vlans on XCP (XENSERVER)...

2011-05-05 Thread Justin Pettit
I think Ben is suggesting that you may have a controller configured, even if you're not running one. Do you see anything when you run the following? ovs-vsctl get-controller xapi5 I don't know that the behavior changed, but you can change the fail mode to not "fail open" by running the

Re: [ovs-discuss] Anti-spoof rules with vlans on XCP (XENSERVER)...

2011-05-05 Thread Kristoffer Egefelt
Ah, that could be the problem. I don't have a controller - I think the fail-open default changed from xcp 0.5 to 1.0. Anybody using a controller for xcp/xenserver which is pool-aware and capable of setting up antispoofing rules? Any ideas or suggestions would be appreciated. Thanks :-) Regards K