[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-users] XCP - openvswitch network isolation / antispoofing


  • To: xen-users@xxxxxxxxxxxxxxxxxxx
  • From: Kristoffer Egefelt <dr.fersken@xxxxxxxxx>
  • Date: Wed, 23 Mar 2011 11:14:33 +0100
  • Delivery-date: Wed, 23 Mar 2011 03:15:32 -0700
  • Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:date:message-id:subject:from:to:content-type; b=Wp34cV/yttiBkl3NPHFWBRCLjm1f6OLdlLYruWKZktvh1Gaac5TLDM0uIywpS0njnM cQLT/yAWDqGgOd/iX/1Y39Vpg8eYx/mY2++7i8YA7dpDjWoWQEIryae/R2u9QEhVT0/R Sp6Llzqi8bVsfFjt66iehVbAuiRsu+PzX1s7M=
  • List-id: Xen user discussion <xen-users.lists.xensource.com>

Hi list,

Searching the xen and openvswitch forums I've not been able to clarify
if anti spoofing really is possible using the openvswitch included in
XCP 1.0.

If anybody figured it out, would you care to explain:

1) How?
2) Will the configuration persist after xcp host reboot?
3) Will the configuration persist after VM migration?

If not - are there any other possibilities other than disabling
openvswitch and using the good old bridges?

Regards
Kristoffer

_______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-users


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.