Changes between Version 67 and Version 68 of GEC16Agenda/OpenFlow/Instructions/Execute


Ignore:
Timestamp:
03/29/13 17:20:17 (11 years ago)
Author:
nriga@bbn.com
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • GEC16Agenda/OpenFlow/Instructions/Execute

    v67 v68  
    193193to verify the duplication by doing a `tcpdump`  on the port on the ovs switch.
    194194
    195   1. Open a new terminal to the OVS switch.
    196 
    197   2. Look at the sliver details page in the portal and see what interface is bound to OVS:if2 and run tcpdump on the interface. This will allow you to see all traffic going out that interface
    198   {{{
    199   sudo tcpdump -i ethX
     195  1. Open two new terminals to the OVS switch.
     196
     197  2. Look at the sliver details page in the portal and see what interfaces are bound to OVS:if1 and OVS:if2, use the MAC address of the interface to figure this out. Run tcpdump on these interfaces; one in each of the new terminals you opened. This will allow you to see all traffic going out the interfaces
     198  {{{
     199  sudo tcpdump -i <data_interface_name>
    200200  }}}
    201201
     
    209209     ii. !DuplicateTraffic.py : this has the actual solution you can just run this if you don't want to bother with writing a controller.
    210210
    211    To run the controller do (while at /local/pox directory)
     211   To run the controller do (while at /local/pox directory) where the <data_interface_name> should be the one that corresponds to OVS:if2 :
    212212    {{{
    213213    ./pox.py --verbose myDuplicateTraffic \
    214                   --duplicate_port=ethX
     214                  --duplicate_port=<data_interface_name>
    215215    }}}
    216216   
     
    220220    }}}
    221221
    222     At the terminal of host2, do a tcpdump on the dataplane interface (the one that starts with 'mv', use /sbin/ifconfig to get a list):
    223     {{{
    224     sudo tcpdump -i ethY
    225     }}}
    226222
    227223    If your controller is working you the packets registering in both terminals that you run tcpdump.