---------------- ''This tutorial is no longer actively maintained, see the [wiki:GENIExperimenter/Tutorials/OpenFlowOVS-Floodlight OpenFlow Tutorial with FloodLight Controller] tutorial for a up-to-date experiment'' ---------------- '''[wiki:GENIExperimenter/Tutorials/OpenFlowOVS Intro to OpenFlow Tutorial (OVS) with POX Controller]''' {{{ #!html
Image Map
}}} [[PageOutline]] {{{ #!html
Overview
In this tutorial we are going to use Open vSwitch (OVS) as an OpenFlow switch connected to three hosts. OVS is a software switch running on a compute resource. The other three hosts can only communicate through the OVS switch. The experiment will need (the rspecs for this exercise are provided later in this section):
  • 1 Xen VM with a public IP to run an OpenFlow controller
  • 1 Xen VM to be the OpenFlow switch
  • 3 Xen VMs as hosts
Experiment Topology
}}} == Step 1. Obtain resources == For the following two reservations you can use different aggregates and one slice (recommended) or same aggregate but two slices. We do this so that you can change your experiment topology (e.g. from software switches to hardware switches, but keep the same controller. {{{ #!html
Note You can use compute resources from any InstaGENI rack and any reservation tool (Portal, jFed, Omni, etc) For a list of available InstaGENI racks see the GENI Production Resources page.
}}} a. '''Reserve a VM that runs your !OpenFlow controller'''. [[BR]] ''RSpec:'' In the Portal: ''XEN !OpenFlow Controller'', url: [https://raw.githubusercontent.com/GENI-NSF/geni-tutorials/master/OldTutorials/OpenFlowOVS/xen-openflow-controller-rspec.xml] a. '''Reserve your network''', that includes a VM with OVS installed. [[BR]] ''RSpec'': In the Portal ''!OpenFlow OVS all XEN'', url: [https://raw.githubusercontent.com/GENI-NSF/geni-tutorials/master/OldTutorials/OpenFlowOVS/openflowovs-all-xen.rspec.xml] {{{ #!comment sudo /local/install-script-wireshark.sh https://raw.githubusercontent.com/GENI-NSF/geni-tutorials/master/OldTutorials/OpenFlowOVS/wireshark.tar.gz }}} {{{ #!html
Note You will need SSH access to your nodes. If you don't know how to SSH to your reserved hosts learn how to login
}}} == Step 2. Configure and Initialize == '''Overview: ''' ''Although OVS is installed and initialized on the host that is meant to act as a software switch, it has not been configured yet. There are two main things that need to be configured: [[BR]] ''(1) configure your software switch with the interfaces as ports'' and [[BR]] '' (2) point the switch to an !OpenFlow controller''. '' === 2a. Configure the Software Switch (OVS Window) === i. Login to the OVS host ii. Create an Ethernet bridge that will act as our software switch: {{{ sudo ovs-vsctl add-br br0 }}} iii. Prepare the interfaces to be added as ports to the OVS switch * Your OVS bridge will be a Layer 2 switch and your ports do not need IP addresses. Before we remove them let's keep some information * Run {{{ ifconfig }}} * Write down the interface names that correspond to the connections to your hosts. The correspondence is * Interface with IP ''10.10.1.11'' to host1 - ethX * Interface with IP ''10.10.1.12'' to host2 - ethY * Interface with IP ''10.10.1.13'' to host3 - ethZ * Remove the IP from your data interfaces. [[BR]] [[Image(GENIExperimenter/Tutorials/Graphics:warning-icon-hi.png, 2%)]] Be careful '''not to bring down eth0'''. This is the control interface, if you bring that interface down you ''' won't be able to login''' to your host. For all interfaces other than `eth0` and ` l0` (your interface names may vary) run : {{{ sudo ifconfig ethX 0 sudo ifconfig ethY 0 sudo ifconfig ethZ 0 }}} iv. Add all the data interfaces to your switch (bridge). [[BR]] [[Image(GENIExperimenter/Tutorials/Graphics:warning-icon-hi.png, 2%)]] Be careful ''' not to add interface eth0'''. This is the control interface. The other three interfaces are your data interfaces. (Use the same interfaces as you used in the previous step.) {{{ sudo ovs-vsctl add-port br0 ethX sudo ovs-vsctl add-port br0 ethY sudo ovs-vsctl add-port br0 ethZ }}} v. Trust but verify. Congratulations! You have configured your software switch. To verify the three ports configured run: {{{ sudo ovs-vsctl list-ports br0 }}} === 2b. Point your switch to a controller === {{{ #!html
Note An OpenFlow switch will not forward any packet unless instructed by a controller. Basically the forwarding table is empty, until an external controller inserts forwarding rules. The OpenFlow controller communicates with the switch over the control network and it can be anywhere in the Internet as long as it is reachable by the OVS host.
}}} i. Login to your controller ii. Find the control interface IP of your controller, use ''ifconfig'' and note down the IP address of `eth0`. iii. In order to point our software !OpenFlow switch to the controller, in the ''ovs'' terminal window, run: {{{ sudo ovs-vsctl set-controller br0 tcp::6633 }}} i. Set your switch to `fail-safe-mode`. For more info read the [#standalonevssecuremode standalone vs secure mode section]. Run: {{{ sudo ovs-vsctl set-fail-mode br0 secure }}} vi. Trust but verify. You can verify your OVS settings by issuing the following: {{{ sudo ovs-vsctl show }}} ==== 2c. `standalone` vs `secure` mode ==== ''The !OpenFlow controller is responsible for setting up all flows on the switch, which means that when the controller is not running there should be no packet switching at all. Depending on the setup of your network, such a behavior might not be desired. It might be best that when the controller is down, the switch should default back to being a learning layer 2 switch. In other circumstances however this might be undesirable. In OVS this is a tunable parameter, called `fail-safe-mode` which can be set to the following parameters:'' * `standalone` ''[default]: in this case OVS will take responsibility for forwarding the packets if the controller fails'' * `secure`: ''in this case only the controller is responsible for forwarding packets, and if the controller is down all packets are dropped. '' ''In OVS when the parameter is not set it falls back to the `standalone` mode. For the purpose of this tutorial we will set the `fail-safe-mode` to `secure`, since we want to be the ones controlling the forwarding.'' ---- = [wiki:GENIExperimenter/Tutorials/OpenFlowOVS Prev: Introduction] = = [wiki:GENIExperimenter/Tutorials/OpenFlowOVS/Execute Next: Execute] =