NFVO
NFVO copied to clipboard
[Suggestion] Enable Port Security toggle for Openstack at CP
OpenStack has a default mechanism called Port Security, that enables the use of Security Groups and prevents VMs from forwarding traffic as an anti-spoofing protection.
However, given NFV scenarios where regular routing is used (no SFC), VNFs may need to forward traffic and even provide its own filtering policies (vFW, for example)
From Openstack, port-security can be disabled manually per port:
neutron port-update --port-security-enabled=False [port-UUID]
... but in dynamic/auto-scaling environments, this is not practical.
It can also be disabled globally per network:
neutron net-update --port-security-enabled=False [net-UUID]
...but this is not convenient when other VMs that require Security Groups share the same network.
My suggestion is that Open Baton adds support for disabling port-security on a per port basis by specifying this parameter at the CP level.
Apart from the demos I'm working on, I guess this may be a common scenario as other VNFM implementations are allowing this:
- Tacker VNFD (v0.3.1+):
...
CP1:
type: tosca.nodes.nfv.CP.Tacker
properties:
order: 0
anti_spoofing_protection: false # <--- HERE
requirements:
- virtualLink:
node: VL1
- virtualBinding:
node: VDU1
...
- OSM VNFD (v.1.1+):
...
- vnfd:connection-point:
- vnfd:id: eth0
vnfd:name: eth0
vnfd:port-security-enabled: 'false' # <--- HERE
vnfd:type: VPORT
...
Thanks, Gianpietro