NFVO icon indicating copy to clipboard operation
NFVO copied to clipboard

[Suggestion] Enable Port Security toggle for Openstack at CP

Open gianpietro1 opened this issue 7 years ago • 0 comments

OpenStack has a default mechanism called Port Security, that enables the use of Security Groups and prevents VMs from forwarding traffic as an anti-spoofing protection.

However, given NFV scenarios where regular routing is used (no SFC), VNFs may need to forward traffic and even provide its own filtering policies (vFW, for example)

From Openstack, port-security can be disabled manually per port: neutron port-update --port-security-enabled=False [port-UUID] ... but in dynamic/auto-scaling environments, this is not practical.

It can also be disabled globally per network: neutron net-update --port-security-enabled=False [net-UUID] ...but this is not convenient when other VMs that require Security Groups share the same network.

My suggestion is that Open Baton adds support for disabling port-security on a per port basis by specifying this parameter at the CP level.

Apart from the demos I'm working on, I guess this may be a common scenario as other VNFM implementations are allowing this:

  • Tacker VNFD (v0.3.1+):
...
    CP1:
      type: tosca.nodes.nfv.CP.Tacker
      properties:
        order: 0
        anti_spoofing_protection: false  # <--- HERE
      requirements:
        - virtualLink:
            node: VL1
        - virtualBinding:
            node: VDU1
...
  • OSM VNFD (v.1.1+):
...
    -   vnfd:connection-point:
        -   vnfd:id: eth0
            vnfd:name: eth0
            vnfd:port-security-enabled: 'false'  # <--- HERE
            vnfd:type: VPORT
...

Thanks, Gianpietro

gianpietro1 avatar Mar 01 '17 23:03 gianpietro1