[ovs-dev] [PATCH 1/2] Revert "rhel, xenserver: Punch holes through firewall for VXLAN."
Gurucharan Shetty
shettyg at nicira.com
Fri Apr 12 20:50:42 UTC 2013
This reverts commit 5902b4ed6.
For end users that do not plan to use tunnels or use only selected
tunnels, it probably is a bad idea to punch firewall holes by default.
Opening holes like this may surprise the user.
Signed-off-by: Gurucharan Shetty <gshetty at nicira.com>
---
rhel/etc_init.d_openvswitch | 1 -
xenserver/etc_init.d_openvswitch | 1 -
2 files changed, 2 deletions(-)
diff --git a/rhel/etc_init.d_openvswitch b/rhel/etc_init.d_openvswitch
index 3d79b6a..55a13a7 100755
--- a/rhel/etc_init.d_openvswitch
+++ b/rhel/etc_init.d_openvswitch
@@ -49,7 +49,6 @@ start () {
"$@"
ovs_ctl --protocol=gre enable-protocol
- ovs_ctl --protocol=udp --dport=8472 enable-protocol
touch /var/lock/subsys/openvswitch
}
diff --git a/xenserver/etc_init.d_openvswitch b/xenserver/etc_init.d_openvswitch
index 6e94b92..9c0fe80 100755
--- a/xenserver/etc_init.d_openvswitch
+++ b/xenserver/etc_init.d_openvswitch
@@ -82,7 +82,6 @@ start () {
start_ovs_xapi_sync
ovs_ctl --protocol=gre enable-protocol
- ovs_ctl --protocol=udp --dport=8472 enable-protocol
touch /var/lock/subsys/openvswitch
}
--
1.7.9.5
More information about the dev
mailing list