[ovs-dev] [PATCH 1/2] Revert "rhel, xenserver: Punch holes through firewall for VXLAN."

Gurucharan Shetty shettyg at nicira.com
Fri Apr 12 20:50:42 UTC 2013


This reverts commit 5902b4ed6.

For end users that do not plan to use tunnels or use only selected
tunnels, it probably is a bad idea to punch firewall holes by default.
Opening holes like this may surprise the user.

Signed-off-by: Gurucharan Shetty <gshetty at nicira.com>
---
 rhel/etc_init.d_openvswitch      |    1 -
 xenserver/etc_init.d_openvswitch |    1 -
 2 files changed, 2 deletions(-)

diff --git a/rhel/etc_init.d_openvswitch b/rhel/etc_init.d_openvswitch
index 3d79b6a..55a13a7 100755
--- a/rhel/etc_init.d_openvswitch
+++ b/rhel/etc_init.d_openvswitch
@@ -49,7 +49,6 @@ start () {
     "$@"
 
     ovs_ctl --protocol=gre enable-protocol
-    ovs_ctl --protocol=udp --dport=8472 enable-protocol
 
     touch /var/lock/subsys/openvswitch
 }
diff --git a/xenserver/etc_init.d_openvswitch b/xenserver/etc_init.d_openvswitch
index 6e94b92..9c0fe80 100755
--- a/xenserver/etc_init.d_openvswitch
+++ b/xenserver/etc_init.d_openvswitch
@@ -82,7 +82,6 @@ start () {
     start_ovs_xapi_sync
 
     ovs_ctl --protocol=gre enable-protocol
-    ovs_ctl --protocol=udp --dport=8472 enable-protocol
 
     touch /var/lock/subsys/openvswitch
 }
-- 
1.7.9.5




More information about the dev mailing list