From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-qg0-f47.google.com (mail-qg0-f47.google.com [209.85.192.47]) by dpdk.org (Postfix) with ESMTP id 76A9768CE for ; Sun, 27 Jul 2014 14:19:32 +0200 (CEST) Received: by mail-qg0-f47.google.com with SMTP id i50so7111101qgf.20 for ; Sun, 27 Jul 2014 05:21:13 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:date:message-id:subject:from:to:content-type; bh=Ph+fau94Od3mbYOeV7heOA2qy+Kr2kAldJf86mo8kj0=; b=xOJr9Q2ur7jQJf+ur33WqQceP7bEAbyEKtMXME6Q5K9bE4vQUXpffBaplsBfsZ3JNe bHslIiR2KCBnfyKfAK+sFH+saaZ3rW0L2CFZ+r5zTX7WoESfeMrauoKWerf24QnsSZ3f s3ZkkGTPjADM2S6iRB8AnVcvB0/ZmcmoNucyo35GBPVwffDqAh80Ab2mLDsnjXH3Wn6D HZqsIrsVscrx89wWiOhQI+P2tnnriAWvijlb+B6IENRCS1Pjgu3SCCnP9febnxefiiia eB1DKKlRzZL3uOjK+je5znvECeZ/3xlrvzjSqs8t5QMaXDs5ytEpJUirAW+qorO1ITYp 53Dw== MIME-Version: 1.0 X-Received: by 10.224.114.134 with SMTP id e6mr45039291qaq.71.1406463673475; Sun, 27 Jul 2014 05:21:13 -0700 (PDT) Received: by 10.140.96.197 with HTTP; Sun, 27 Jul 2014 05:21:13 -0700 (PDT) Date: Sun, 27 Jul 2014 17:51:13 +0530 Message-ID: From: Kanthi P To: dev@dpdk.org Content-Type: text/plain; charset=UTF-8 X-Content-Filtered-By: Mailman/MimeDel 2.1.15 Subject: [dpdk-dev] Query regarding the exception_path application X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: patches and discussions about DPDK List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 27 Jul 2014 12:19:32 -0000 Hi, I am running the exception_path application provided in DPDK sample apps on a 3 virtual machine setup. VM1 is used for sending icmp traffic VM2 is installed with DPDK, it has two NICs, one is connected to VM1 and the other one to VM3 VM3 is used for receiving icmp traffic Traffic is sent from VM1, VM2 received it and forwarded to the tap interface as expected. I want to add iptables(few drop rules) on that tap interface created by the exception_path application, and check that the traffic drops. But this is not working, iptables are not being applied on these tap interfaces. Do we need some IPStack for example, rump kernel integrated with DPDK to achieve this? Is there anything that I am missing here? Basically looking for simulating firewall using iptables in DPDK. Regards, Kanthi