* [dpdk-users] ip_pipeline firewall customization
@ 2017-03-07 8:06 Shyam Shrivastav
0 siblings, 0 replies; only message in thread
From: Shyam Shrivastav @ 2017-03-07 8:06 UTC (permalink / raw)
To: users; +Cc: Shyam Shrivastav
Hello friends
I am using ip_pipeline firewall as base for our project, need
comments/suggestions/corrections regarding following
1) We can not configure firewall rule to drop packets, as portid is
mandatory in command. I am planning to allow this for our requirement with
following code changes
a) Allow "port" as optional parameter (pipeline_firewall.c), pass -1
as port id if "port" is not specified to app_pipeline_firewall_add_rule and
change that parameter to int32_t.
b) Make required changes in pipeline_firewall_msg_req_add_handler if
portid is -1, that is table entry action to be .action =
RTE_PIPELINE_ACTION_DROP.
2) I am registering a f_action_hit function for firewall table to perform
certain translations if action is pass (RTE_PIPELINE_ACTION_PORT).
Configured a rule like following
pipeline>p 1 firewall add priority 1 ipv4 0.0.0.0 0 0.0.0.0 0 0 65535 0
65535 0 0 port 0
which should be hit only by ipv4 packets. However even ARP packets are hit
by this ACL and my routine is called. If I configure a specific src or dst
ip then everything works fine and arp packets are not hit , for example
following rule hits only ipv4 icmp packets
pipeline> p 1 firewall add priority 1 ipv4 0.0.0.0 0 45.35.70.12 32 0
65535 0 65535 1 0xf port 0
Is this a bug or am I missing something ?
Best regards
Shyam
^ permalink raw reply [flat|nested] only message in thread
only message in thread, other threads:[~2017-03-07 8:06 UTC | newest]
Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2017-03-07 8:06 [dpdk-users] ip_pipeline firewall customization Shyam Shrivastav
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).