X-Git-Url: http://git.onelab.eu/?a=blobdiff_plain;f=INSTALL.userspace;h=f54b93e2e54c2efdc88054519038d98390e4183c;hb=28c5588e8e1a8d091c5d2275232c35f2968a97fa;hp=6e6fcd49a78ab2d6d11af7635e54d39decb38c0f;hpb=045b2e5c77d02cd0d7bba046e2dbed72ec4828c8;p=sliver-openvswitch.git diff --git a/INSTALL.userspace b/INSTALL.userspace index 6e6fcd49a..f54b93e2e 100644 --- a/INSTALL.userspace +++ b/INSTALL.userspace @@ -17,7 +17,7 @@ Building and Installing ----------------------- The requirements and procedure for building, installing, and -configuring Open vSwitch are the same as those given in INSTALL.Linux. +configuring Open vSwitch are the same as those given in INSTALL. You may omit configuring, building, and installing the kernel module, and the related requirements. @@ -31,6 +31,10 @@ The tun device must also exist as /dev/net/tun. If it does not exist, then create /dev/net (if necessary) with "mkdir /dev/net", then create /dev/net/tun with "mknod /dev/net/tun c 10 200". +On FreeBSD and NetBSD, the userspace switch additionally requires the +kernel tap(4) driver to be available, either built into the kernel or +loaded as a module. + Using the Userspace Datapath with ovs-vswitchd ---------------------------------------------- @@ -47,6 +51,33 @@ ovs-vswitchd will create a TAP device as the bridge's local interface, named the same as the bridge, as well as for each configured internal interface. +Currently, on FreeBSD, the functionality required for in-band control +support is not implemented. To avoid related errors, you can disable +the in-band support with the following command. + + ovs-vsctl set bridge br0 other_config:disable-in-band=true + +Firewall Rules +-------------- + +On Linux, when a physical interface is in use by the userspace +datapath, packets received on the interface still also pass into the +kernel TCP/IP stack. This can cause surprising and incorrect +behavior. You can use "iptables" to avoid this behavior, by using it +to drop received packets. For example, to drop packets received on +eth0: + + iptables -A INPUT -i eth0 -j DROP + iptables -A FORWARD -i eth0 -j DROP + +Other settings +-------------- + +On NetBSD, depending on your network topology and applications, the +following configuration might help. See sysctl(7). + + sysctl net.inet.ip.checkinterface=1 + Bug Reporting -------------