Revert "rhel, xenserver: Punch holes through firewall for VXLAN."
authorGurucharan Shetty <gshetty@nicira.com>
Fri, 12 Apr 2013 19:53:59 +0000 (12:53 -0700)
committerGurucharan Shetty <gshetty@nicira.com>
Tue, 16 Apr 2013 22:29:56 +0000 (15:29 -0700)
This reverts commit 5902b4ed6.

For end users that do not plan to use tunnels or use only selected
tunnels, it probably is a bad idea to punch firewall holes by default.
Opening holes like this may surprise the user.

Signed-off-by: Gurucharan Shetty <gshetty@nicira.com>
rhel/etc_init.d_openvswitch
xenserver/etc_init.d_openvswitch

index 3d79b6a..55a13a7 100755 (executable)
@@ -49,7 +49,6 @@ start () {
     "$@"
 
     ovs_ctl --protocol=gre enable-protocol
-    ovs_ctl --protocol=udp --dport=8472 enable-protocol
 
     touch /var/lock/subsys/openvswitch
 }
index 6e94b92..9c0fe80 100755 (executable)
@@ -82,7 +82,6 @@ start () {
     start_ovs_xapi_sync
 
     ovs_ctl --protocol=gre enable-protocol
-    ovs_ctl --protocol=udp --dport=8472 enable-protocol
 
     touch /var/lock/subsys/openvswitch
 }