[RFE] API: allow to disable anti-spoofing but not SGs
| Affects | Status | Importance | Assigned to | Milestone | |
|---|---|---|---|---|---|
| neutron |
New
|
Wishlist
|
Unassigned | ||
Bug Description
Right now, port security API - seems to [1] - disable both ACL filtering (SGs) and anti-spoofing (allowed address pairs logic). An argument may be made to allow to disable anti-spoofing but still implement ACL filtering on a port. (This actually happened in one of synthetic NFV test environments in-house.) In this case, the user story would look like as follows:
0. A user creates a SG with TCP blocked.
1. A user creates a port using this SG.
2. A user uses a new API to mark the port to allow MAC spoofing.
3. A user sends TCP traffic using a different MAC through the port and sees it blocked.
4. A user sends UDP traffic using a different MAC through the port and see it's not blocked.
Allowed-
| description: | updated |
| summary: |
- API: allow to disable anti-spoofing but not SGs + [RFE] API: allow to disable anti-spoofing but not SGs |
| Changed in neutron: | |
| importance: | Undecided → Low |
| importance: | Low → Wishlist |
| assignee: | nobody → Ihar Hrachyshka (ihar-hrachyshka) |
| tags: | added: rfe-approved |

Hi Ihar, we will have drivers meeting on Friday 1400UTC (https:/ /meetings. opendev. org/#Neutron_ drivers_ Meeting) where we will discuss this proposal, you can join the discussion on IRC #openstack-neutron.