From 5fdf191500e9b37827c005e0ba74bb256e498498 Mon Sep 17 00:00:00 2001 From: Bin Hu Date: Fri, 23 Sep 2016 09:46:57 -0700 Subject: Disable security group in vRouter too Change-Id: Ifff01235951030d9fc2c3ea0293fc19ac9241b16 Signed-off-by: Bin Hu (cherry picked from commit 9b0fde472adaae0605543ceb6432d200fc2380bc) --- docs/configurationguide/featureconfig.rst | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) (limited to 'docs/configurationguide/featureconfig.rst') diff --git a/docs/configurationguide/featureconfig.rst b/docs/configurationguide/featureconfig.rst index b688cb4..20762ac 100644 --- a/docs/configurationguide/featureconfig.rst +++ b/docs/configurationguide/featureconfig.rst @@ -417,11 +417,12 @@ would be as shown as follows: # VM2 would have the following IPv6 address: # 2001:db8:0:2:f816:3eff:fe44:4444/64 -**OPNFV-NATIVE-SETUP-17**: Now we need to disable ``eth0-VM1``, ``eth0-VM2`` port-security +**OPNFV-NATIVE-SETUP-17**: Now we need to disable ``eth0-VM1``, ``eth0-VM2``, +``eth0-vRouter`` and ``eth1-vRouter`` port-security .. code-block:: bash - for port in eth0-VM1 eth0-VM2 + for port in eth0-VM1 eth0-VM2 eth0-vRouter eth1-vRouter do neutron port-update --no-security-groups $port neutron port-update $port --port-security-enabled=False @@ -1054,3 +1055,4 @@ Run some commands to verify that IPv6 addresses are configured on ``eth0`` inter If the above ping6 command succeeds, it implies that ``vRouter`` was able to successfully forward the IPv6 traffic to reach external ``ipv6-router``. + -- cgit 1.2.3-korg