Age | Commit message (Collapse) | Author | Files | Lines |
|
JIRA: SFC-114
Some cases show that it was not enough with the patch:
https://gerrit.opnfv.org/gerrit/#/c/42801/
We should explicitely disable security in the SF ports. That can be done
with a the antispoofing parameter in the vnfd
Change-Id: Ie20ab961633866f48a4abcc299a62e8c55280088
Signed-off-by: Manuel Buil <mbuil@suse.com>
|
|
Change-Id: I078e9f26d3040cf04120abd425f03cb4f2e8daef
Signed-off-by: Dimitrios Markou <mardim@intracom-telecom.com>
|
|
Change-Id: I33f3fd0aa0bc71a1ee07ea4504619b090517a87b
Signed-off-by: Dimitrios Markou <mardim@intracom-telecom.com>
|
|
- Update vnfd tosca templates
JIRA: SFC-102
Change-Id: I712b64e45c317582e0cb54e42364605f537aeee3
Signed-off-by: Taseer Ahmed <taseer94@gmail.com>
|
|
JIRA: SFC-53
The goal is to verify that the traffic traverses the service chain, not only
in the uplink (client --> server) direction, but also in the downlink
(client <-- server) direction, which is the part that is not currently being
covered by other test cases.
Change-Id: I198a53e5afe3da1b397cee95627834856498b674
Signed-off-by: Juan Vidal <juan.vidal.allende@ericsson.com>
|