summaryrefslogtreecommitdiff
path: root/third-party
diff options
context:
space:
mode:
authorJustin Pettit <jpettit@nicira.com>2015-03-11 13:32:01 -0700
committerJustin Pettit <jpettit@nicira.com>2015-03-12 17:01:10 -0700
commitd4763d1d4efbbcfd884df2d668980d61ec89d75a (patch)
tree2eabcdadda3c80156e043db08424730d471e09b1 /third-party
parentadb30d640af659b3eb31bdfa1e03c9434aa2671c (diff)
downloadopenvswitch-d4763d1d4efbbcfd884df2d668980d61ec89d75a.tar.gz
Use the IANA-assigned ports for OpenFlow and OVSDB.
We've been warning about the change since 2.1, which was released a year ago. Signed-off-by: Justin Pettit <jpettit@nicira.com> Acked-by: Ben Pfaff <blp@nicira.com>
Diffstat (limited to 'third-party')
-rw-r--r--third-party/README.md2
-rw-r--r--third-party/ofp-tcpdump.patch2
2 files changed, 2 insertions, 2 deletions
diff --git a/third-party/README.md b/third-party/README.md
index e61d6c45e..d351d77e5 100644
--- a/third-party/README.md
+++ b/third-party/README.md
@@ -27,7 +27,7 @@ Clearly, tcpdump can only parse unencrypted packets, so you will need to
connect the controller and datapath using plain TCP. To look at the
traffic, tcpdump will be started in a manner similar to the following:
- sudo ./tcpdump -s0 -i eth0 port 6633
+ sudo ./tcpdump -s0 -i eth0 port 6653
The "-s0" flag indicates that tcpdump should capture the entire packet.
If the OpenFlow message is not received in its entirety, "[|openflow]" will
diff --git a/third-party/ofp-tcpdump.patch b/third-party/ofp-tcpdump.patch
index bba4e90b6..72d33b877 100644
--- a/third-party/ofp-tcpdump.patch
+++ b/third-party/ofp-tcpdump.patch
@@ -125,7 +125,7 @@
else if (length > 0 && (sport == LDP_PORT || dport == LDP_PORT)) {
ldp_print(bp, length);
- }
-+ } else if (sport == OFP_OLD_PORT || dport == OFP_OLD_PORT) {
++ } else if (sport == OFP_PORT || dport == OFP_PORT) {
+ openflow_print(bp, length);
+ }