diff options
author | Justin Pettit <jpettit@nicira.com> | 2015-03-11 13:32:01 -0700 |
---|---|---|
committer | Justin Pettit <jpettit@nicira.com> | 2015-03-12 17:01:10 -0700 |
commit | d4763d1d4efbbcfd884df2d668980d61ec89d75a (patch) | |
tree | 2eabcdadda3c80156e043db08424730d471e09b1 /third-party | |
parent | adb30d640af659b3eb31bdfa1e03c9434aa2671c (diff) | |
download | openvswitch-d4763d1d4efbbcfd884df2d668980d61ec89d75a.tar.gz |
Use the IANA-assigned ports for OpenFlow and OVSDB.
We've been warning about the change since 2.1, which was released a year
ago.
Signed-off-by: Justin Pettit <jpettit@nicira.com>
Acked-by: Ben Pfaff <blp@nicira.com>
Diffstat (limited to 'third-party')
-rw-r--r-- | third-party/README.md | 2 | ||||
-rw-r--r-- | third-party/ofp-tcpdump.patch | 2 |
2 files changed, 2 insertions, 2 deletions
diff --git a/third-party/README.md b/third-party/README.md index e61d6c45e..d351d77e5 100644 --- a/third-party/README.md +++ b/third-party/README.md @@ -27,7 +27,7 @@ Clearly, tcpdump can only parse unencrypted packets, so you will need to connect the controller and datapath using plain TCP. To look at the traffic, tcpdump will be started in a manner similar to the following: - sudo ./tcpdump -s0 -i eth0 port 6633 + sudo ./tcpdump -s0 -i eth0 port 6653 The "-s0" flag indicates that tcpdump should capture the entire packet. If the OpenFlow message is not received in its entirety, "[|openflow]" will diff --git a/third-party/ofp-tcpdump.patch b/third-party/ofp-tcpdump.patch index bba4e90b6..72d33b877 100644 --- a/third-party/ofp-tcpdump.patch +++ b/third-party/ofp-tcpdump.patch @@ -125,7 +125,7 @@ else if (length > 0 && (sport == LDP_PORT || dport == LDP_PORT)) { ldp_print(bp, length); - } -+ } else if (sport == OFP_OLD_PORT || dport == OFP_OLD_PORT) { ++ } else if (sport == OFP_PORT || dport == OFP_PORT) { + openflow_print(bp, length); + } |