It's been a while...

Feb 01, 2014 01:37

My POX based OpenFlow l2 switch can block mac addresses upon my command.

64 bytes from 10.0.0.2: icmp_req=11 ttl=64 time=0.065 ms
64 bytes from 10.0.0.2: icmp_req=12 ttl=64 time=0.067 ms

-F 1 00:00:00:00:00:01 00:00:00:00:00:02
...
+F 1 00:00:00:00:00:01 00:00:00:00:00:02

64 bytes from 10.0.0.2: icmp_req=22 ttl=64 time=0.490 ms
64 bytes from 10.0.0.2: icmp_req=23 ttl=64 time=0.064 ms

I assume that I more or less replicated what is in mac blocker component.
It was an interesting experience learning how event model in POX is organised, how IO workers interact with event loop and just reading OpenFlow spec in general. Never had to get deep into python apps before.

Cool stuff. :)

openflow, python, pox

Previous post
Up