783
edits
Line 113: | Line 113: | ||
* Exercise IX: Pyretic Debugging | * Exercise IX: Pyretic Debugging | ||
** We have done kinetic firewall in exercise VII and imitated the same firewall using pox in exercise VIII. Now, we will imitate the same firewall using pyretic. | ** We have done kinetic firewall in exercise VII and imitated the same firewall using pox in exercise VIII. Now, we will imitate the same firewall using pyretic. | ||
** The basic solution is taken from the Internet [https://dl.dropboxusercontent.com/u/1652374/SDN_Course/Exercises/ | ** The basic solution is taken from the Internet [https://dl.dropboxusercontent.com/u/1652374/SDN_Course/Exercises/pyretic_gardenwall_internetsolution1.py], test if it is able to block h1 when "infected". Note that we will only use the "infected == True" for this exercise. | ||
*** start controller (in /home/mininet/pyretic folder): pyretic.py pyretic.examples.gardenwall_internetcode | *** start controller (in /home/mininet/pyretic folder): pyretic.py pyretic.examples.gardenwall_internetcode | ||
*** start mininet: sudo mn --controller=remote --topo=single,3 --mac --arp | *** start mininet: sudo mn --controller=remote --topo=single,3 --mac --arp | ||
Line 121: | Line 121: | ||
** Now, we move on to the debugging part | ** Now, we move on to the debugging part | ||
*** check h2 ping h3, what happens? | *** check h2 ping h3, what happens? | ||
*** Now, modify the given code to allow h2 traffic to pass through to h3 | *** Now, modify the given code to allow h2 traffic to pass through to h3, when h1 is "infected". | ||
** If time permits, check if the "exempt" case is working fine too | |||
** If time permits, try fixing [https://dl.dropboxusercontent.com/u/1652374/SDN_Course/Exercises/pyretic_gardenwall_internetsolution.py this] code for the "infected" case. | |||
== Group Discussion Papers == | == Group Discussion Papers == |
edits