This bug should be targeted to RHOS 7, we have bug 1268413 for RHOS 6. Re-setting
Need info to reproduce the issue there is no explanation how to try to reproduce the issue .
verified on OSP-7 puddle 2015-11-20.2 [root@puma06 ~(keystone_admin)]# sudo iptables -nvL neutron-openvswi-of216d9d9-f --line-numbers Chain neutron-openvswi-of216d9d9-f (2 references) num pkts bytes target prot opt in out source destination 1 2 656 RETURN udp -- * * 0.0.0.0/0 0.0.0.0/0 udp spt:68 dpt:67 /* Allow DHCP client traffic. */ 2 257 22268 neutron-openvswi-sf216d9d9-f all -- * * 0.0.0.0/0 0.0.0.0/0 3 0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp spt:67 dpt:68 /* Prevent DHCP Spoofing by VM. */ 4 141 12300 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED /* Direct packets associated with a known session to the RETURN chain. */ 5 116 9968 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 6 0 0 RETURN sctp -- * * 0.0.0.0/0 0.0.0.0/0 7 0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 state INVALID /* Drop packets that appear related to an existing connection (e.g. TCP ACK/FIN) but do not have an entry in conntrack. */ 8 0 0 neutron-openvswi-sg-fallback all -- * * 0.0.0.0/0 0.0.0.0/0 /* Send unmatched traffic to the fallback chain. */
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2015:2652