+++ This bug was initially created as a clone of Bug #1272167 +++
We should support configuration of the port security extension. To enable, add the following to the "extension_drivers" in the ML2 section in the ML2 plugin file (e.g. /etc/neutron/plugins/ml2/ml2_conf.ini): For example:
extension_drivers = port_security
*** Bug 1286409 has been marked as a duplicate of this bug. ***
An u/s patch was submitted against master (mitaka)
This will need to be merged and backport to stable/liberty to make it into OSP 8.
*** Bug 1272167 has been marked as a duplicate of this bug. ***
*** Bug 1279613 has been marked as a duplicate of this bug. ***
(In reply to Brent Eagles from comment #3)
> An u/s patch was submitted against master (mitaka)
> This will need to be merged and backport to stable/liberty to make it into
> OSP 8.
Liberty backport: https://review.openstack.org/#/c/287866/
This bug was accidentally moved from POST to MODIFIED via an error in automation, please see email@example.com with any questions
This bug did not make the OSP 8.0 release. It is being deferred to OSP 10.
The extension is enabled by default and tempest test test_port_security_macspoofing_port passed successfully.
Verified on - openstack-tripleo-heat-templates-5.0.0-0.20160929150845.4cdc4fc.el7ost.noarch
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.
For information on the advisory, and where to find the updated
files, follow the link below.
If the solution does not work for you, open a new bug report.