1 Usecplugin-OpenFlow User Guide
2 ==============================
4 The Usecplugin-OpenFlow User Guide contains information about
5 configuration, administration, management, using and troubleshooting the
11 Usecplugin-OpenFlow collects information about potential OpenFlow
12 Packet\_In attacks to OpenDaylight. A threshold (water mark) can be set
13 for the Packet\_In rate which when breached will trigger Packet\_In
14 message information collection.
16 Usecplugin Architecture
17 -----------------------
19 Usecplugin listens on OpenFlow southbound interface for Packet\_In
20 messages. When the rate of Packet\_In breaches the high water mark the
21 application parses the message for header information which is
22 subsequently stored in YANG Data Store and a log file. Usecplugin has
23 PacketHandler class that implements the PacketProcessing interface to
24 override the OnPacketReceived notification by which the application is
25 notified of Packet\_In messages.
27 Configuring Usecplugin-OpenFlow
28 -------------------------------
30 Install the Usecplugin-OpenFlow feautre in OpenDaylight with the
31 ``feature:install odl-usecplugin-openflow`` at the Karaf CLI.
33 A user can set the low water mark and high water mark for Packet\_In
34 rates as well as number of samples for checking the time interval to
35 calculate Packet\_In rate.
38 http://localhost:8181/apidoc/explorer/index.html#!/usecplugin(2015-01-05)
40 High Water Mark Configuration
41 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
44 http://localhost:8181/restconf/config/usecplugin:sample-data-hwm/
47 ``{"usecplugin:sample-data-hwm": { "samples":"3000","highWaterMark":"3000"}}``
49 Low Water Mark Configuration
50 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~
53 http://localhost:8181/restconf/config/usecplugin:sample-data-lwm/
56 ``{"usecplugin:sample-data-lwm": { "samples-lwm":"2000","lowWaterMark-lwm":"2000"}}``
58 Administering or Managing Usecplugin-OpenFlow
59 ---------------------------------------------
61 Use RPC POST APIs in the following format for getting the attack related
68 http://localhost:8181/restconf/operations/usecplugin:attackID
71 ``{"usecplugin:input": { "NodeID":"openflow:1"}}``
77 http://localhost:8181/restconf/operations/usecplugin:attacksFromIP
80 ``{"usecplugin:input": { "SrcIP":"10.0.0.1"}}``
86 http://localhost:8181/restconf/operations/usecplugin:attacksToIP
89 ``{"usecplugin:input": { "DstIP":"10.0.0.2"}}``