Closed Allamuth closed 1 year ago
Thanks for the report. This was a regression introduced in the Python 3 port. It's been addressed in my fork: MurphyMc/pox@56939984363101912fb97f6a3ee3ff82c20b86c5
It should eventually find its way upstream.
If you don't want to patch your POX, you may be able to work your way around it by giving an explicit mask in string format. For an exact match, I think that'd be something like:
msg.match.ipv6_dst = ('fd97:a9a1:980f::d4e', 'ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff')
Thank you for your fast answer and the quick fix. For now I will be using your alternative solution without patching POX.
Closed (fix is in halosaur).
After changing my code according the provided reference in issue #273. I add the following code snippet to to
_handle_ConnectionUp
inl2_nx_self_learning
for testing:This leads to the following traceback when running
./pox.py log.level --DEBUG openflow.nicira forwarding.l2_nx_self_learning
:What is the format needed for specifying IPv6 Addresses as match? As this seems to be causing the error.
Pox branch is gar-experimental,
git log
last commit was 2020-05-20. This is the version shipped with the current VM provided by mininet.