blob: a834314bcce8cd4e4818b5b3ea7cb42c38057272 [file] [log] [blame]
Sean M. Collins34296012014-10-27 11:57:20 -04001======================================
Shilla Saebi2ed09d82015-04-21 15:02:13 -04002Using DevStack with neutron Networking
Sean M. Collins34296012014-10-27 11:57:20 -04003======================================
4
Shilla Saebi2ed09d82015-04-21 15:02:13 -04005This guide will walk you through using OpenStack neutron with the ML2
Sean M. Collins34296012014-10-27 11:57:20 -04006plugin and the Open vSwitch mechanism driver.
7
Sean M. Collins34296012014-10-27 11:57:20 -04008
Sean M. Collins2977b302016-01-25 09:10:52 -05009.. _single-interface-ovs:
10
Sean M. Collins02ae50d2015-03-20 09:58:55 -070011Using Neutron with a Single Interface
12=====================================
13
14In some instances, like on a developer laptop, there is only one
15network interface that is available. In this scenario, the physical
16interface is added to the Open vSwitch bridge, and the IP address of
17the laptop is migrated onto the bridge interface. That way, the
Sean Daguedb48db12016-04-06 08:09:31 -040018physical interface can be used to transmit self service project
19network traffic, the OpenStack API traffic, and management traffic.
Sean M. Collins02ae50d2015-03-20 09:58:55 -070020
21
Sean M. Collins6b1f4992016-03-10 12:23:09 -050022.. warning::
23
24 When using a single interface networking setup, there will be a
25 temporary network outage as your IP address is moved from the
26 physical NIC of your machine, to the OVS bridge. If you are SSH'd
27 into the machine from another computer, there is a risk of being
28 disconnected from your ssh session (due to arp cache
29 invalidation), which would stop the stack.sh or leave it in an
30 unfinished state. In these cases, start stack.sh inside its own
31 screen session so it can continue to run.
32
33
Sean M. Collins02ae50d2015-03-20 09:58:55 -070034Physical Network Setup
35----------------------
36
37In most cases where DevStack is being deployed with a single
38interface, there is a hardware router that is being used for external
39connectivity and DHCP. The developer machine is connected to this
Mike Spreitzer4baa4ce2016-01-26 14:06:17 -050040network and is on a shared subnet with other machines. The
41`local.conf` exhibited here assumes that 1500 is a reasonable MTU to
42use on that network.
Sean M. Collins02ae50d2015-03-20 09:58:55 -070043
44.. nwdiag::
45
46 nwdiag {
47 inet [ shape = cloud ];
48 router;
49 inet -- router;
50
51 network hardware_network {
52 address = "172.18.161.0/24"
53 router [ address = "172.18.161.1" ];
Sean M. Collins16501662015-10-12 11:01:44 -040054 devstack-1 [ address = "172.18.161.6" ];
Sean M. Collins02ae50d2015-03-20 09:58:55 -070055 }
56 }
57
58
59DevStack Configuration
60----------------------
61
Sean M. Collins16501662015-10-12 11:01:44 -040062The following is a complete `local.conf` for the host named
63`devstack-1`. It will run all the API and services, as well as
64serving as a hypervisor for guest instances.
Sean M. Collins02ae50d2015-03-20 09:58:55 -070065
66::
67
Sean M. Collins16501662015-10-12 11:01:44 -040068 [[local|localrc]]
Sean M. Collins02ae50d2015-03-20 09:58:55 -070069 HOST_IP=172.18.161.6
70 SERVICE_HOST=172.18.161.6
71 MYSQL_HOST=172.18.161.6
72 RABBIT_HOST=172.18.161.6
73 GLANCE_HOSTPORT=172.18.161.6:9292
Balagopal7ed812c2016-03-01 04:43:31 +000074 ADMIN_PASSWORD=secret
75 DATABASE_PASSWORD=secret
76 RABBIT_PASSWORD=secret
77 SERVICE_PASSWORD=secret
Sean M. Collins02ae50d2015-03-20 09:58:55 -070078
Sean M. Collins16501662015-10-12 11:01:44 -040079 # Do not use Nova-Network
80 disable_service n-net
81 # Enable Neutron
82 ENABLED_SERVICES+=,q-svc,q-dhcp,q-meta,q-agt,q-l3
83
84
Sean M. Collins02ae50d2015-03-20 09:58:55 -070085 ## Neutron options
86 Q_USE_SECGROUP=True
Christian Berendt1c394822015-09-10 12:15:16 +020087 FLOATING_RANGE="172.18.161.0/24"
Sean M. Collins02ae50d2015-03-20 09:58:55 -070088 FIXED_RANGE="10.0.0.0/24"
89 Q_FLOATING_ALLOCATION_POOL=start=172.18.161.250,end=172.18.161.254
90 PUBLIC_NETWORK_GATEWAY="172.18.161.1"
91 Q_L3_ENABLED=True
92 PUBLIC_INTERFACE=eth0
Sean M. Collins2977b302016-01-25 09:10:52 -050093
94 # Open vSwitch provider networking configuration
Sean M. Collins02ae50d2015-03-20 09:58:55 -070095 Q_USE_PROVIDERNET_FOR_PUBLIC=True
96 OVS_PHYSICAL_BRIDGE=br-ex
97 PUBLIC_BRIDGE=br-ex
98 OVS_BRIDGE_MAPPINGS=public:br-ex
99
100
Sean M. Collins16501662015-10-12 11:01:44 -0400101Adding Additional Compute Nodes
102-------------------------------
103
104Let's suppose that after installing DevStack on the first host, you
105also want to do multinode testing and networking.
106
107Physical Network Setup
108~~~~~~~~~~~~~~~~~~~~~~
109
110.. nwdiag::
111
112 nwdiag {
113 inet [ shape = cloud ];
114 router;
115 inet -- router;
116
117 network hardware_network {
118 address = "172.18.161.0/24"
119 router [ address = "172.18.161.1" ];
120 devstack-1 [ address = "172.18.161.6" ];
121 devstack-2 [ address = "172.18.161.7" ];
122 }
123 }
124
125
126After DevStack installs and configures Neutron, traffic from guest VMs
127flows out of `devstack-2` (the compute node) and is encapsulated in a
128VXLAN tunnel back to `devstack-1` (the control node) where the L3
129agent is running.
130
131::
132
133 stack@devstack-2:~/devstack$ sudo ovs-vsctl show
134 8992d965-0ba0-42fd-90e9-20ecc528bc29
135 Bridge br-int
136 fail_mode: secure
137 Port br-int
138 Interface br-int
139 type: internal
140 Port patch-tun
141 Interface patch-tun
142 type: patch
143 options: {peer=patch-int}
144 Bridge br-tun
145 fail_mode: secure
146 Port "vxlan-c0a801f6"
147 Interface "vxlan-c0a801f6"
148 type: vxlan
149 options: {df_default="true", in_key=flow, local_ip="172.18.161.7", out_key=flow, remote_ip="172.18.161.6"}
150 Port patch-int
151 Interface patch-int
152 type: patch
153 options: {peer=patch-tun}
154 Port br-tun
155 Interface br-tun
156 type: internal
157 ovs_version: "2.0.2"
158
159Open vSwitch on the control node, where the L3 agent runs, is
160configured to de-encapsulate traffic from compute nodes, then forward
161it over the `br-ex` bridge, where `eth0` is attached.
162
163::
164
165 stack@devstack-1:~/devstack$ sudo ovs-vsctl show
166 422adeea-48d1-4a1f-98b1-8e7239077964
167 Bridge br-tun
168 fail_mode: secure
169 Port br-tun
170 Interface br-tun
171 type: internal
172 Port patch-int
173 Interface patch-int
174 type: patch
175 options: {peer=patch-tun}
176 Port "vxlan-c0a801d8"
177 Interface "vxlan-c0a801d8"
178 type: vxlan
179 options: {df_default="true", in_key=flow, local_ip="172.18.161.6", out_key=flow, remote_ip="172.18.161.7"}
180 Bridge br-ex
181 Port phy-br-ex
182 Interface phy-br-ex
183 type: patch
184 options: {peer=int-br-ex}
185 Port "eth0"
186 Interface "eth0"
187 Port br-ex
188 Interface br-ex
189 type: internal
190 Bridge br-int
191 fail_mode: secure
192 Port "tapce66332d-ea"
193 tag: 1
194 Interface "tapce66332d-ea"
195 type: internal
196 Port "qg-65e5a4b9-15"
197 tag: 2
198 Interface "qg-65e5a4b9-15"
199 type: internal
200 Port "qr-33e5e471-88"
201 tag: 1
202 Interface "qr-33e5e471-88"
203 type: internal
204 Port "qr-acbe9951-70"
205 tag: 1
206 Interface "qr-acbe9951-70"
207 type: internal
208 Port br-int
209 Interface br-int
210 type: internal
211 Port patch-tun
212 Interface patch-tun
213 type: patch
214 options: {peer=patch-int}
215 Port int-br-ex
216 Interface int-br-ex
217 type: patch
218 options: {peer=phy-br-ex}
219 ovs_version: "2.0.2"
220
221`br-int` is a bridge that the Open vSwitch mechanism driver creates,
222which is used as the "integration bridge" where ports are created, and
223plugged into the virtual switching fabric. `br-ex` is an OVS bridge
224that is used to connect physical ports (like `eth0`), so that floating
Sean Daguedb48db12016-04-06 08:09:31 -0400225IP traffic for project networks can be received from the physical
226network infrastructure (and the internet), and routed to self service
227project network ports. `br-tun` is a tunnel bridge that is used to
228connect OpenStack nodes (like `devstack-2`) together. This bridge is
229used so that project network traffic, using the VXLAN tunneling
230protocol, flows between each compute node where project instances run.
Sean M. Collins16501662015-10-12 11:01:44 -0400231
232
233
234DevStack Compute Configuration
235~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
236
237The host `devstack-2` has a very minimal `local.conf`.
238
239::
240
241 [[local|localrc]]
242 HOST_IP=172.18.161.7
243 SERVICE_HOST=172.18.161.6
244 MYSQL_HOST=172.18.161.6
245 RABBIT_HOST=172.18.161.6
246 GLANCE_HOSTPORT=172.18.161.6:9292
Balagopal7ed812c2016-03-01 04:43:31 +0000247 ADMIN_PASSWORD=secret
248 MYSQL_PASSWORD=secret
249 RABBIT_PASSWORD=secret
250 SERVICE_PASSWORD=secret
Sean M. Collins16501662015-10-12 11:01:44 -0400251
252 ## Neutron options
253 PUBLIC_INTERFACE=eth0
254 ENABLED_SERVICES=n-cpu,rabbit,q-agt
255
256Network traffic from `eth0` on the compute nodes is then NAT'd by the
257controller node that runs Neutron's `neutron-l3-agent` and provides L3
258connectivity.
259
Sean M. Collins02ae50d2015-03-20 09:58:55 -0700260
Sean M. Collins34296012014-10-27 11:57:20 -0400261Neutron Networking with Open vSwitch and Provider Networks
262==========================================================
263
Shilla Saebi2ed09d82015-04-21 15:02:13 -0400264In some instances, it is desirable to use neutron's provider
Sean M. Collins34296012014-10-27 11:57:20 -0400265networking extension, so that networks that are configured on an
Shilla Saebi2ed09d82015-04-21 15:02:13 -0400266external router can be utilized by neutron, and instances created via
Sean M. Collins34296012014-10-27 11:57:20 -0400267Nova can attach to the network managed by the external router.
268
269For example, in some lab environments, a hardware router has been
270pre-configured by another party, and an OpenStack developer has been
271given a VLAN tag and IP address range, so that instances created via
272DevStack will use the external router for L3 connectivity, as opposed
Shilla Saebi2ed09d82015-04-21 15:02:13 -0400273to the neutron L3 service.
Sean M. Collins34296012014-10-27 11:57:20 -0400274
Sean M. Collins4696db92015-10-09 12:31:57 -0400275Physical Network Setup
276----------------------
277
278.. nwdiag::
279
280 nwdiag {
281 inet [ shape = cloud ];
282 router;
283 inet -- router;
284
285 network provider_net {
286 address = "203.0.113.0/24"
287 router [ address = "203.0.113.1" ];
288 controller;
289 compute1;
290 compute2;
291 }
292
293 network control_plane {
294 router [ address = "10.0.0.1" ]
295 address = "10.0.0.0/24"
296 controller [ address = "10.0.0.2" ]
297 compute1 [ address = "10.0.0.3" ]
298 compute2 [ address = "10.0.0.4" ]
299 }
300 }
301
302
Sean M. Collins887f1822015-10-12 10:36:34 -0400303On a compute node, the first interface, eth0 is used for the OpenStack
304management (API, message bus, etc) as well as for ssh for an
305administrator to access the machine.
306
307::
308
309 stack@compute:~$ ifconfig eth0
310 eth0 Link encap:Ethernet HWaddr bc:16:65:20:af:fc
311 inet addr:10.0.0.3
312
313eth1 is manually configured at boot to not have an IP address.
314Consult your operating system documentation for the appropriate
315technique. For Ubuntu, the contents of `/etc/network/interfaces`
316contains:
317
318::
319
320 auto eth1
321 iface eth1 inet manual
322 up ifconfig $IFACE 0.0.0.0 up
323 down ifconfig $IFACE 0.0.0.0 down
324
325The second physical interface, eth1 is added to a bridge (in this case
326named br-ex), which is used to forward network traffic from guest VMs.
327
328::
329
330 stack@compute:~$ sudo ovs-vsctl add-br br-ex
331 stack@compute:~$ sudo ovs-vsctl add-port br-ex eth1
332 stack@compute:~$ sudo ovs-vsctl show
333 9a25c837-32ab-45f6-b9f2-1dd888abcf0f
334 Bridge br-ex
335 Port br-ex
336 Interface br-ex
337 type: internal
338 Port phy-br-ex
339 Interface phy-br-ex
340 type: patch
341 options: {peer=int-br-ex}
342 Port "eth1"
343 Interface "eth1"
344
Sean M. Collins34296012014-10-27 11:57:20 -0400345
346Service Configuration
347---------------------
348
349**Control Node**
350
351In this example, the control node will run the majority of the
Shilla Saebi2ed09d82015-04-21 15:02:13 -0400352OpenStack API and management services (keystone, glance,
353nova, neutron)
Sean M. Collins34296012014-10-27 11:57:20 -0400354
355
356**Compute Nodes**
357
358In this example, the nodes that will host guest instances will run
Markus Zoellerc30657d2015-11-02 11:27:46 +0100359the ``neutron-openvswitch-agent`` for network connectivity, as well as
360the compute service ``nova-compute``.
Sean M. Collins34296012014-10-27 11:57:20 -0400361
362DevStack Configuration
363----------------------
364
365The following is a snippet of the DevStack configuration on the
366controller node.
367
368::
369
Sean M. Collins611cab42015-10-09 12:54:32 -0400370 HOST_IP=10.0.0.2
371 SERVICE_HOST=10.0.0.2
372 MYSQL_HOST=10.0.0.2
Sean M. Collins611cab42015-10-09 12:54:32 -0400373 RABBIT_HOST=10.0.0.2
374 GLANCE_HOSTPORT=10.0.0.2:9292
Sean M. Collins34296012014-10-27 11:57:20 -0400375 PUBLIC_INTERFACE=eth1
376
Balagopal7ed812c2016-03-01 04:43:31 +0000377 ADMIN_PASSWORD=secret
378 MYSQL_PASSWORD=secret
379 RABBIT_PASSWORD=secret
380 SERVICE_PASSWORD=secret
Sean M. Collins611cab42015-10-09 12:54:32 -0400381
Sean M. Collins34296012014-10-27 11:57:20 -0400382 ## Neutron options
383 Q_USE_SECGROUP=True
Sean Daguedb48db12016-04-06 08:09:31 -0400384 ENABLE_PROJECT_VLANS=True
385 PROJECT_VLAN_RANGE=3001:4000
Sean M. Collins34296012014-10-27 11:57:20 -0400386 PHYSICAL_NETWORK=default
387 OVS_PHYSICAL_BRIDGE=br-ex
388
389 Q_USE_PROVIDER_NETWORKING=True
390 Q_L3_ENABLED=False
391
392 # Do not use Nova-Network
393 disable_service n-net
394
395 # Neutron
396 ENABLED_SERVICES+=,q-svc,q-dhcp,q-meta,q-agt
397
398 ## Neutron Networking options used to create Neutron Subnets
399
Sean M. Collinsd72b8392015-06-18 12:40:09 -0400400 FIXED_RANGE="203.0.113.0/24"
syed ahsan shamim zaidi512be7d2015-10-20 21:20:27 +0000401 NETWORK_GATEWAY=203.0.113.1
Sean M. Collins34296012014-10-27 11:57:20 -0400402 PROVIDER_SUBNET_NAME="provider_net"
403 PROVIDER_NETWORK_TYPE="vlan"
404 SEGMENTATION_ID=2010
405
406In this configuration we are defining FIXED_RANGE to be a
Sean M. Collinsd72b8392015-06-18 12:40:09 -0400407publicly routed IPv4 subnet. In this specific instance we are using
408the special TEST-NET-3 subnet defined in `RFC 5737 <http://tools.ietf.org/html/rfc5737>`_,
409which is used for documentation. In your DevStack setup, FIXED_RANGE
410would be a public IP address range that you or your organization has
411allocated to you, so that you could access your instances from the
412public internet.
Sean M. Collins34296012014-10-27 11:57:20 -0400413
John Kasperskibdc0fa82015-11-23 11:56:33 -0600414The following is the DevStack configuration on
Sean M. Collins611cab42015-10-09 12:54:32 -0400415compute node 1.
Sean M. Collins34296012014-10-27 11:57:20 -0400416
417::
418
Sean M. Collins611cab42015-10-09 12:54:32 -0400419 HOST_IP=10.0.0.3
420 SERVICE_HOST=10.0.0.2
421 MYSQL_HOST=10.0.0.2
Sean M. Collins611cab42015-10-09 12:54:32 -0400422 RABBIT_HOST=10.0.0.2
423 GLANCE_HOSTPORT=10.0.0.2:9292
Balagopal7ed812c2016-03-01 04:43:31 +0000424 ADMIN_PASSWORD=secret
425 MYSQL_PASSWORD=secret
426 RABBIT_PASSWORD=secret
427 SERVICE_PASSWORD=secret
Sean M. Collins611cab42015-10-09 12:54:32 -0400428
Sean M. Collins34296012014-10-27 11:57:20 -0400429 # Services that a compute node runs
430 ENABLED_SERVICES=n-cpu,rabbit,q-agt
431
Sean M. Collins2977b302016-01-25 09:10:52 -0500432 ## Open vSwitch provider networking options
Sean M. Collins34296012014-10-27 11:57:20 -0400433 PHYSICAL_NETWORK=default
434 OVS_PHYSICAL_BRIDGE=br-ex
435 PUBLIC_INTERFACE=eth1
436 Q_USE_PROVIDER_NETWORKING=True
437 Q_L3_ENABLED=False
438
Sean M. Collins611cab42015-10-09 12:54:32 -0400439Compute node 2's configuration will be exactly the same, except
Markus Zoellerc30657d2015-11-02 11:27:46 +0100440``HOST_IP`` will be ``10.0.0.4``
Sean M. Collins611cab42015-10-09 12:54:32 -0400441
Sean M. Collins34296012014-10-27 11:57:20 -0400442When DevStack is configured to use provider networking (via
Markus Zoellerc30657d2015-11-02 11:27:46 +0100443``Q_USE_PROVIDER_NETWORKING`` is True and ``Q_L3_ENABLED`` is False) -
Sean M. Collins34296012014-10-27 11:57:20 -0400444DevStack will automatically add the network interface defined in
Markus Zoellerc30657d2015-11-02 11:27:46 +0100445``PUBLIC_INTERFACE`` to the ``OVS_PHYSICAL_BRIDGE``
Sean M. Collins34296012014-10-27 11:57:20 -0400446
447For example, with the above configuration, a bridge is
Markus Zoellerc30657d2015-11-02 11:27:46 +0100448created, named ``br-ex`` which is managed by Open vSwitch, and the
449second interface on the compute node, ``eth1`` is attached to the
Shilla Saebi2ed09d82015-04-21 15:02:13 -0400450bridge, to forward traffic sent by guest VMs.
Sean M. Collins872a2622015-10-06 12:45:06 -0400451
452Miscellaneous Tips
453==================
454
Mike Spreitzer4baa4ce2016-01-26 14:06:17 -0500455Non-Standard MTU on the Physical Network
456----------------------------------------
457
Sean M. Collins087ed522016-03-16 11:53:09 -0400458Neutron by default uses a MTU of 1500 bytes, which is
459the standard MTU for Ethernet.
460
461A different MTU can be specified by adding the following to
462the Neutron section of `local.conf`. For example,
463if you have network equipment that supports jumbo frames, you could
464set the MTU to 9000 bytes by adding the following
Mike Spreitzer4baa4ce2016-01-26 14:06:17 -0500465
466::
Sean M. Collinsf81ae882016-02-01 14:00:20 -0500467
Sean M. Collins087ed522016-03-16 11:53:09 -0400468 [[post-config|/$Q_PLUGIN_CONF_FILE]]
469 global_physnet_mtu = 9000
Mike Spreitzer4baa4ce2016-01-26 14:06:17 -0500470
Sean M. Collins872a2622015-10-06 12:45:06 -0400471
472Disabling Next Generation Firewall Tools
473----------------------------------------
474
475DevStack does not properly operate with modern firewall tools. Specifically
476it will appear as if the guest VM can access the external network via ICMP,
477but UDP and TCP packets will not be delivered to the guest VM. The root cause
478of the issue is that both ufw (Uncomplicated Firewall) and firewalld (Fedora's
479firewall manager) apply firewall rules to all interfaces in the system, rather
480then per-device. One solution to this problem is to revert to iptables
481functionality.
482
483To get a functional firewall configuration for Fedora do the following:
484
485::
486
487 sudo service iptables save
488 sudo systemctl disable firewalld
489 sudo systemctl enable iptables
490 sudo systemctl stop firewalld
491 sudo systemctl start iptables
492
493
494To get a functional firewall configuration for distributions containing ufw,
495disable ufw. Note ufw is generally not enabled by default in Ubuntu. To
496disable ufw if it was enabled, do the following:
497
498::
499
500 sudo service iptables save
501 sudo ufw disable
502
Sean M. Collinsd8aa10e2015-10-09 12:21:30 -0400503Configuring Extension Drivers for the ML2 Plugin
504------------------------------------------------
Sean M. Collins872a2622015-10-06 12:45:06 -0400505
Sean M. Collinsd8aa10e2015-10-09 12:21:30 -0400506Extension drivers for the ML2 plugin are set with the variable
Markus Zoellerc30657d2015-11-02 11:27:46 +0100507``Q_ML2_PLUGIN_EXT_DRIVERS``, and includes the 'port_security' extension
Sean M. Collinsd8aa10e2015-10-09 12:21:30 -0400508by default. If you want to remove all the extension drivers (even
Markus Zoellerc30657d2015-11-02 11:27:46 +0100509'port_security'), set ``Q_ML2_PLUGIN_EXT_DRIVERS`` to blank.
Sean M. Collins872a2622015-10-06 12:45:06 -0400510
Sean M. Collins2977b302016-01-25 09:10:52 -0500511
512Using Linux Bridge instead of Open vSwitch
513------------------------------------------
514
515The configuration for using the Linux Bridge ML2 driver is fairly
516straight forward. The Linux Bridge configuration for DevStack is similar
517to the :ref:`Open vSwitch based single interface <single-interface-ovs>`
518setup, with small modifications for the interface mappings.
519
520
521::
522
523 [[local|localrc]]
524 HOST_IP=172.18.161.6
525 SERVICE_HOST=172.18.161.6
526 MYSQL_HOST=172.18.161.6
527 RABBIT_HOST=172.18.161.6
528 GLANCE_HOSTPORT=172.18.161.6:9292
Balagopal7ed812c2016-03-01 04:43:31 +0000529 ADMIN_PASSWORD=secret
530 DATABASE_PASSWORD=secret
531 RABBIT_PASSWORD=secret
532 SERVICE_PASSWORD=secret
Sean M. Collins2977b302016-01-25 09:10:52 -0500533
534 # Do not use Nova-Network
535 disable_service n-net
536 # Enable Neutron
537 ENABLED_SERVICES+=,q-svc,q-dhcp,q-meta,q-agt,q-l3
538
539
540 ## Neutron options
541 Q_USE_SECGROUP=True
542 FLOATING_RANGE="172.18.161.0/24"
543 FIXED_RANGE="10.0.0.0/24"
544 Q_FLOATING_ALLOCATION_POOL=start=172.18.161.250,end=172.18.161.254
545 PUBLIC_NETWORK_GATEWAY="172.18.161.1"
546 Q_L3_ENABLED=True
547 PUBLIC_INTERFACE=eth0
548
549 Q_USE_PROVIDERNET_FOR_PUBLIC=True
550
551 # Linuxbridge Settings
552 Q_AGENT=linuxbridge
553 LB_PHYSICAL_INTERFACE=eth0
554 PUBLIC_PHYSICAL_NETWORK=default
555 LB_INTERFACE_MAPPINGS=default:eth0