Cisco VPNaaS should reject unsupported IPSec Encap Mode
Bug #1422941 reported by
Yanping Qu
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
neutron |
Fix Released
|
Undecided
|
Yanping Qu |
Bug Description
Cisco VPNaaS creates "tunnel" encapsulation mode for IPsec policy on Cisco CSR even though "transport" encapsulation mode is specified by the user.
Currently Cisco CSR REST API for VPN only support "tunnel" encapsulation mode for IPSec policy. If "transport" encapsulation mode in IPSec policy is specified by the user, the IPSec site-to-site connection creation request should be rejected.
Changed in neutron: | |
assignee: | nobody → Yanping Qu (yanping) |
summary: |
- Cisco VPNaaS should reject transport IPSec Encap Mode + Cisco VPNaaS should reject unsupported IPSec Encap Mode |
Changed in neutron: | |
status: | New → Confirmed |
Changed in neutron: | |
milestone: | none → kilo-3 |
status: | Fix Committed → Fix Released |
Changed in neutron: | |
milestone: | kilo-3 → 2015.1.0 |
To post a comment you must log in.
Fix proposed to branch: master /review. openstack. org/157145
Review: https:/