Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Defining Policy Rule Between Two UEs #33

Open
RamzahRehmanPAK opened this issue May 10, 2023 · 3 comments
Open

Defining Policy Rule Between Two UEs #33

RamzahRehmanPAK opened this issue May 10, 2023 · 3 comments
Assignees

Comments

@RamzahRehmanPAK
Copy link

How can I define a policy rule to specifically allow traffic between two UEs and deny all other traffic? I am working on the Aether project. So I added one default allow (high priority) and one default deny (low priority) rule in the config file on the Aether project (sd-core-5g-values.yaml file) as shown below: Screen Shot 2023-05-10 at 10 50 15 AM

Since their config file doesn't allow to define two endpoints in their allow/deny policy. I modified the "allow-specific" rule in pcf/service/init.go file to add a PCC rule that allows traffic between 172.250.237.122 and 172.250.237.121 like this "permit out ip from 172.250.237.122/32 to 172.250.237.121/32" as shown below.

Screen Shot 2023-05-10 at 10 48 09 AM

The expected behavior is that all traffic between 172.250.237.122 and 172.250.237.121 should be allowed and all others should be denied. However, all the traffic gets denied including the traffic between 172.250.237.122 and 172.250.237.121. Kindly help me figure out the issue.

@onf-bot
Copy link
Contributor

onf-bot commented Mar 28, 2024

This issue has been stale for 30 days and will be closed in 5 days. Comment to keep it open.

Copy link

This issue has been stale for 120 days and will be closed in 15 days. Comment to keep it open.

@github-actions github-actions bot closed this as not planned Won't fix, can't repro, duplicate, stale Aug 12, 2024
@gab-arrobo gab-arrobo reopened this Aug 19, 2024
Copy link

This issue has been stale for 120 days and will be closed in 15 days. Comment to keep it open.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants