Skip to main content

Table 2 Permission data base example

From: Vulnerabilities and solutions for isolation in FlowVisor-based virtual network environments

Virtual network

OpenFlow Action 1

OF Action 2

...

OF Action N

 

(send to controller)

(discard)

  

Controller A

Allowed

Denied

...

Denied

Controller B

Denied

Denied

...

Allowed

Controller C

Allowed

Allowed

...

Allowed