Neale, et al,

As part of our due diligence I am running a simple soak setup of two boxes with 
a fairly simple IKEV2 initiator/responder setup (no NAT in this setup), which 
is based on the online examples. This setup has been soaking for six hours. The 
original ipsec0 path is still up and running just fine, where I can ping from 
host space across the ipsec tunnel between the two boxes. However, I seem to be 
acquiring a new ipsecX interface once an hour give or take on both systems. Is 
this a known feature/issue? See ipsec1-6 below in “show interface” output.

DBGvpp# show interface
              Name               Idx    State  MTU (L3/IP4/IP6/MPLS)     
Counter          Count
GigabitEthernet5/0/0              3     down         9000/0/0/0
GigabitEthernet5/0/1              4     down         9000/0/0/0
TenGigabitEthernet3/0/0           1     down         9000/0/0/0
TenGigabitEthernet3/0/1           2      up          9000/0/0/0     rx packets  
                  23
                                                                    rx bytes    
                4252
                                                                    tx packets  
                  24
                                                                    tx bytes    
                4664
                                                                    drops       
                  14
                                                                    ip4         
                  22
ipsec0                            6      up          9000/0/0/0     rx packets  
                   8
                                                                    rx bytes    
                1056
                                                                    tx packets  
                   9
                                                                    tx bytes    
                1368
                                                                    ip4         
                   8
ipsec1                            7     down         9000/0/0/0
ipsec2                            8     down         9000/0/0/0
ipsec3                            9     down         9000/0/0/0
ipsec4                            10    down         9000/0/0/0
ipsec5                            11    down         9000/0/0/0
ipsec6                            12    down         9000/0/0/0
local0                            0     down          0/0/0/0       drops       
                   2
tap0                              5      up          9000/0/0/0     rx packets  
                  22
                                                                    rx bytes    
                2124
                                                                    tx packets  
                  11
                                                                    tx bytes    
                1294
                                                                    drops       
                  10
                                                                    ip4         
                   9
                                                                    ip6         
                  10
DBGvpp# show version
vpp v19.04.1-release built by root on X10SDV-4C-TLN4F at Mon Jun 10 16:38:34 
UTC 2019

Here is the configuration:

######################
# Test config for Initiator
######################
# host route path to get to initiator
ip route add 192.168.27.0/24 via 192.168.33.1

# vpp configuration
telnet 0 5002
set int state TenGigabitEthernet3/0/1 up
set int ip address TenGigabitEthernet3/0/1 10.0.0.1/24
create tap host-if-name tap0 host-bridge br0
set interface ip address tap0 192.168.27.1/24
set int state tap0 up
ikev2 profile add pr1
ikev2 profile set pr1 auth shared-key-mic string Vpp123
ikev2 profile set pr1 id remote fqdn vpp.home
ikev2 profile set pr1 id local fqdn roadwarrior.vpn.example.com
ikev2 profile set pr1 traffic-selector local ip-range 192.168.27.0 - 
192.168.27.255 port-range 0 - 65535 protocol 0
ikev2 profile set pr1 traffic-selector remote ip-range 192.168.33.0 - 
192.168.33.255 port-range 0 - 65535 protocol 0
ikev2 profile set pr1 ike-crypto-alg aes-cbc 256  ike-integ-alg sha1-96  ike-dh 
modp-2048
ikev2 profile set pr1 esp-crypto-alg aes-cbc 256  esp-integ-alg sha1-96  esp-dh 
ecp-256
ikev2 profile set pr1 sa-lifetime 3600 10 5 0
ikev2 profile set pr1 responder TenGigabitEthernet3/0/1 10.0.0.2

######################
# To initiate
######################
ikev2 initiate sa-init pr1
show interface
# may need to run initiate a couple times... looking for ipsec0 to show up on 
both systems

######################
# once sa is established configure route
######################
ip route add 192.168.33.0/24 via ipsec0
set interface state ipsec0 up
set interface unnumbered ipsec0 use TenGigabitEthernet3/0/1

######################
# Test config for Responder
######################
# host route path to get to responder
ip route add 192.168.33.0/24 via 192.168.27.1

# vpp configuration
telnet 0 5002
set int state TenGigabitEthernet3/0/1 up
set int ip address TenGigabitEthernet3/0/1 10.0.0.2/24
create tap host-if-name tap0 host-bridge br0
set interface ip address tap0 192.168.33.1/24
set int state tap0 up
ikev2 profile add pr1
ikev2 profile set pr1 auth shared-key-mic string Vpp123
ikev2 profile set pr1 id local fqdn vpp.home
ikev2 profile set pr1 id remote fqdn roadwarrior.vpn.example.com
ikev2 profile set pr1 traffic-selector local ip-range 192.168.33.0 - 
192.168.33.255 port-range 0 - 65535 protocol 0
ikev2 profile set pr1 traffic-selector remote ip-range 192.168.27.0 - 
192.168.27.255 port-range 0 - 65535 protocol 0

######################
# once sa is established configure route
######################
ip route add 192.168.27.0/24 via ipsec0
set interface state ipsec0 up
set interface unnumbered ipsec0 use TenGigabitEthernet3/0/1

-Mike

From: vpp-dev@lists.fd.io <vpp-dev@lists.fd.io> On Behalf Of Bly, Mike
Sent: Friday, June 07, 2019 12:42 PM
To: vpp-dev@lists.fd.io
Subject: [**EXTERNAL**] Re: [vpp-dev] ikev2-ipsec-tunnel && NAT-T ?

Are there any updates on this topic? We are playing around with IPSEC/IKEV2 
sitting behind NAT and up through v19.04.1 we are not seeing an option to 
configure IKEv2 over UDP. I do see CLI support was added for 
configuring/enabling IPSEC tunnel to use UDP via "ipsec sa add", but "show 
trace" shows IKEv2 is still native IPSEC_ESP instead of IPSEC_ESP over UDP. Is 
IKEv2 support still considered PoC?

I have a couple more questions, but I figured it would be best to start with 
this one.

-Mike
-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.

View/Reply Online (#13250): https://lists.fd.io/g/vpp-dev/message/13250
Mute This Topic: https://lists.fd.io/mt/32010411/21656
Group Owner: vpp-dev+ow...@lists.fd.io
Unsubscribe: https://lists.fd.io/g/vpp-dev/unsub  [arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to