Hello Im trying to run *route base* ipsec on vpp version *19.04.4* -rc0 while using dpdk backend but i see that the packets are not forwording and not get encrepted / decrepted.
im using this guide here https://wiki.fd.io/view/VPP/IPSec_and_IKEv2#Routing_traffic_through_ipsec0_interface_on_the_VPP_responder but i see since 19.04 things changed , and this is deprecated?? acoording to this https://wiki.fd.io/view/VPP/IPSec#Deprecated_Model ( https://wiki.fd.io/view/VPP/IPSec#Deprecated_Model ) (it used to work on 19.01.2 ....) i still have all those api coomands in this version but no traffic . i dont see that the relevent nodes are "running" - dpdk_crypto_input , dpdk-esp4-encrypt , dpdk-esp4-decrypt. this is the configuration and relevent dump buffers { ## Increase number of buffers allocated, needed only in scenarios with ## large number of interfaces and worker threads. Value is per numa node. ## Default is 16384 (8192 if running unpriviledged) buffers-per-numa 128000 ## Size of buffer data area ## Default is 2048 # default data-size 2048 } dpdk { uio-driver vfio-pci vdev crypto_aesni_mb0,socket_id=0 dev default { num-rx-desc 4096 num-tx-desc 4096 } #num-mbufs 128000 #socket-mem 0,1024 no-multi-seg no-tx-checksum-offload } vpp# show interface address GigabitEthernet5/0/0 (dn): GigabitEthernet5/0/1 (up): L3 192.168.1.10/24 GigabitEthernet5/0/2 (up): L3 100.100.100.1/24 GigabitEthernet5/0/3 (dn): TenGigabitEthernet6/0/0 (dn): TenGigabitEthernet6/0/1 (dn): TenGigabitEthernet7/0/0 (dn): TenGigabitEthernet7/0/1 (dn): ipsec1 (up): L3 60.60.60.1/24 local0 (dn): vpp# show ipsec all [0] sa 0x80000000 spi 0 mode tunnel protocol esp tunnel [1] sa 0xc0000000 spi 0 mode tunnel protocol esp tunnel [2] sa 0x1 spi 3416637075 mode tunnel protocol esp tunnel [3] sa 0x2 spi 3482884703 mode tunnel protocol esp tunnel SPD Bindings: Tunnel interfaces ipsec1 out-bound sa: [3] sa 0x2 spi 3482884703 mode tunnel protocol esp tunnel in-bound sa: [2] sa 0x1 spi 3416637075 mode tunnel protocol esp tunnel show ip fib table 0 ...... ......... .......... 200.200.200.0/24 unicast-ip4-chain [@0]: dpo-load-balance: [proto:ip4 index:28 buckets:1 uRPF:44 to:[0:0]] [0] [@12]: dpo-load-balance: [proto:ip4 index:27 buckets:1 uRPF:40 to:[0:0]] [0] [@6]: ipv4 [features] via 0.0.0.0 ipsec1: mtu:9000 *stacked-on entry:1:* *[@2]: dpo-drop ip4* ..................... vpp# show ipsec backends IPsec AH backends available: Name Index Active default openssl backend 0 yes IPsec ESP backends available: Name Index Active default openssl backend 0 no dpdk backend 1 *yes* vpp# show trace ------------------- Start of thread 0 vpp_main ------------------- Packet 2 00:06:27:420668: dpdk-input GigabitEthernet5/0/2 rx queue 0 buffer 0x49be2b: current data 0, length 74, buffer-pool 0, ref-count 1, totlen-nifb 0, trace 0x1 ext-hdr-valid l4-cksum-computed l4-cksum-correct PKT MBUF: port 2, nb_segs 1, pkt_len 74 buf_len 2176, data_len 74, ol_flags 0x180, data_off 128, phys_addr 0x126f8b40 packet_type 0x11 l2_len 0 l3_len 0 outer_l2_len 0 outer_l3_len 0 rss 0x0 fdir.hi 0x0 fdir.lo 0x0 Packet Offload Flags PKT_RX_IP_CKSUM_GOOD (0x0080) IP cksum of RX pkt. is valid PKT_RX_L4_CKSUM_GOOD (0x0100) L4 cksum of RX pkt. is valid Packet Types RTE_PTYPE_L2_ETHER (0x0001) Ethernet packet RTE_PTYPE_L3_IPV4 (0x0010) IPv4 packet without extension headers IP4: 00:20:d2:53:4c:db -> 08:35:71:ab:99:5f ICMP: 100.100.100.2 -> 200.200.200.2 tos 0x00, ttl 64, length 60, checksum 0x97f0 fragment id 0x899f ICMP echo_request checksum 0x841f 00:06:27:420671: ethernet-input frame: flags 0x3, hw-if-index 3, sw-if-index 3 IP4: 00:20:d2:53:4c:db -> 08:35:71:ab:99:5f 00:06:27:420672: ip4-input-no-checksum ICMP: 100.100.100.2 -> 200.200.200.2 tos 0x00, ttl 64, length 60, checksum 0x97f0 fragment id 0x899f ICMP echo_request checksum 0x841f 00:06:27:420673: ip4-lookup fib 0 dpo-idx 27 flow hash: 0x00000000 ICMP: 100.100.100.2 -> 200.200.200.2 tos 0x00, ttl 64, length 60, checksum 0x97f0 fragment id 0x899f ICMP echo_request checksum 0x841f 00:06:27:420674: ip4-load-balance fib 0 dpo-idx 14 flow hash: 0x00000000 ICMP: 100.100.100.2 -> 200.200.200.2 tos 0x00, ttl 64, length 60, checksum 0x97f0 fragment id 0x899f ICMP echo_request checksum 0x841f fib 0 dpo-idx 14 flow hash: 0x00000000 ICMP: 100.100.100.2 -> 200.200.200.2 tos 0x00, ttl 64, length 60, checksum 0x97f0 fragment id 0x899f ICMP echo_request checksum 0x841f pls advice... PS i saw the new way in the ipsec link with *ipip* port but i dont have the command in the vppctl of " ipsec tunnel protect ipip0 sa-in 20 sa-out 30" for some resone thanks
-=-=-=-=-=-=-=-=-=-=-=- Links: You receive all messages sent to this group. View/Reply Online (#16981): https://lists.fd.io/g/vpp-dev/message/16981 Mute This Topic: https://lists.fd.io/mt/75537240/21656 Group Owner: vpp-dev+ow...@lists.fd.io Unsubscribe: https://lists.fd.io/g/vpp-dev/unsub [arch...@mail-archive.com] -=-=-=-=-=-=-=-=-=-=-=-