Hi,

I configured VPP as a responder while Strongswan was the initiator. I
configured ikev2 profile and tested IPSec. While testing with VPP as
responder, I found that for every IPSec created, a logical interface
"ipipx" is created in vpp


As the peer network route is added via ipip0 interface, this creates an
routing extra hop for every pkt that goes out of VPP in the sense that for
all IPSec packets the first route entry would have ipipx as outgoing
interface while the 2nd lookup for the ipipx would have another route entry
with the physical interface as the outgoing interface.

When there are thousands of tunnels, say 100K or more IPSec SAs, I think
this would cause performance issues due to the extra route lookup for each
packet?

Please clarify why the "ipip" tunnel interface creation is required?
How can this be avoided for the case where there are many SAs?

I think it is better to alter the code to prevent creation of this logical
interface and allow IPSec plugin to just do encryption and allow the next
node "IP4-lookup" to do the routing (via phy interface)


Regards,
Vijay Kumar N
-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#18779): https://lists.fd.io/g/vpp-dev/message/18779
Mute This Topic: https://lists.fd.io/mt/80822509/21656
Group Owner: vpp-dev+ow...@lists.fd.io
Unsubscribe: https://lists.fd.io/g/vpp-dev/unsub [arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to