Hi Neale,

Thanks for the quick answers



On Mon, Feb 22, 2021 at 9:50 PM Neale Ranns <ne...@graphiant.com> wrote:

>
>
>
>
> *From: *Vijay Kumar <vjkumar2...@gmail.com>
> *Date: *Monday, 22 February 2021 at 16:50
> *To: *Neale Ranns <ne...@graphiant.com>
> *Cc: *vpp-dev <vpp-dev@lists.fd.io>
> *Subject: *Re: [vpp-dev] Why does ipsec plugin create ipip interface for
> each IPSec SA installed by ikev2 plugin
>
> Hi Neale,
>
>
>
> Please find my comments inline.
>
>
>
> On Mon, Feb 22, 2021 at 8:41 PM Neale Ranns <ne...@graphiant.com> wrote:
>
>
>
> Hi Vijsy,
>
>
>
> *From: *vpp-dev@lists.fd.io <vpp-dev@lists.fd.io> on behalf of Vijay
> Kumar via lists.fd.io <vjkumar2003=gmail....@lists.fd.io>
> *Date: *Monday, 22 February 2021 at 12:59
> *To: *vpp-dev <vpp-dev@lists.fd.io>
> *Subject: *[vpp-dev] Why does ipsec plugin create ipip interface for each
> IPSec SA installed by ikev2 plugin
>
> Hi,
>
>
>
> I configured VPP as a responder while Strongswan was the initiator. I
> configured ikev2 profile and tested IPSec. While testing with VPP as
> responder, I found that for every IPSec created, a logical interface
> "ipipx" is created in vpp
>
>
>
>
>
> As the peer network route is added via ipip0 interface, this creates an
> routing extra hop for every pkt that goes out of VPP in the sense that for
> all IPSec packets the first route entry would have ipipx as outgoing
> interface while the 2nd lookup for the ipipx would have another route entry
> with the physical interface as the outgoing interface.
>
>
>
> When there are thousands of tunnels, say 100K or more IPSec SAs, I think
> this would cause performance issues due to the extra route lookup for each
> packet?
>
>
>
> there is no second lookup, the forwarding to the tunnel’s destination is
> ‘cached’ when it is created and used in the data-plane.
>
> >>>> Ok clear. But where is the route lookup result cached? Is this cache
> in SPD entry or SAD entry?
>
>
>
> It’s in the tunnel’s midchain adjacency.
>
>
>
>           If there are 1K IPSEC SAs with 1K different peers, does it mean
> that there are 1K ipipx interfaces cre
>
> ated in VPP?
>
>
>
> Yes.
>
>
>
> Please clarify why the "ipip" tunnel interface creation is required?
>
> How can this be avoided for the case where there are many SAs?
>
>
>
> I think it is better to alter the code to prevent creation of this logical
> interface and allow IPSec plugin to just do encryption and allow the next
> node "IP4-lookup" to do the routing (via phy interface)
>
>
>
> How would you choose which SA to use? Are you referring to route v. policy
> based VPNs? https://wiki.fd.io/view/VPP/IPSec
>
>   >>>>> I am referring to policy based VPNs (where one configures ACL/pkt
> filters and action)
>
>
>
> Finding an SA based on an ACL/policy is not as efficient as routing and
> tunneling, since it requires as tuple based lookup. VPP’s implementation of
> this search, in the SPD, is linear, so scales very poorly.
>
> If you want to address interface scale, then maybe you could look at how
> the IKE plugin could use multipoint tunnels instead.
>
>
>
> /neale
>
>
>
>
>
>
>
> /neale
>
>
>
>
>
> Regards,
>
> Vijay Kumar N
>
>
-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#18786): https://lists.fd.io/g/vpp-dev/message/18786
Mute This Topic: https://lists.fd.io/mt/80822509/21656
Group Owner: vpp-dev+ow...@lists.fd.io
Unsubscribe: https://lists.fd.io/g/vpp-dev/unsub [arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to