[Edited Message Follows] I tried to send the reverse traffic from 192.168.200.20 <-> 192.168.100.20. I investigated further. It looks like DPDK is not transmitting the traffic on the VPP n after it got decrypted from IPSEC. Same issue but this time interface eth3 owned by DPDK on VPP1 is still up. The local ping from VPP1 to host 192.168.100.20 looks good.
On Thu, Aug 19, 2021 at 11:49 AM Benoit Ganne (bganne) < bga...@cisco.com > wrote: > > That looks suspicious for sure... Can you try with VPP native virtio > driver instead of DPDK? > > ben > > > -----Original Message----- > > From: satish amara < satishkam...@gmail.com > > > Sent: jeudi 19 août 2021 17:43 > > To: Benoit Ganne (bganne) < bga...@cisco.com > > > Cc: vpp-dev@lists.fd.io ; Damjan Marion < dmar...@me.com > > > Subject: Re: [vpp-dev] DPDK initialization issues > > > > Also, I noticed an interesting thing. After I stop the (exit) VPP the > > queued packets are sent out by the DPDK driver. > > > > On Thu, Aug 19, 2021 at 11:32 AM satish amara < satishkam...@gmail.com > > <mailto: satishkam...@gmail.com > > wrote: > > > > > > What is surprising is everything works fine until I do IPSEC. The > > > ping to local networks on the eth3 interface works fine until IPSEC > > traffic starts. > > After IPSEC traffic starts on VPP2 the connectivity on eth3 to > local > > LAN is gone. > > > > On Thu, Aug 19, 2021 at 11:20 AM Benoit Ganne (bganne) > > < bga...@cisco.com <mailto: bga...@cisco.com > > wrote: > > > > > > I do not see any issue in these logs, everything looks > like it > > is working fine. > > This could be a config issue on the host side. > > If you use dpdk testpmd between the interfaces instead of > VPP, > > does it work? > > Also, you can try using VPP native virtio driver instead > of > > dpdk, see "create interface virtio" cli commands. > > > > Best > > ben > > > > > -----Original Message----- > > > From: satish amara < satishkam...@gmail.com > > <mailto: satishkam...@gmail.com > > > > > Sent: jeudi 19 août 2021 16:39 > > > To: Benoit Ganne (bganne) < bga...@cisco.com > > <mailto: bga...@cisco.com > > > > > Cc: vpp-dev@lists.fd.io <mailto: vpp-dev@lists.fd.io > ; > > > Damjan Marion < dmar...@me.com <mailto: dmar...@me.com > > > > > Subject: Re: [vpp-dev] DPDK initialization issues > > > > > > Hi, > > > Here are the attached logs. I also see the counters > on > > eth3 get > > > increments after pings packets are sent out. The packets > are > > never sent > > > out after that. > > > They are stuck on tx queue. Thank you for looking into > > this. > > > > > > Regards, > > > Satish K Amara > > > > > > > > > > > > On Thu, Aug 19, 2021 at 3:13 AM Benoit Ganne (bganne) > > < bga...@cisco.com <mailto: bga...@cisco.com > > > > <mailto: bga...@cisco.com <mailto: bga...@cisco.com > > > > > > wrote: > > > > > > > > > I do not think those are hard errors, especially > if > > packets go > > > through. > > > To debug the ipsec issue we'll need a packet > trace, > > eg.: > > > ~# vppctl cle tr > > > ~# vppctl tr add dpdk-input 100 > > > > > > ~# vppctl sh tr > > > > > > Best > > > ben > > > > > > > -----Original Message----- > > > > From: vpp-dev@lists.fd.io <mailto: vpp- > > d...@lists.fd.io > <mailto: vpp-dev@lists.fd.io <mailto: > > vpp-dev@lists.fd.io > > > > > <vpp- > > > d...@lists.fd.io <mailto: d...@lists.fd.io > <mailto: vpp- > > > d...@lists.fd.io <mailto: vpp-dev@lists.fd.io > > > On Behalf Of satish > amara > > > > Sent: mercredi 18 août 2021 20:37 > > > > To: vpp-dev@lists.fd.io <mailto: vpp-dev@lists.fd.io > > > > <mailto: vpp-dev@lists.fd.io <mailto: vpp-dev@lists.fd.io > > > > > > Cc: Damjan Marion < dmar...@me.com > > <mailto: dmar...@me.com > <mailto: dmar...@me.com <mailto: dmar...@me.com > > > > > > > > > > Subject: [vpp-dev] DPDK initialization issues > > > > > > > > [Edited Message Follows] > > > > > > > > Hi, > > > > > > > > I tried to bring the VPP with DPDK enabled > > interface and seeing > > > the > > > > following issues. Not sure how to resolve them. > > > > > > > > 2021/08/18 14:12:17:921 notice vat-plug/load > > > Loaded plugin: > > > > nsim_test_plugin.so > > > > 2021/08/18 14:12:17:921 notice dpdk > > EAL: Detected 4 > > > lcore(s) > > > > 2021/08/18 14:12:17:921 notice dpdk > > EAL: Detected 1 > > > NUMA > > > > nodes > > > > 2021/08/18 14:12:17:921 notice dpdk > > EAL: Selected > > > IOVA mode > > > > 'PA' > > > > 2021/08/18 14:12:17:921 notice dpdk > > EAL: No > > > available > > > > hugepages reported in hugepages-1048576kB > > > > 2021/08/18 14:12:17:921 notice dpdk > > EAL: No free > > > hugepages > > > > reported in hugepages-1048576kB > > > > 2021/08/18 14:12:17:921 notice dpdk > > EAL: No > > > available > > > > hugepages reported in hugepages-1048576kB > > > > 2021/08/18 14:12:17:921 notice dpdk > > EAL: Probing > > > VFIO > > > > support... > > > > 2021/08/18 14:12:17:921 notice dpdk > > EAL: VFIO > > > support > > > > initialized > > > > 2021/08/18 14:12:17:921 notice dpdk > > EAL: WARNING! > > > Base > > > > virtual address hint (0xa80001000 != > 0x7fedc0000000) > > not > > > respected! > > > > 2021/08/18 14:12:17:921 notice dpdk > > EAL: This may > > > cause > > > > issues with mapping memory into secondary > processes > > > > 2021/08/18 14:12:17:921 notice dpdk > > EAL: WARNING! > > > Base > > > > virtual address hint (0xc00002000 != > 0x7fe580000000) > > not > > > respected! > > > > 2021/08/18 14:12:17:921 notice dpdk > > EAL: This may > > > cause > > > > issues with mapping memory into secondary > processes > > > > 2021/08/18 14:12:17:921 notice dpdk > > EAL: WARNING! > > > Base > > > > virtual address hint (0xd80003000 != > 0x7fdd40000000) > > not > > > respected! > > > > 2021/08/18 14:12:17:921 notice dpdk > > EAL: This may > > > cause > > > > issues with mapping memory into secondary > processes > > > > 2021/08/18 14:12:17:921 notice dpdk > > EAL: WARNING! > > > Base > > > > virtual address hi > > > > nt (0xdc0a64000 != 0x7fd93fe00000) not > respected! > > > > 2021/08/18 14:12:17:921 notice dpdk > > EAL: This may > > > cause > > > > issues with mapping memory into secondary > processes > > > > 2021/08/18 14:12:17:921 notice dpdk > > EAL: WARNING! > > > Base > > > > virtual address hint (0xdc16c5000 != > 0x7fd53fc00000) > > not > > > respected! > > > > 2021/08/18 14:12:17:921 notice dpdk > > EAL: This may > > > cause > > > > issues with mapping memory into secondary > processes > > > > 2021/08/18 14:12:17:921 notice dpdk > > EAL: WARNING! > > > Base > > > > virtual address hint (0xdc2326000 != > 0x7fd13fa00000) > > not > > > respected! > > > > 2021/08/18 14:12:17:921 notice dpdk > > EAL: This may > > > cause > > > > issues with mapping memory into secondary > processes > > > > 2021/08/18 14:12:17:921 notice dpdk > > EAL: WARNING! > > > Base > > > > virtual address hint (0xdc2f87000 != > 0x7fcd3f800000) > > not > > > respected! > > > > 2021/08/18 14:12:17:921 notice dpdk > > EAL: This may > > > cause > > > > issues with mapping memory into secondary > processes > > > > 2021/08/18 14:12:17:921 notice dpdk > > EAL: Using memfd > > > is not > > > > supported, falling back to anonymous hugepages > > > > 2021/08/18 14:12:17:921 notice dpdk > > EAL: Invalid > > > NUMA > > > > socket, default to 0 > > > > 2021/08/18 14:12:17:921 notice dpdk > > EAL: Probe PCI > > > driver: > > > > net_virtio (1af4:1000) device: 0000:00:04.0 > (socket > > 0) > > > > 2021/08/18 14:12:17:921 notice dpdk > > EAL: Invalid > > > NUMA > > > > socket, default to 0 > > > > 2021/08/18 14:12:17:921 notice dpdk > > EAL: Probe PCI > > > driver: > > > > net_virtio (1af4:1000) device: 0000:00:05.0 > (socket > > 0) > > > > 2021/08/18 14:12:17:921 notice dpdk > > EAL: Invalid > > > NUMA > > > > socket, default to 0 > > > > 2021/08/18 14:12:17:921 notice dpdk > > EAL: Probe PCI > > > driver: > > > > net_virtio (1af4:1000) device: 0000:00:06.0 > (socket > > 0) > > > > 2021/08/18 14:12:17:921 notice dpdk > > EAL: No legacy > > > > callbacks, legacy socket not created > > > > 2021/08/18 14:12:17:921 notice dpdk > > EAL: VFIO > > > support not > > > > initialized > > > > > > > > cat /etc/sysctl.d/80-vpp.conf > > > > # Number of 2MB hugepages desired > > > > vm.nr_hugepages=1024 > > > > > > > > # Must be greater than or equal to (2 * > > vm.nr_hugepages). > > > > vm.max_map_count=3096 > > > > > > > > # All groups allowed to access hugepages > > > > vm.hugetlb_shm_group=0 > > > > # Shared Memory Max must be greater or equal to > the > > total size of > > > > hugepages. > > > > # For 2MB pages, TotalHugepageSize = > vm.nr_hugepages > > * 2 * 1024 * > > > 1024 > > > > # If the existing kernel.shmmax setting (cat > > > /proc/sys/kernel/shmmax) > > > > # is greater than the calculated > TotalHugepageSize > > then set this > > > parameter > > > > # to current shmmax value. > > > > kernel.shmmax=2147483648 > > > > > > > > > > > > > > > > > > > > > > > > But in spite of the error, I was able to ping > thru > > the interface > > > owned by > > > > DPDK. Seeing issue for IPSEC traffic. So trying > to > > find where the > > > issue > > > > is > > > > > > > > Thanks, > > > > Satish Amara > > > > > > > > >
Ping from Host2 that connected to VPP2 fails ping 192.168.100.20 -c 5 PING 192.168.100.20 (192.168.100.20) 56(84) bytes of data. --- 192.168.100.20 ping statistics --- 5 packets transmitted, 0 received, 100% packet loss, time 4104ms ---------------------------------------------------------------------- VPP trace on VPP1 vpp# show trace ------------------- Start of thread 0 vpp_main ------------------- Packet 1 00:06:38:909894: dpdk-input eth1 rx queue 0 buffer 0x9b8d6: current data 0, length 166, buffer-pool 0, ref-count 1, totlen-nifb 0, trace handle 0x0 ext-hdr-valid l4-cksum-computed l4-cksum-correct PKT MBUF: port 0, nb_segs 1, pkt_len 166 buf_len 2176, data_len 166, ol_flags 0x0, data_off 128, phys_addr 0x72ae3600 packet_type 0x0 l2_len 0 l3_len 0 outer_l2_len 0 outer_l3_len 0 rss 0x0 fdir.hi 0x0 fdir.lo 0x0 IP4: fa:16:3f:ec:96:77 -> fa:16:3f:9b:60:7a IPSEC_ESP: 192.168.2.6 -> 192.168.1.6 tos 0x00, ttl 62, length 152, checksum 0xf7d7 dscp CS0 ecn NON_ECN fragment id 0x0000 00:06:38:909939: ethernet-input frame: flags 0x1, hw-if-index 1, sw-if-index 1 IP4: fa:16:3f:ec:96:77 -> fa:16:3f:9b:60:7a 00:06:38:909950: ip4-input IPSEC_ESP: 192.168.2.6 -> 192.168.1.6 tos 0x00, ttl 62, length 152, checksum 0xf7d7 dscp CS0 ecn NON_ECN fragment id 0x0000 00:06:38:909954: ip4-lookup fib 0 dpo-idx 7 flow hash: 0x00000000 IPSEC_ESP: 192.168.2.6 -> 192.168.1.6 tos 0x00, ttl 62, length 152, checksum 0xf7d7 dscp CS0 ecn NON_ECN fragment id 0x0000 00:06:38:909958: ip4-local IPSEC_ESP: 192.168.2.6 -> 192.168.1.6 tos 0x00, ttl 62, length 152, checksum 0xf7d7 dscp CS0 ecn NON_ECN fragment id 0x0000 00:06:38:909960: ipsec4-tun-input IPSec: remote:192.168.2.6 spi:3336905041 (0xc6e52151) seq 23 sa 1 00:06:38:909967: esp4-decrypt-tun esp: crypto aes-cbc-256 integrity sha1-96 pkt-seq 23 sa-seq 23 sa-seq-hi 0 00:06:38:909992: ip4-input-no-checksum ICMP: 192.168.200.20 -> 192.168.100.20 tos 0x00, ttl 63, length 84, checksum 0xb46f dscp CS0 ecn NON_ECN fragment id 0xd9bf, flags DONT_FRAGMENT ICMP echo_request checksum 0x57fb 00:06:38:909993: ip4-lookup fib 0 dpo-idx 5 flow hash: 0x00000000 ICMP: 192.168.200.20 -> 192.168.100.20 tos 0x00, ttl 63, length 84, checksum 0xb46f dscp CS0 ecn NON_ECN fragment id 0xd9bf, flags DONT_FRAGMENT ICMP echo_request checksum 0x57fb 00:06:38:909994: ip4-rewrite tx_sw_if_index 3 dpo-idx 5 : ipv4 via 192.168.100.20 eth3: mtu:9000 next:5 fa163f96599efa163fecc23b0800 flow hash: 0x00000000 00000000: fa163f96599efa163fecc23b080045000054d9bf40003e01b56fc0a8c814c0a8 00000020: 6414080057fb4f4900014d941e61000000001df20800000000001011 00:06:38:909996: eth3-output eth3 IP4: fa:16:3f:ec:c2:3b -> fa:16:3f:96:59:9e ICMP: 192.168.200.20 -> 192.168.100.20 tos 0x00, ttl 62, length 84, checksum 0xb56f dscp CS0 ecn NON_ECN fragment id 0xd9bf, flags DONT_FRAGMENT ICMP echo_request checksum 0x57fb 00:06:38:909998: eth3-tx eth3 tx queue 0 buffer 0x9b8d6: current data 44, length 98, buffer-pool 0, ref-count 1, trace handle 0x0 ext-hdr-valid l4-cksum-computed l4-cksum-correct l2-hdr-offset 0 l3-hdr-offset 14 PKT MBUF: port 0, nb_segs 1, pkt_len 98 buf_len 2176, data_len 98, ol_flags 0x0, data_off 172, phys_addr 0x72ae3600 packet_type 0x0 l2_len 0 l3_len 0 outer_l2_len 0 outer_l3_len 0 rss 0x0 fdir.hi 0x0 fdir.lo 0x0 IP4: fa:16:3f:ec:c2:3b -> fa:16:3f:96:59:9e ICMP: 192.168.200.20 -> 192.168.100.20 tos 0x00, ttl 62, length 84, checksum 0xb56f dscp CS0 ecn NON_ECN fragment id 0xd9bf, flags DONT_FRAGMENT ICMP echo_request checksum 0x57fb Packet 2 00:06:39:938819: dpdk-input eth1 rx queue 0 buffer 0x9b8af: current data 0, length 166, buffer-pool 0, ref-count 1, totlen-nifb 0, trace handle 0x1 ext-hdr-valid l4-cksum-computed l4-cksum-correct PKT MBUF: port 0, nb_segs 1, pkt_len 166 buf_len 2176, data_len 166, ol_flags 0x0, data_off 128, phys_addr 0x72ae2c40 packet_type 0x0 l2_len 0 l3_len 0 outer_l2_len 0 outer_l3_len 0 rss 0x0 fdir.hi 0x0 fdir.lo 0x0 IP4: fa:16:3f:ec:96:77 -> fa:16:3f:9b:60:7a IPSEC_ESP: 192.168.2.6 -> 192.168.1.6 tos 0x00, ttl 62, length 152, checksum 0xf7d7 dscp CS0 ecn NON_ECN fragment id 0x0000 00:06:39:938833: ethernet-input frame: flags 0x1, hw-if-index 1, sw-if-index 1 IP4: fa:16:3f:ec:96:77 -> fa:16:3f:9b:60:7a 00:06:39:938840: ip4-input IPSEC_ESP: 192.168.2.6 -> 192.168.1.6 tos 0x00, ttl 62, length 152, checksum 0xf7d7 dscp CS0 ecn NON_ECN fragment id 0x0000 00:06:39:938844: ip4-lookup fib 0 dpo-idx 7 flow hash: 0x00000000 IPSEC_ESP: 192.168.2.6 -> 192.168.1.6 tos 0x00, ttl 62, length 152, checksum 0xf7d7 dscp CS0 ecn NON_ECN fragment id 0x0000 00:06:39:938846: ip4-local IPSEC_ESP: 192.168.2.6 -> 192.168.1.6 tos 0x00, ttl 62, length 152, checksum 0xf7d7 dscp CS0 ecn NON_ECN fragment id 0x0000 00:06:39:938848: ipsec4-tun-input IPSec: remote:192.168.2.6 spi:3336905041 (0xc6e52151) seq 24 sa 1 00:06:39:938851: esp4-decrypt-tun esp: crypto aes-cbc-256 integrity sha1-96 pkt-seq 24 sa-seq 24 sa-seq-hi 0 00:06:39:938866: ip4-input-no-checksum ICMP: 192.168.200.20 -> 192.168.100.20 tos 0x00, ttl 63, length 84, checksum 0xb464 dscp CS0 ecn NON_ECN fragment id 0xd9ca, flags DONT_FRAGMENT ICMP echo_request checksum 0x7987 00:06:39:938868: ip4-lookup fib 0 dpo-idx 5 flow hash: 0x00000000 ICMP: 192.168.200.20 -> 192.168.100.20 tos 0x00, ttl 63, length 84, checksum 0xb464 dscp CS0 ecn NON_ECN fragment id 0xd9ca, flags DONT_FRAGMENT ICMP echo_request checksum 0x7987 00:06:39:938868: ip4-rewrite tx_sw_if_index 3 dpo-idx 5 : ipv4 via 192.168.100.20 eth3: mtu:9000 next:5 fa163f96599efa163fecc23b0800 flow hash: 0x00000000 00000000: fa163f96599efa163fecc23b080045000054d9ca40003e01b564c0a8c814c0a8 00000020: 6414080079874f4900024e941e6100000000fa640900000000001011 00:06:39:938870: eth3-output eth3 IP4: fa:16:3f:ec:c2:3b -> fa:16:3f:96:59:9e ICMP: 192.168.200.20 -> 192.168.100.20 tos 0x00, ttl 62, length 84, checksum 0xb564 dscp CS0 ecn NON_ECN fragment id 0xd9ca, flags DONT_FRAGMENT ICMP echo_request checksum 0x7987 00:06:39:938872: eth3-tx eth3 tx queue 0 buffer 0x9b8af: current data 44, length 98, buffer-pool 0, ref-count 1, trace handle 0x1 ext-hdr-valid l4-cksum-computed l4-cksum-correct l2-hdr-offset 0 l3-hdr-offset 14 PKT MBUF: port 0, nb_segs 1, pkt_len 98 buf_len 2176, data_len 98, ol_flags 0x0, data_off 172, phys_addr 0x72ae2c40 packet_type 0x0 l2_len 0 l3_len 0 outer_l2_len 0 outer_l3_len 0 rss 0x0 fdir.hi 0x0 fdir.lo 0x0 IP4: fa:16:3f:ec:c2:3b -> fa:16:3f:96:59:9e ICMP: 192.168.200.20 -> 192.168.100.20 tos 0x00, ttl 62, length 84, checksum 0xb564 dscp CS0 ecn NON_ECN fragment id 0xd9ca, flags DONT_FRAGMENT ICMP echo_request checksum 0x7987 Packet 3 00:06:40:962597: dpdk-input eth1 rx queue 0 buffer 0x9b888: current data 0, length 166, buffer-pool 0, ref-count 1, totlen-nifb 0, trace handle 0x2 ext-hdr-valid l4-cksum-computed l4-cksum-correct PKT MBUF: port 0, nb_segs 1, pkt_len 166 buf_len 2176, data_len 166, ol_flags 0x0, data_off 128, phys_addr 0x72ae2280 packet_type 0x0 l2_len 0 l3_len 0 outer_l2_len 0 outer_l3_len 0 rss 0x0 fdir.hi 0x0 fdir.lo 0x0 IP4: fa:16:3f:ec:96:77 -> fa:16:3f:9b:60:7a IPSEC_ESP: 192.168.2.6 -> 192.168.1.6 tos 0x00, ttl 62, length 152, checksum 0xf7d7 dscp CS0 ecn NON_ECN fragment id 0x0000 00:06:40:962612: ethernet-input frame: flags 0x1, hw-if-index 1, sw-if-index 1 IP4: fa:16:3f:ec:96:77 -> fa:16:3f:9b:60:7a 00:06:40:962617: ip4-input IPSEC_ESP: 192.168.2.6 -> 192.168.1.6 tos 0x00, ttl 62, length 152, checksum 0xf7d7 dscp CS0 ecn NON_ECN fragment id 0x0000 00:06:40:962621: ip4-lookup fib 0 dpo-idx 7 flow hash: 0x00000000 IPSEC_ESP: 192.168.2.6 -> 192.168.1.6 tos 0x00, ttl 62, length 152, checksum 0xf7d7 dscp CS0 ecn NON_ECN fragment id 0x0000 00:06:40:962623: ip4-local IPSEC_ESP: 192.168.2.6 -> 192.168.1.6 tos 0x00, ttl 62, length 152, checksum 0xf7d7 dscp CS0 ecn NON_ECN fragment id 0x0000 00:06:40:962625: ipsec4-tun-input IPSec: remote:192.168.2.6 spi:3336905041 (0xc6e52151) seq 25 sa 1 00:06:40:962628: esp4-decrypt-tun esp: crypto aes-cbc-256 integrity sha1-96 pkt-seq 25 sa-seq 25 sa-seq-hi 0 00:06:40:962643: ip4-input-no-checksum ICMP: 192.168.200.20 -> 192.168.100.20 tos 0x00, ttl 63, length 84, checksum 0xb09c dscp CS0 ecn NON_ECN fragment id 0xdd92, flags DONT_FRAGMENT ICMP echo_request checksum 0xba28 00:06:40:962645: ip4-lookup fib 0 dpo-idx 5 flow hash: 0x00000000 ICMP: 192.168.200.20 -> 192.168.100.20 tos 0x00, ttl 63, length 84, checksum 0xb09c dscp CS0 ecn NON_ECN fragment id 0xdd92, flags DONT_FRAGMENT ICMP echo_request checksum 0xba28 00:06:40:962645: ip4-rewrite tx_sw_if_index 3 dpo-idx 5 : ipv4 via 192.168.100.20 eth3: mtu:9000 next:5 fa163f96599efa163fecc23b0800 flow hash: 0x00000000 00000000: fa163f96599efa163fecc23b080045000054dd9240003e01b19cc0a8c814c0a8 00000020: 64140800ba284f4900034f941e6100000000b8c20900000000001011 00:06:40:962646: eth3-output eth3 IP4: fa:16:3f:ec:c2:3b -> fa:16:3f:96:59:9e ICMP: 192.168.200.20 -> 192.168.100.20 tos 0x00, ttl 62, length 84, checksum 0xb19c dscp CS0 ecn NON_ECN fragment id 0xdd92, flags DONT_FRAGMENT ICMP echo_request checksum 0xba28 00:06:40:962648: eth3-tx eth3 tx queue 0 buffer 0x9b888: current data 44, length 98, buffer-pool 0, ref-count 1, trace handle 0x2 ext-hdr-valid l4-cksum-computed l4-cksum-correct l2-hdr-offset 0 l3-hdr-offset 14 PKT MBUF: port 0, nb_segs 1, pkt_len 98 buf_len 2176, data_len 98, ol_flags 0x0, data_off 172, phys_addr 0x72ae2280 packet_type 0x0 l2_len 0 l3_len 0 outer_l2_len 0 outer_l3_len 0 rss 0x0 fdir.hi 0x0 fdir.lo 0x0 IP4: fa:16:3f:ec:c2:3b -> fa:16:3f:96:59:9e ICMP: 192.168.200.20 -> 192.168.100.20 tos 0x00, ttl 62, length 84, checksum 0xb19c dscp CS0 ecn NON_ECN fragment id 0xdd92, flags DONT_FRAGMENT ICMP echo_request checksum 0xba28 Packet 4 00:06:41:986737: dpdk-input eth1 rx queue 0 buffer 0x9b861: current data 0, length 166, buffer-pool 0, ref-count 1, totlen-nifb 0, trace handle 0x3 ext-hdr-valid l4-cksum-computed l4-cksum-correct PKT MBUF: port 0, nb_segs 1, pkt_len 166 buf_len 2176, data_len 166, ol_flags 0x0, data_off 128, phys_addr 0x72ae18c0 packet_type 0x0 l2_len 0 l3_len 0 outer_l2_len 0 outer_l3_len 0 rss 0x0 fdir.hi 0x0 fdir.lo 0x0 IP4: fa:16:3f:ec:96:77 -> fa:16:3f:9b:60:7a IPSEC_ESP: 192.168.2.6 -> 192.168.1.6 tos 0x00, ttl 62, length 152, checksum 0xf7d7 dscp CS0 ecn NON_ECN fragment id 0x0000 00:06:41:986750: ethernet-input frame: flags 0x1, hw-if-index 1, sw-if-index 1 IP4: fa:16:3f:ec:96:77 -> fa:16:3f:9b:60:7a 00:06:41:986756: ip4-input IPSEC_ESP: 192.168.2.6 -> 192.168.1.6 tos 0x00, ttl 62, length 152, checksum 0xf7d7 dscp CS0 ecn NON_ECN fragment id 0x0000 00:06:41:986761: ip4-lookup fib 0 dpo-idx 7 flow hash: 0x00000000 IPSEC_ESP: 192.168.2.6 -> 192.168.1.6 tos 0x00, ttl 62, length 152, checksum 0xf7d7 dscp CS0 ecn NON_ECN fragment id 0x0000 00:06:41:986763: ip4-local IPSEC_ESP: 192.168.2.6 -> 192.168.1.6 tos 0x00, ttl 62, length 152, checksum 0xf7d7 dscp CS0 ecn NON_ECN fragment id 0x0000 00:06:41:986765: ipsec4-tun-input IPSec: remote:192.168.2.6 spi:3336905041 (0xc6e52151) seq 26 sa 1 00:06:41:986767: esp4-decrypt-tun esp: crypto aes-cbc-256 integrity sha1-96 pkt-seq 26 sa-seq 26 sa-seq-hi 0 00:06:41:986784: ip4-input-no-checksum ICMP: 192.168.200.20 -> 192.168.100.20 tos 0x00, ttl 63, length 84, checksum 0xad06 dscp CS0 ecn NON_ECN fragment id 0xe128, flags DONT_FRAGMENT ICMP echo_request checksum 0xf8c9 00:06:41:986786: ip4-lookup fib 0 dpo-idx 5 flow hash: 0x00000000 ICMP: 192.168.200.20 -> 192.168.100.20 tos 0x00, ttl 63, length 84, checksum 0xad06 dscp CS0 ecn NON_ECN fragment id 0xe128, flags DONT_FRAGMENT ICMP echo_request checksum 0xf8c9 00:06:41:986787: ip4-rewrite tx_sw_if_index 3 dpo-idx 5 : ipv4 via 192.168.100.20 eth3: mtu:9000 next:5 fa163f96599efa163fecc23b0800 flow hash: 0x00000000 00000000: fa163f96599efa163fecc23b080045000054e12840003e01ae06c0a8c814c0a8 00000020: 64140800f8c94f49000450941e610000000078200a00000000001011 00:06:41:986789: eth3-output eth3 IP4: fa:16:3f:ec:c2:3b -> fa:16:3f:96:59:9e ICMP: 192.168.200.20 -> 192.168.100.20 tos 0x00, ttl 62, length 84, checksum 0xae06 dscp CS0 ecn NON_ECN fragment id 0xe128, flags DONT_FRAGMENT ICMP echo_request checksum 0xf8c9 00:06:41:986791: eth3-tx eth3 tx queue 0 buffer 0x9b861: current data 44, length 98, buffer-pool 0, ref-count 1, trace handle 0x3 ext-hdr-valid l4-cksum-computed l4-cksum-correct l2-hdr-offset 0 l3-hdr-offset 14 PKT MBUF: port 0, nb_segs 1, pkt_len 98 buf_len 2176, data_len 98, ol_flags 0x0, data_off 172, phys_addr 0x72ae18c0 packet_type 0x0 l2_len 0 l3_len 0 outer_l2_len 0 outer_l3_len 0 rss 0x0 fdir.hi 0x0 fdir.lo 0x0 IP4: fa:16:3f:ec:c2:3b -> fa:16:3f:96:59:9e ICMP: 192.168.200.20 -> 192.168.100.20 tos 0x00, ttl 62, length 84, checksum 0xae06 dscp CS0 ecn NON_ECN fragment id 0xe128, flags DONT_FRAGMENT ICMP echo_request checksum 0xf8c9 ------------------------------------- Ping from VPP1 to Host2 is success (Local network) vpp# ping 192.168.100.20 116 bytes from 192.168.100.20: icmp_seq=1 ttl=64 time=1.7838 ms 116 bytes from 192.168.100.20: icmp_seq=2 ttl=64 time=.4014 ms 116 bytes from 192.168.100.20: icmp_seq=3 ttl=64 time=.3792 ms 116 bytes from 192.168.100.20: icmp_seq=4 ttl=64 time=.4001 ms 116 bytes from 192.168.100.20: icmp_seq=5 ttl=64 time=.3915 ms vpp# show inter Name Idx State MTU (L3/IP4/IP6/MPLS) Counter Count eth1 1 up 9000/0/0/0 rx packets 154 rx bytes 20176 tx packets 56 tx bytes 5620 drops 70 ip4 133 ip6 1 eth2 2 up 9000/0/0/0 rx packets 1 rx bytes 42 tx packets 1 tx bytes 42 drops 1 eth3 3 up 9000/0/0/0 rx packets 18 rx bytes 1708 tx packets 82 tx bytes 7980 drops 2 ip4 14 ipip0 4 up 9000/0/0/0 rx packets 64 rx bytes 8448 ip4 64 local0 0 down 0/0/0/0
-=-=-=-=-=-=-=-=-=-=-=- Links: You receive all messages sent to this group. View/Reply Online (#19993): https://lists.fd.io/g/vpp-dev/message/19993 Mute This Topic: https://lists.fd.io/mt/84979398/21656 Group Owner: vpp-dev+ow...@lists.fd.io Unsubscribe: https://lists.fd.io/g/vpp-dev/unsub [arch...@mail-archive.com] -=-=-=-=-=-=-=-=-=-=-=-