Hi Everyone,
I Configured openvswitch(type=ipsec_gre) in both the end devices, in
between both the end devices we have NAT device. Not able to establish the
tunnel in between both the end devices. Also attached file, where the
topology and openvswitch flows are listed out.
Do we have NAT-T support in openvswitch ?
Can any one help me on this ?
Thanks,
Venkata Santhosh
Topology:
=========
HostA (12.12.12.12 - br0) ------ (12.12.12.1) NAT-Device (13.13.13.1) --------
HostB(13.13.13.13 - br0)
ovs_version: "2.0.0"
I tried to configure type=ipsec_gre using openvswitch in HostA(remote_ip =
13.13.13.13) and HostB(remote_ip = 13.13.13.1).Also created br1 in both the
hosts(HostA - br1- 11.11.11.11 and HostB - br1 - 11.11.11.12).
After initiating the ping request from HostA(11.11.11.11 to 11.11.11.12), able
to see that phase 1 is successfully completed, but struck after sending first
packet in Quick Mode(Not getting any reply from HostB for Quick Mode first
Packet).
Then i initiated ping from HostB to HostA, then Quick mode is completed, but
not able to ping because the packets are being dropped in both the hosts
because of following flows.
Host A:
======
#ovs-vsctl show
0a6afd01-a849-4c7a-a9c6-238fbddcfe2a
Bridge "br1"
Port "vxlan0"
Interface "vxlan0"
type: ipsec_gre
options: {psk=password, remote_ip="13.13.13.13"}
Port "br1"
Interface "br1"
type: internal
Bridge "br0"
Port "br0"
Interface "br0"
type: internal
Port "eth0"
Interface "eth0"
# ovs-appctl dpif/show
system@ovs-system: hit:2416 missed:470
flows: cur: 4, avg: 1, max: 9, life span: 114139ms
overall avg: add rate: 14.833/min, del rate: 14.733/min
br0: hit:1959 missed:459
br0 65534/1: (internal)
eth0 1/3: (system)
br1: hit:457 missed:11
br1 65534/2: (internal)
vxlan 3/4: (ipsec_gre: remote_ip=13.13.13.13)
# ovs-dpctl dump-flows
skb_priority(0),in_port(3),eth(src=00:08:a1:45:d6:27,dst=14:18:77:c2:8a:50),eth_type(0x0800),ipv4(src=13.13.13.1/0.0.0.0,dst=12.12.12.12/0.0.0.0,proto=1/0,tos=0xc0/0,ttl=64/0,frag=no/0xff),
packets:297, bytes:35328, used:0.312s, actions:1
skb_priority(0),in_port(3),eth(src=00:08:a1:45:d6:27,dst=01:00:5e:00:00:05),eth_type(0x0800),ipv4(src=12.12.12.1/0.0.0.0,dst=224.0.0.5/0.0.0.0,proto=89/0,tos=0xc0/0,ttl=1/0,frag=no/0xff),
packets:0, bytes:0, used:never, actions:1
key20(bad key length 4, expected -1)(00 00 00 00/(bad mask length 4, expected
-1)(ff ff ff ff),key19(bad key length 4, expected -1)(00 00 00 00/(bad mask
length 4, expected -1)(ff ff ff
ff),skb_priority(0),tunnel(tun_id=0/0,src=13.13.13.13/255.255.255.255,dst=12.12.12.12/255.255.255.255,tos=0/0xff,ttl=63/0xff,flags()),in_port(4),skb_mark(0),eth(src=f2:09:c7:6e:47:45,dst=ff:ff:ff:ff:ff:ff),eth_type(0x0806),arp(sip=11.11.11.12/255.255.255.255,tip=11.11.11.11/255.255.255.255,op=1/0xff,sha=f2:09:c7:6e:47:45/ff:ff:ff:ff:ff:ff,tha=00:00:00:00:00:00/ff:ff:ff:ff:ff:ff),
packets:0, bytes:0, used:never, actions:drop
HostB :
=======
#ovs-vsctl show
0a6afd01-a849-4c7a-a9c6-238fbddcfe2a
Bridge "br1"
Port "vxlan0"
Interface "vxlan0"
type: ipsec_gre
options: {psk=password, remote_ip="13.13.13.1"}
Port "br1"
Interface "br1"
type: internal
Bridge "br0"
Port "br0"
Interface "br0"
type: internal
Port "eth1"
Interface "eth1"
ovs_version: "2.0.0"
# ovs-appctl dpif/show
system@ovs-system: hit:2670 missed:610
flows: cur: 4, avg: 4, max: 9, life span: 38571ms
overall avg: add rate: 15.921/min, del rate: 15.763/min
br0: hit:2077 missed:601
br0 65534/1: (internal)
eth1 1/2: (system)
br1: hit:593 missed:9
br1 65534/4: (internal)
vxlan0 3/3: (ipsec_gre: remote_ip=13.13.13.1)
# ovs-dpctl dump-flows
skb_priority(0),in_port(2),eth(src=00:1d:09:10:94:30,dst=ff:ff:ff:ff:ff:ff),eth_type(0x0806),arp(sip=13.13.13.1/255.255.255.255,tip=8.8.8.8/255.255.255.255,op=1/0xff,sha=00:1d:09:10:94:30/00:00:00:00:00:00,tha=00:00:00:00:00:00/00:00:00:00:00:00),
packets:36, bytes:2160, used:0.364s, actions:1
skb_priority(0),in_port(2),eth(src=00:1d:09:10:94:30,dst=08:00:27:fa:39:0d),eth_type(0x0800),ipv4(src=13.13.13.1/0.0.0.0,dst=13.13.13.13/0.0.0.0,proto=17/0,tos=0/0,ttl=63/0,frag=no/0xff),
packets:4, bytes:504, used:0.300s, actions:1
skb_priority(0),in_port(2),eth(src=00:1d:09:10:94:30,dst=ff:ff:ff:ff:ff:ff),eth_type(0x0806),arp(sip=13.13.13.1/255.255.255.255,tip=172.20.101.1/255.255.255.255,op=1/0xff,sha=00:1d:09:10:94:30/00:00:00:00:00:00,tha=00:00:00:00:00:00/00:00:00:00:00:00),
packets:36, bytes:2160, used:0.364s, actions:1
skb_priority(0),in_port(2),eth(src=00:1d:09:10:94:30,dst=01:00:5e:00:00:05),eth_type(0x0800),ipv4(src=13.13.13.1/0.0.0.0,dst=224.0.0.5/0.0.0.0,proto=89/0,tos=0xc0/0,ttl=1/0,frag=no/0xff),
packets:0, bytes:0, used:never, actions:1
skb_priority(0),tunnel(tun_id=0/0,src=13.13.13.1/255.255.255.255,dst=13.13.13.13/255.255.255.255,tos=0/0xff,ttl=63/0xff,flags()),in_port(3),skb_mark(0),eth(src=4a:8a:03:ee:63:49,dst=ff:ff:ff:ff:ff:ff),eth_type(0x0806),arp(sip=11.11.11.11/255.255.255.255,tip=11.11.11.12/255.255.255.255,op=1/0xff,sha=4a:8a:03:ee:63:49/ff:ff:ff:ff:ff:ff,tha=00:00:00:00:00:00/ff:ff:ff:ff:ff:ff),
packets:0, bytes:0, used:never, actions:drop
_______________________________________________
dev mailing list
[email protected]
https://mail.openvswitch.org/mailman/listinfo/ovs-dev