Re: [vpp-dev] vlib_node_add_next usage #vpp

2019-10-02 Thread Ranadip Das
The session_register_transport() has the foreach code. 1381 /* *INDENT-OFF* */ 1382 if (output_node != ~0) 1383 { 1384 foreach_vlib_main ( https://docs.fd.io/vpp/19.08/db/d96/threads_8h.html#a26faa6aef056b1bbb12dc83ce874923c ) (({ 1385 next_index = vlib_node_add_next (

Re: [vpp-dev] vlib_node_add_next usage #vpp

2019-10-02 Thread Christian Hopps
> On Oct 2, 2019, at 6:48 PM, Ranadip Das wrote: > > Hello, > > I am seeing vlib_node_add_next is getting used in two different ways. > > vlib_node_add_next(vm, node_index, next_node_index); > > And > > foreach_vlib_main (({ > next_index = vlib_node_add_next (this_vlib_main,

[vpp-dev] vlib_node_add_next usage #vpp

2019-10-02 Thread Ranadip Das
Hello, I am seeing vlib_node_add_next is getting used in two different ways. vlib_node_add_next(vm, node_index, next_node_index); And foreach_vlib_main (({ next_index = vlib_node_add_next (this_vlib_main, node_index, next_node_index); })); The first one (without foreach_vlib_main) calls

Re: [vpp-dev] How to configure l2 gre over ipsec in vpp 19.08

2019-10-02 Thread John Lo (loj) via Lists.Fd.Io
To create GRE tunnel in L2 mode, you can add “teb” keyword in the create CLI which makes the GRE tunnel work in transparent ethernet bridging mode: vpp# create gre ? create gre tunnelcreate gre tunnel src dst [instance ] [outer-fib-id ] [teb | erspan ] [del] In

Re: [vpp-dev] How to configure l2 gre over ipsec in vpp 19.08

2019-10-02 Thread Chuan Han via Lists.Fd.Io
Gre is l3 in this case. Right? This limits the possible use cases. Is there any plan to support l2 gre over ipsec transport mode? It seems vpp 17 support s this feature. Not sure why it is dropped in 19. On Wed, Oct 2, 2019, 12:18 AM Neale Ranns (nranns) wrote: > > Hi Chuan, > > IPSec and GRE

Re: [vpp-dev] How to configure l2 gre over ipsec in vpp 19.08

2019-10-02 Thread Neale Ranns via Lists.Fd.Io
Hi Chuan, IPSec and GRE is supported using the tunnel protection mechanism : https://wiki.fd.io/view/VPP/IPSec GRE over IPSec is only support when the SA is in tunnel mode. This means there is a double encap of the IP header ; once by the SA (in tunnel mode) and once by the tunnel itself.