Hi Satish, if can you share the output of those commands on VPP2:
 - 'show err'
 - 'sh hard'
 - 'sh log'
 - a packet trace ('cle tr' then 'sh tr')

Best
ben

> -----Original Message-----
> From: satish amara <satishkam...@gmail.com>
> Sent: mardi 17 août 2021 19:33
> To: vpp-dev@lists.fd.io
> Cc: Damjan Marion (damarion) <damar...@cisco.com>; nra...@cisco.com; Filip
> Tehlar -X (ftehlar - PANTHEON TECH SRO at Cisco) <fteh...@cisco.com>;
> Benoit Ganne (bganne) <bga...@cisco.com>
> Subject: [SUSPECTED SPAM] VPP IPSEC traffic is not passing thru when DPDK
> is enabled.
> 
> Hi,
> 
>   There is an issue when the DPDK is owning the LAN  interface for IPSEC
> traffic. I have a network setup of 2 VPP routers connected by the IPSEC
> tunnel on WAN interface and have LAN interface for sending out traffic and
> VPP is acting as IPSEC gateway..  The issue I am seeing traffic encrypted
> by IPSEC policy is traversing from VPP1 to VPP2 but after decryption, the
> packet is sent out on eth3 interface on VPP2 and it's staying there. The
> counters for eth3 interface are updated but DPDK driver is not sending out
> the packet on eth3 interface. DPDK is enabled on the eth1 and eth3
> interfaces.  Instead of DPDK owning eth3 interface If  I use mem_if or
> veth (ip link) for LAN interface, it works well with no issues.
> 
> I am using following  DPDK driver for eth3 interface
>  ./dpdk-devbind.py  --bind=uio_pci_generic
> 
> Here is VPP config
> 
> eth1 is WAN interface and eth3 is LAN interface.
> IPSEC setup at VPP1
> 
> set int state  eth1 up
> set int ip address eth1 192.168.1.6/24 <http://192.168.1.6/24>
> ip route add 192.168.2.0/24 <http://192.168.2.0/24>  via 192.168.1.1
> ikev2 profile add pr1
> ikev2 profile set pr1 auth shared-key-mic string *****
> ikev2 profile set pr1 id local ip4-addr 192.168.1.6
> ikev2 profile set pr1 id remote ip4-addr  192.168.2.6
> ikev2 profile set pr1 traffic-selector local ip-range 192.168.100.20 -
> 192.168.100.21  port-range 0 - 65535 protocol 0
> ikev2 profile set pr1 traffic-selector remote ip-range 192.168.200.20 -
> 192.168.200.21 port-range 0 - 65535 protocol 0
> ikev2 profile set pr1 responder eth1 192.168.2.6
> ikev2 profile set pr1 ike-crypto-alg aes-cbc 256  ike-integ-alg sha1-96
> ike-dh modp-2048
> ikev2 profile set pr1 esp-crypto-alg aes-cbc 256  esp-integ-alg sha1-96
> esp-dh ecp-256
> ikev2 profile set pr1 sa-lifetime 3600 10 5 0
> set int state eth3 up
> set int ip address eth3 192.168.100.5/24 <http://192.168.100.5/24>
> 
> 
> IPSEC setup at VPP2
> 
> set int state  eth1 up
> set int ip address eth1 192.168.2.6/24 <http://192.168.2.6/24>
> ip route add 192.168.1.0/24 <http://192.168.1.0/24>  via 192.168.2.1
> ikev2 profile add pr1
> ikev2 profile set pr1 auth shared-key-mic string *****
> ikev2 profile set pr1 id local ip4-addr 192.168.2.6
> ikev2 profile set pr1 id remote ip4-addr 192.168.1.6
> ikev2 profile set pr1 traffic-selector remote ip-range 192.168.100.20 -
> 192.168.100.21 port-range 0 - 65535 protocol 0
> ikev2 profile set pr1 traffic-selector local ip-range 192.168.200.20 -
> 192.168.200.21 port-range 0 - 65535 protocol 0
> 
> set int state eth3 up
> set int ip address eth3 192.168.200.5/24 <http://192.168.200.5/24>
> 
> 
> Traffic from 192.168.100.20 <->192.168.200.20 is encrypted.
> 
> The issue I am seeing is on following VPP image
> vpp# show ver
> vpp v20.09-release built by root on caba6892cb91 at 2020-10-01T03:09:45
> 
> Want to know if others are seeing this issue and how to address this. This
> is common use case setup for IPSEC setup.
> 
> Regards,
> Satish K Amaara
> 
> 
> 
> 
> 
> 

-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#19980): https://lists.fd.io/g/vpp-dev/message/19980
Mute This Topic: https://lists.fd.io/mt/84967528/21656
Group Owner: vpp-dev+ow...@lists.fd.io
Unsubscribe: https://lists.fd.io/g/vpp-dev/unsub [arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to