Hi Venu,

Before adding any IPSec state:

DBGvpp# ipsec select ?
  ipsec select backend                     ipsec select backend <ah|esp> 
<backend index>

/neale

From: vpp-dev@lists.fd.io <vpp-dev@lists.fd.io> on behalf of Venumadhav Josyula 
via lists.fd.io <vjosyula=gmail....@lists.fd.io>
Date: Tuesday, 17 August 2021 at 08:30
To: Sweetu Hubby <vjosy...@gmail.com>
Cc: vpp-dev <vpp-dev@lists.fd.io>
Subject: Re: [vpp-dev] using dpdk backend with vpp 20.09 using stable/2009
Hi Sergio,

Any help would be really appreciated.

Thanks,
Regards,
Venu

On Tue, 17 Aug 2021 at 11:21, Venumadhav Josyula via 
lists.fd.io<http://lists.fd.io> 
<vjosyula=gmail....@lists.fd.io<mailto:gmail....@lists.fd.io>> wrote:
Hi All,
Please note we have build vpp from stable/2009 branch, following is startup.conf
unix {
#  nodaemon
  log /var/log/vpp/vpp.log
  full-coredump
  cli-listen /run/vpp/cli.sock
  gid vpp
  exec /etc/vpp/setup.conf
}
api-trace {
  on
}
api-segment {
  gid vpp
}
socksvr {
  default
}
cpu {
  main-core 18
  corelist-workers 20,22
  no-multi-seg
}
dpdk {
  dev default {
     num-rx-desc 4096
     num-tx-desc 4096
  }

  dev 0000:87:10.0 { ## Port handled by vfio-pci driver in host
    name eth0
  }
  dev 0000:87:10.1 { ## Port handled by vfio-pci driver in host
    name eth1
  }
  socket-mem 1024,1024
  vdev crypto_aesni_mb0
  vdev crypto_aesni_mb1

}

Commands used to ipsec tunnel
vpp
-----------
ipsec sa add 10 spi 1001 esp crypto-alg aes-cbc-256 crypto-key 
4a506a794f574265564551694d6537684a506a794f574265564551694d653768 integ-alg 
sha-256-128 integ-key 
2b7e151628aed2a6abf7158809cf4f3d2b7e151628aed2a6abf7158809cf4f3d tunnel-src 
172.17.4.246 tunnel-dst 172.17.4.251
ipsec sa add 11 spi 1002 esp crypto-alg aes-cbc-256 crypto-key 
4a506a794f574265564551694d6537684a506a794f574265564551694d653768 integ-alg 
sha-256-128 integ-key 
2b7e151628aed2a6abf7158809cf4f3d2b7e151628aed2a6abf7158809cf4f3d tunnel-src 
172.17.4.251 tunnel-dst 172.17.4.246
ipsec spd add 1
set interface ipsec spd eth0 1
ipsec policy add spd 1 priority 10 outbound action protect sa 10 local-ip-range 
172.17.4.246 - 172.17.4.246 remote-ip-range 172.17.4.251 - 172.17.4.251
ipsec policy add spd 1 priority 10 inbound action protect sa 11 local-ip-range 
172.17.4.246 - 172.17.4.246 remote-ip-range 172.17.4.251 - 172.17.4.251

ipsec policy add spd 1 priority 100 inbound action bypass protocol 50
ipsec policy add spd 1 priority 100 outbound action bypass protocol 50


Following output

vpp# show ipsec backends
IPsec AH backends available:
           Name                     Index             Active
  crypto engine backend               0                 yes
IPsec ESP backends available:
           Name                     Index             Active
  crypto engine backend               0                 yes
       dpdk backend                   1                 no
vpp#
vpp# show version
vpp v20.09.0-65~gdbaff84 built by root on 9315b7360381 at 2021-08-05T08:20:42
vpp# show dp
dpdk  dpo
vpp# show dpdk version
DPDK Version:             DPDK 20.08.0
DPDK EAL init args:       -c 540000 -n 4 --in-memory --vdev crypto_aesni_mb0 
--vdev crypto_aesni_mb1 --file-prefix vpp -w 0000:87:10.0 -w 0000:87:10.1 
--master-lcore 18
vpp#

How do we make it use dpdk backend ?

Thanks,
Regards,
Venu



-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#19974): https://lists.fd.io/g/vpp-dev/message/19974
Mute This Topic: https://lists.fd.io/mt/84941801/21656
Group Owner: vpp-dev+ow...@lists.fd.io
Unsubscribe: https://lists.fd.io/g/vpp-dev/unsub [arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to