Hi,
  There is an issue when the DPDK is owning the LAN  interface for IPSEC
traffic. I have a network setup of 2 VPP routers connected by the IPSEC
tunnel on WAN interface and have LAN interface for sending out traffic and
VPP is acting as IPSEC gateway..  The issue I am seeing traffic encrypted
by IPSEC policy is traversing from VPP1 to VPP2 but after decryption, the
packet is sent out on eth3 interface on VPP2 and it's staying there. The
counters for eth3 interface are updated but DPDK driver is not sending out
the packet on eth3 interface. DPDK is enabled on the eth1 and eth3
interfaces.  Instead of DPDK owning eth3 interface If  I use mem_if or veth
(ip link) for LAN interface, it works well with no issues.

I am using following  DPDK driver for eth3 interface
 ./dpdk-devbind.py  --bind=uio_pci_generic

Here is VPP config

eth1 is WAN interface and eth3 is LAN interface.
IPSEC setup at VPP1

set int state  eth1 up
set int ip address eth1 192.168.1.6/24
ip route add 192.168.2.0/24 via 192.168.1.1
ikev2 profile add pr1
ikev2 profile set pr1 auth shared-key-mic string *****
ikev2 profile set pr1 id local ip4-addr 192.168.1.6
ikev2 profile set pr1 id remote ip4-addr  192.168.2.6
ikev2 profile set pr1 traffic-selector local ip-range 192.168.100.20 -
192.168.100.21  port-range 0 - 65535 protocol 0
ikev2 profile set pr1 traffic-selector remote ip-range 192.168.200.20 -
192.168.200.21 port-range 0 - 65535 protocol 0
ikev2 profile set pr1 responder eth1 192.168.2.6
ikev2 profile set pr1 ike-crypto-alg aes-cbc 256  ike-integ-alg sha1-96
 ike-dh modp-2048
ikev2 profile set pr1 esp-crypto-alg aes-cbc 256  esp-integ-alg sha1-96
 esp-dh ecp-256
ikev2 profile set pr1 sa-lifetime 3600 10 5 0
set int state eth3 up
set int ip address eth3 192.168.100.5/24


IPSEC setup at VPP2

set int state  eth1 up
set int ip address eth1 192.168.2.6/24
ip route add 192.168.1.0/24 via 192.168.2.1
ikev2 profile add pr1
ikev2 profile set pr1 auth shared-key-mic string *****
ikev2 profile set pr1 id local ip4-addr 192.168.2.6
ikev2 profile set pr1 id remote ip4-addr 192.168.1.6
ikev2 profile set pr1 traffic-selector remote ip-range 192.168.100.20 -
192.168.100.21 port-range 0 - 65535 protocol 0
ikev2 profile set pr1 traffic-selector local ip-range 192.168.200.20 -
192.168.200.21 port-range 0 - 65535 protocol 0

set int state eth3 up
set int ip address eth3 192.168.200.5/24


Traffic from 192.168.100.20 <->192.168.200.20 is encrypted.

The issue I am seeing is on following VPP image
vpp# show ver
vpp v20.09-release built by root on caba6892cb91 at 2020-10-01T03:09:45

Want to know if others are seeing this issue and how to address this. This
is common use case setup for IPSEC setup.

Regards,
Satish K Amaara
-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#19978): https://lists.fd.io/g/vpp-dev/message/19978
Mute This Topic: https://lists.fd.io/mt/84953426/21656
Group Owner: vpp-dev+ow...@lists.fd.io
Unsubscribe: https://lists.fd.io/g/vpp-dev/unsub [arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to