[dpdk-users] IPSEC-SECGW sample application
Avi Cohen (A)
avi.cohen at huawei.com
Mon Jan 8 12:47:11 CET 2018
Hi Sandesh
Thank you - I already understood that.
I see in the documentation that this app. Supports only **complete offload**. But Intel NICS x540 and 82599 which supports ipsec offload requires that the SW will add/remove the ESP headers
How can I run this app with x540 nic ?
Best Regards
Avi
> -----Original Message-----
> From: Gowda, Sandesh [mailto:sandesh.gowda at intel.com]
> Sent: Monday, 08 January, 2018 10:47 AM
> To: Avi Cohen (A); users at dpdk.org
> Subject: RE: IPSEC-SECGW sample application
>
>
> Hi Avi,
>
> The application classifies the ports as Protected and Unprotected. Thus, traffic
> received on an Unprotected or Protected port is consider Inbound or Outbound
> respectively.
> ( Refer : http://dpdk.org/doc/guides/sample_app_ug/ipsec_secgw.html )
>
> The Packets sent on a Unprotected network requires Encryption whereas
> packets on Protected Network can be plain text.
> This is the expected behavior.
>
> Regards,
> Sandesh
>
>
>
>
> -----Original Message-----
> From: users [mailto:users-bounces at dpdk.org] On Behalf Of Avi Cohen (A)
> Sent: Sunday, January 07, 2018 9:12 PM
> To: users at dpdk.org
> Subject: [dpdk-users] IPSEC-SECGW sample application
>
>
> Hello
> I'm using the DPDK17.11 and running the sample app. Ipsec_secgw.
> I have 2 ports port 0 is protected and port 1 is unprotected Traffic is received in
> the unprotected and should be sent to the protected port for encryption But
> the traffic processing for the traffic received in the unprotected port is going
> through the **process_pkts_inbound ** .
> I expect that the traffic should be directed to the **process_pkts_outbound**
> [where ESP headers are added etc.] Can someone help ?
>
>
> This is the config file:
>
> #SP rules
> sp ipv4 in esp protect 5 src 1.1.1.2/32 dst 1.1.2.10/32 #SA rules sa in 5
> cipher_algo aes-128-cbc cipher_key 0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0 \ auth_algo
> sha1-hmac auth_key 0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0 \ mode ipv4-tunnel
> src 172.16.1.5 dst 172.16.2.5 \ type inline-protocol-offload port_id 0 #Routing
> rules rt ipv4 dst 172.16.2.5/32 port 0 rt ipv4 dst 1.1.2.0/24 port 0 rt ipv4 dst
> 1.1.1.0/24 port 0
>
>
> and this is the command line to run the applic:
>
> ./ipsec-secgw -l 1 -n 2 -- -p 0x3 -P -u 0x2 --config="(0,0,1),(1,0,1)" -f ../ep1.cfg
>
>
> Best Regards
> Avi
More information about the users
mailing list