3n-dnv-x553

10ge2p1x553-ethip4ipsec1000tnlsw-ip4base-int-aes128cbc-hmac512sha-ndrpdr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular opology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG verification: TG finds and reports throughput NDR (Non Drop Rate) with zero packet loss tolerance and throughput PDR (Partial Drop Rate) with non-zero packet loss tolerance (LT) expressed in percentage of packets transmitted. NDR and PDR are discovered for different Ethernet L2 frame sizes using MLRsearch library.

Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to umber of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG ode interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 64b-1t1c-ethip4ipsec1000tnlsw-ip4base- 
int-aes128cbc-hmac512sha-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 64b-4t4c-ethip4ipsec1000tnlsw-ip4base- 
int-aes128cbc-hmac512sha-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-1t1c-ethip4ipsec1000tnlsw-ip4base- 
int-aes128cbc-hmac512sha-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-2t2c-ethip4ipsec1000tnlsw-ip4base- 
int-aes128cbc-hmac512sha-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-4t4c-ethip4ipsec1000tnlsw-ip4base- 
int-aes128cbc-hmac512sha-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

10ge2p1x553-ethip4ipsec1000tnlsw-ip4base-int-aes128gcm-ndrpdr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular opology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG verification: TG finds and reports throughput NDR (Non Drop Rate) with zero packet loss tolerance and throughput PDR (Partial Drop Rate) with non-zero packet loss tolerance (LT) expressed in percentage of packets transmitted. NDR and PDR are discovered for different Ethernet L2 frame sizes using MLRsearch library.

Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to umber of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG ode interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 64b-1t1c-ethip4ipsec1000tnlsw- 
ip4base-int-aes128gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 64b-2t2c-ethip4ipsec1000tnlsw- 
ip4base-int-aes128gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 64b-4t4c-ethip4ipsec1000tnlsw- 
ip4base-int-aes128gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-1t1c-ethip4ipsec1000tnlsw- 
ip4base-int-aes128gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-2t2c-ethip4ipsec1000tnlsw- 
ip4base-int-aes128gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-1t1c-ethip4ipsec1000tnlsw- 
ip4base-int-aes128gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-2t2c-ethip4ipsec1000tnlsw- 
ip4base-int-aes128gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-4t4c-ethip4ipsec1000tnlsw- 
ip4base-int-aes128gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

10ge2p1x553-ethip4ipsec1000tnlsw-ip4base-int-aes256gcm-ndrpdr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular opology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG verification: TG finds and reports throughput NDR (Non Drop Rate) with zero packet loss tolerance and throughput PDR (Partial Drop Rate) with non-zero packet loss tolerance (LT) expressed in percentage of packets transmitted. NDR and PDR are discovered for different Ethernet L2 frame sizes using MLRsearch library.

Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to umber of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG ode interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 64b-1t1c-ethip4ipsec1000tnlsw- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 64b-2t2c-ethip4ipsec1000tnlsw- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 64b-4t4c-ethip4ipsec1000tnlsw- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-1t1c-ethip4ipsec1000tnlsw- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-2t2c-ethip4ipsec1000tnlsw- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-1t1c-ethip4ipsec1000tnlsw- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-2t2c-ethip4ipsec1000tnlsw- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-4t4c-ethip4ipsec1000tnlsw- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

10ge2p1x553-ethip4ipsec1000tnlsw-ip4base-policy-aes256gcm-ndrpdr

IPv4 IPsec tunnel mode performance test suite.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular opology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG verification: TG finds and reports throughput NDR (Non Drop Rate) with zero packet loss tolerance and throughput PDR (Partial Drop Rate) with non-zero packet loss tolerance (LT) expressed in percentage of packets transmitted. NDR and PDR are discovered for different Ethernet L2 frame sizes using MLRsearch library.

Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to umber of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG ode interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

10ge2p1x553-ethip4ipsec1tnlsw-ip4base-int-aes128cbc-hmac512sha-ndrpdr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular opology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG verification: TG finds and reports throughput NDR (Non Drop Rate) with zero packet loss tolerance and throughput PDR (Partial Drop Rate) with non-zero packet loss tolerance (LT) expressed in percentage of packets transmitted. NDR and PDR are discovered for different Ethernet L2 frame sizes using MLRsearch library.

Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to umber of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG ode interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 64b-1t1c-ethip4ipsec1tnlsw-ip4base- 
int-aes128cbc-hmac512sha-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’pQXaRDIpdMlfOSrz’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’rwjJUATFLzFAjIRnmQFRroIRjhGesfwELpzFmQzOpOryyeDjxpBAQEpnwGVjWQyC’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’pQXaRDIpdMlfOSrz’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’rwjJUATFLzFAjIRnmQFRroIRjhGesfwELpzFmQzOpOryyeDjxpBAQEpnwGVjWQyC’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_flags(sw_if_index=3,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 64b-2t2c-ethip4ipsec1tnlsw-ip4base- 
int-aes128cbc-hmac512sha-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’kUosiqNNMIItEANq’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’nXkJLyOfXcERxcdLWWHhzXjpcsYnuqSrOMGzcWNSMExJTpSOogTKNJAykgxfwKKj’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’kUosiqNNMIItEANq’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’nXkJLyOfXcERxcdLWWHhzXjpcsYnuqSrOMGzcWNSMExJTpSOogTKNJAykgxfwKKj’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_flags(sw_if_index=3,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-1t1c-ethip4ipsec1tnlsw-ip4base- 
int-aes128cbc-hmac512sha-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’HUWIfpefmNFynsxa’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’YASySdYTCeoXRrYYeiAycbxCStNcdmgYaKwszDyDniWffAyuJicLQRSHBenCbEuf’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’HUWIfpefmNFynsxa’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’YASySdYTCeoXRrYYeiAycbxCStNcdmgYaKwszDyDniWffAyuJicLQRSHBenCbEuf’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_flags(sw_if_index=3,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-2t2c-ethip4ipsec1tnlsw-ip4base- 
int-aes128cbc-hmac512sha-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’sSLFejyWVhMjdGyt’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’mtBMyBcvHvKgrzZiSRneIlriwSlMJppcJDMKwigbwpEOJELoNTPAWtpVtbxjeVQp’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’sSLFejyWVhMjdGyt’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’mtBMyBcvHvKgrzZiSRneIlriwSlMJppcJDMKwigbwpEOJELoNTPAWtpVtbxjeVQp’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_flags(sw_if_index=3,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-1t1c-ethip4ipsec1tnlsw-ip4base- 
int-aes128cbc-hmac512sha-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’tszIMSihxymUcnyt’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’pjmpispyoKsoobiQhnNsXFIqhyoJPqboEAMCSqnweRVdhkwLluKEKcncQLhZAOoJ’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’tszIMSihxymUcnyt’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’pjmpispyoKsoobiQhnNsXFIqhyoJPqboEAMCSqnweRVdhkwLluKEKcncQLhZAOoJ’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_flags(sw_if_index=3,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-2t2c-ethip4ipsec1tnlsw-ip4base- 
int-aes128cbc-hmac512sha-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’LVredbPKxsphUfAB’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’IDgxfjNTUDMspQPDsXLpNMeiihXSJetzyARBXvMxVDWXqOHGrWxpQdUoexXhNdWh’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’LVredbPKxsphUfAB’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’IDgxfjNTUDMspQPDsXLpNMeiihXSJetzyARBXvMxVDWXqOHGrWxpQdUoexXhNdWh’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_flags(sw_if_index=3,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

10ge2p1x553-ethip4ipsec1tnlsw-ip4base-int-aes128gcm-ndrpdr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular opology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG verification: TG finds and reports throughput NDR (Non Drop Rate) with zero packet loss tolerance and throughput PDR (Partial Drop Rate) with non-zero packet loss tolerance (LT) expressed in percentage of packets transmitted. NDR and PDR are discovered for different Ethernet L2 frame sizes using MLRsearch library.

Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to umber of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG ode interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 64b-2t2c-ethip4ipsec1tnlsw- 
ip4base-int-aes128gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’BnDWyLFLpFbGllUA’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’BnDWyLFLpFbGllUA’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_flags(sw_if_index=3,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-2t2c-ethip4ipsec1tnlsw- 
ip4base-int-aes128gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’ixJzBzfEKySYdzCY’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’ixJzBzfEKySYdzCY’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_flags(sw_if_index=3,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-1t1c-ethip4ipsec1tnlsw- 
ip4base-int-aes128gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’gLfqsDchszbcDQBc’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’gLfqsDchszbcDQBc’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_flags(sw_if_index=3,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-2t2c-ethip4ipsec1tnlsw- 
ip4base-int-aes128gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’eVhoaFMfRswVfeWe’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’eVhoaFMfRswVfeWe’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_flags(sw_if_index=3,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-4t4c-ethip4ipsec1tnlsw- 
ip4base-int-aes128gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’zgKwSiYxQNgrEEiM’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’zgKwSiYxQNgrEEiM’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_flags(sw_if_index=3,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

10ge2p1x553-ethip4ipsec1tnlsw-ip4base-int-aes256gcm-ndrpdr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular opology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG verification: TG finds and reports throughput NDR (Non Drop Rate) with zero packet loss tolerance and throughput PDR (Partial Drop Rate) with non-zero packet loss tolerance (LT) expressed in percentage of packets transmitted. NDR and PDR are discovered for different Ethernet L2 frame sizes using MLRsearch library.

Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to umber of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG ode interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 64b-2t2c-ethip4ipsec1tnlsw- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’xiLlFZrLNusvShlnGvpXVqNfublwUteX’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’xiLlFZrLNusvShlnGvpXVqNfublwUteX’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_flags(sw_if_index=3,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 64b-4t4c-ethip4ipsec1tnlsw- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’OVnYdGRKGYdoQODTSlEXNPqGtpinucqv’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’OVnYdGRKGYdoQODTSlEXNPqGtpinucqv’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_flags(sw_if_index=3,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-1t1c-ethip4ipsec1tnlsw- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’RMZgJFptMxGVASsmgKpkJSNMMJBfvAoS’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’RMZgJFptMxGVASsmgKpkJSNMMJBfvAoS’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_flags(sw_if_index=3,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-2t2c-ethip4ipsec1tnlsw- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’hTLDhrKLhezKnFROfyKEMCzeMLPMVXvn’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’hTLDhrKLhezKnFROfyKEMCzeMLPMVXvn’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_flags(sw_if_index=3,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-1t1c-ethip4ipsec1tnlsw- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’BOrVSqfCaYcTZSyJbgngIbNQrBLBpxPN’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’BOrVSqfCaYcTZSyJbgngIbNQrBLBpxPN’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_flags(sw_if_index=3,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-2t2c-ethip4ipsec1tnlsw- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’gLhPmCFmGeBWUbEbhlDvLIinlwXUfbBV’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’gLhPmCFmGeBWUbEbhlDvLIinlwXUfbBV’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_flags(sw_if_index=3,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-4t4c-ethip4ipsec1tnlsw- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’relZiKfjIIEsKDvQQhPuMwTZXobGdzLt’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’relZiKfjIIEsKDvQQhPuMwTZXobGdzLt’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_flags(sw_if_index=3,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

10ge2p1x553-ethip4ipsec1tnlsw-ip4base-policy-aes256gcm-ndrpdr

IPv4 IPsec tunnel mode performance test suite.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular opology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG verification: TG finds and reports throughput NDR (Non Drop Rate) with zero packet loss tolerance and throughput PDR (Partial Drop Rate) with non-zero packet loss tolerance (LT) expressed in percentage of packets transmitted. NDR and PDR are discovered for different Ethernet L2 frame sizes using MLRsearch library.

Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to umber of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG ode interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 64b-1t1c-ethip4ipsec1tnlsw- 
ip4base-policy-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’dx00x00x01’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’dx00x00x01’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘ac:1f:6b:57:56:c6’, ‘ip_address’: IPv4Address(‘100.0.0.1’)})
ipsec_spd_add_del(is_add=True,spd_id=1)
ipsec_interface_add_del_spd(is_add=True,sw_if_index=1,spd_id=1)
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 100, ‘is_outbound’: True, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 50, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’dxffxffxff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8xffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 100, ‘is_outbound’: False, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 50, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8xffxffxff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’dxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 300000, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’BtWmUNnHtGMgvviQxjgkEGWzVbhLCDfq’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: 0}, ‘flags’: 4, ‘tunnel’: {‘src’: ‘100.0.0.1’, ‘dst’: ‘200.0.0.102’, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘protocol’: 50, ‘udp_src_port’: 4500, ‘udp_dst_port’: 4500})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 10, ‘is_outbound’: False, ‘sa_id’: 100000, ‘policy’: 3, ‘protocol’: 0, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x00x00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xffxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 200000, ‘spi’: 400000, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’BtWmUNnHtGMgvviQxjgkEGWzVbhLCDfq’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: 0}, ‘flags’: 4, ‘tunnel’: {‘src’: ‘200.0.0.102’, ‘dst’: ‘100.0.0.1’, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘protocol’: 50, ‘udp_src_port’: 4500, ‘udp_dst_port’: 4500})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 10, ‘is_outbound’: True, ‘sa_id’: 200000, ‘policy’: 3, ‘protocol’: 0, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x00x00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xffxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})

 64b-2t2c-ethip4ipsec1tnlsw- 
ip4base-policy-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’dx00x00x01’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’dx00x00x01’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘ac:1f:6b:57:56:c6’, ‘ip_address’: IPv4Address(‘100.0.0.1’)})
ipsec_spd_add_del(is_add=True,spd_id=1)
ipsec_interface_add_del_spd(is_add=True,sw_if_index=1,spd_id=1)
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 100, ‘is_outbound’: True, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 50, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’dxffxffxff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8xffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 100, ‘is_outbound’: False, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 50, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8xffxffxff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’dxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 300000, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’ecCTuvHcOxoAqJrfzuSNUNbRZivCMPQq’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: 0}, ‘flags’: 4, ‘tunnel’: {‘src’: ‘100.0.0.1’, ‘dst’: ‘200.0.0.102’, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘protocol’: 50, ‘udp_src_port’: 4500, ‘udp_dst_port’: 4500})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 10, ‘is_outbound’: False, ‘sa_id’: 100000, ‘policy’: 3, ‘protocol’: 0, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x00x00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xffxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 200000, ‘spi’: 400000, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’ecCTuvHcOxoAqJrfzuSNUNbRZivCMPQq’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: 0}, ‘flags’: 4, ‘tunnel’: {‘src’: ‘200.0.0.102’, ‘dst’: ‘100.0.0.1’, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘protocol’: 50, ‘udp_src_port’: 4500, ‘udp_dst_port’: 4500})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 10, ‘is_outbound’: True, ‘sa_id’: 200000, ‘policy’: 3, ‘protocol’: 0, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x00x00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xffxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})

 1518b-1t1c-ethip4ipsec1tnlsw- 
ip4base-policy-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’dx00x00x01’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’dx00x00x01’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘ac:1f:6b:57:56:c6’, ‘ip_address’: IPv4Address(‘100.0.0.1’)})
ipsec_spd_add_del(is_add=True,spd_id=1)
ipsec_interface_add_del_spd(is_add=True,sw_if_index=1,spd_id=1)
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 100, ‘is_outbound’: True, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 50, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’dxffxffxff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8xffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 100, ‘is_outbound’: False, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 50, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8xffxffxff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’dxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 300000, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’aXhhHPdxQpbpiXXsvFFdqYDkCZhKnhBU’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: 0}, ‘flags’: 4, ‘tunnel’: {‘src’: ‘100.0.0.1’, ‘dst’: ‘200.0.0.102’, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘protocol’: 50, ‘udp_src_port’: 4500, ‘udp_dst_port’: 4500})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 10, ‘is_outbound’: False, ‘sa_id’: 100000, ‘policy’: 3, ‘protocol’: 0, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x00x00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xffxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 200000, ‘spi’: 400000, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’aXhhHPdxQpbpiXXsvFFdqYDkCZhKnhBU’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: 0}, ‘flags’: 4, ‘tunnel’: {‘src’: ‘200.0.0.102’, ‘dst’: ‘100.0.0.1’, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘protocol’: 50, ‘udp_src_port’: 4500, ‘udp_dst_port’: 4500})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 10, ‘is_outbound’: True, ‘sa_id’: 200000, ‘policy’: 3, ‘protocol’: 0, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x00x00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xffxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})

 1518b-2t2c-ethip4ipsec1tnlsw- 
ip4base-policy-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’dx00x00x01’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’dx00x00x01’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘ac:1f:6b:57:56:c6’, ‘ip_address’: IPv4Address(‘100.0.0.1’)})
ipsec_spd_add_del(is_add=True,spd_id=1)
ipsec_interface_add_del_spd(is_add=True,sw_if_index=1,spd_id=1)
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 100, ‘is_outbound’: True, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 50, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’dxffxffxff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8xffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 100, ‘is_outbound’: False, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 50, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8xffxffxff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’dxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 300000, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’NJmZJQaIAzUXfHdUARnpDrNrpKsSEojj’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: 0}, ‘flags’: 4, ‘tunnel’: {‘src’: ‘100.0.0.1’, ‘dst’: ‘200.0.0.102’, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘protocol’: 50, ‘udp_src_port’: 4500, ‘udp_dst_port’: 4500})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 10, ‘is_outbound’: False, ‘sa_id’: 100000, ‘policy’: 3, ‘protocol’: 0, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x00x00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xffxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 200000, ‘spi’: 400000, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’NJmZJQaIAzUXfHdUARnpDrNrpKsSEojj’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: 0}, ‘flags’: 4, ‘tunnel’: {‘src’: ‘200.0.0.102’, ‘dst’: ‘100.0.0.1’, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘protocol’: 50, ‘udp_src_port’: 4500, ‘udp_dst_port’: 4500})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 10, ‘is_outbound’: True, ‘sa_id’: 200000, ‘policy’: 3, ‘protocol’: 0, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x00x00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xffxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})

 imix-1t1c-ethip4ipsec1tnlsw- 
ip4base-policy-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’dx00x00x01’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’dx00x00x01’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘ac:1f:6b:57:56:c6’, ‘ip_address’: IPv4Address(‘100.0.0.1’)})
ipsec_spd_add_del(is_add=True,spd_id=1)
ipsec_interface_add_del_spd(is_add=True,sw_if_index=1,spd_id=1)
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 100, ‘is_outbound’: True, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 50, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’dxffxffxff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8xffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 100, ‘is_outbound’: False, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 50, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8xffxffxff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’dxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 300000, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’cvkjCOpmisuuHyMqktHVqcfCYERlZLGi’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: 0}, ‘flags’: 4, ‘tunnel’: {‘src’: ‘100.0.0.1’, ‘dst’: ‘200.0.0.102’, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘protocol’: 50, ‘udp_src_port’: 4500, ‘udp_dst_port’: 4500})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 10, ‘is_outbound’: False, ‘sa_id’: 100000, ‘policy’: 3, ‘protocol’: 0, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x00x00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xffxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 200000, ‘spi’: 400000, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’cvkjCOpmisuuHyMqktHVqcfCYERlZLGi’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: 0}, ‘flags’: 4, ‘tunnel’: {‘src’: ‘200.0.0.102’, ‘dst’: ‘100.0.0.1’, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘protocol’: 50, ‘udp_src_port’: 4500, ‘udp_dst_port’: 4500})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 10, ‘is_outbound’: True, ‘sa_id’: 200000, ‘policy’: 3, ‘protocol’: 0, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x00x00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xffxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})

10ge2p1x553-ethip4ipsec1tnlswasync-scheduler-ip4base-int-aes128cbc-hmac512sha-ndrpdr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular opology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them, run with IPsec async mode and use crypto sw scheduler engine to schedule crypto work to crypto cores. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG verification: TG finds and reports throughput NDR (Non Drop Rate) with zero packet loss tolerance and throughput PDR (Partial Drop Rate) with non-zero packet loss tolerance (LT) expressed in percentage of packets transmitted. NDR and PDR are discovered for different Ethernet L2 frame sizes using MLRsearch library.

Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to umber of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG ode interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 64b-1t2c-ethip4ipsec1tnlswasync-scheduler- 
ip4base-int-aes128cbc-hmac512sha-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’oIsRLfLVUnZbyjRi’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’QOlVnCVRkpiIJgltJMSchspQjYucqLalrjDVFACOjPBbWktDFhTvdNqofdrJXIQH’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’oIsRLfLVUnZbyjRi’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’QOlVnCVRkpiIJgltJMSchspQjYucqLalrjDVFACOjPBbWktDFhTvdNqofdrJXIQH’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_flags(sw_if_index=3,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 64b-1t4c-ethip4ipsec1tnlswasync-scheduler- 
ip4base-int-aes128cbc-hmac512sha-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’bffKHzhmfdRxiVwx’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’YbUkykYYCySFQaoePodiMiDQHPubXyssjkpOMjjcduAwoVBPDukaBbGixGZsKNci’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’bffKHzhmfdRxiVwx’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’YbUkykYYCySFQaoePodiMiDQHPubXyssjkpOMjjcduAwoVBPDukaBbGixGZsKNci’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_flags(sw_if_index=3,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-1t2c-ethip4ipsec1tnlswasync-scheduler- 
ip4base-int-aes128cbc-hmac512sha-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’QGKGwEwFMaQmYEXZ’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’yovymYEEmlFjTtgWjfLiUGyTANYOliNIhncqwlHVZOTpajrJZVQbJvGRofCHhcrb’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’QGKGwEwFMaQmYEXZ’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’yovymYEEmlFjTtgWjfLiUGyTANYOliNIhncqwlHVZOTpajrJZVQbJvGRofCHhcrb’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_flags(sw_if_index=3,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-1t4c-ethip4ipsec1tnlswasync-scheduler- 
ip4base-int-aes128cbc-hmac512sha-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’pCHldXbxGUFVWSyI’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’jjottWKwHmOrBorYgpZXQOQlKnICHpOldMovTOXakolPSxgARXtWFPRTOmUDqVeB’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’pCHldXbxGUFVWSyI’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’jjottWKwHmOrBorYgpZXQOQlKnICHpOldMovTOXakolPSxgARXtWFPRTOmUDqVeB’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_flags(sw_if_index=3,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

10ge2p1x553-ethip4ipsec1tnlswasync-scheduler-ip4base-int-aes128gcm-ndrpdr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular opology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them, run with IPsec async mode and use crypto sw scheduler engine to schedule crypto work to crypto cores. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG verification: TG finds and reports throughput NDR (Non Drop Rate) with zero packet loss tolerance and throughput PDR (Partial Drop Rate) with non-zero packet loss tolerance (LT) expressed in percentage of packets transmitted. NDR and PDR are discovered for different Ethernet L2 frame sizes using MLRsearch library.

Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to umber of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG ode interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 64b-1t4c-ethip4ipsec1tnlswasync-scheduler- 
ip4base-int-aes128gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’PyeHOElCVBoOmAQG’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’PyeHOElCVBoOmAQG’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_flags(sw_if_index=3,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-1t2c-ethip4ipsec1tnlswasync-scheduler- 
ip4base-int-aes128gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’YJUdSPFrdFDoDiFK’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’YJUdSPFrdFDoDiFK’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_flags(sw_if_index=3,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-1t4c-ethip4ipsec1tnlswasync-scheduler- 
ip4base-int-aes128gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’tzgZdzWeFsSBwePT’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’tzgZdzWeFsSBwePT’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_flags(sw_if_index=3,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

10ge2p1x553-ethip4ipsec1tnlswasync-scheduler-ip4base-int-aes256gcm-ndrpdr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular opology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them, run with IPsec async mode and use crypto sw scheduler engine to schedule crypto work to crypto cores. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG verification: TG finds and reports throughput NDR (Non Drop Rate) with zero packet loss tolerance and throughput PDR (Partial Drop Rate) with non-zero packet loss tolerance (LT) expressed in percentage of packets transmitted. NDR and PDR are discovered for different Ethernet L2 frame sizes using MLRsearch library.

Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to umber of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG ode interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 64b-1t2c-ethip4ipsec1tnlswasync-scheduler- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’RQYKJBhUaKWaaBdLVZquFvsGJAYLoxlY’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’RQYKJBhUaKWaaBdLVZquFvsGJAYLoxlY’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_flags(sw_if_index=3,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-1t2c-ethip4ipsec1tnlswasync-scheduler- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’OSzPkKdAnZzmDOKuIYwKNUOkXLcqowWv’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’OSzPkKdAnZzmDOKuIYwKNUOkXLcqowWv’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_flags(sw_if_index=3,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-1t2c-ethip4ipsec1tnlswasync-scheduler- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’ldHywXorBZvatCVwveCOweaNfwcNecVA’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’ldHywXorBZvatCVwveCOweaNfwcNecVA’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_flags(sw_if_index=3,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-1t4c-ethip4ipsec1tnlswasync-scheduler- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’QscWvXRvYRapdUzgjmVkaSHPnsJjIDzV’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’QscWvXRvYRapdUzgjmVkaSHPnsJjIDzV’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_flags(sw_if_index=3,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

10ge2p1x553-ethip4ipsec2tnlswasync-scheduler-ip4base-int-aes128cbc-hmac512sha-ndrpdr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular opology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them, run with IPsec async mode and use crypto sw scheduler engine to schedule crypto work to crypto cores. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG verification: TG finds and reports throughput NDR (Non Drop Rate) with zero packet loss tolerance and throughput PDR (Partial Drop Rate) with non-zero packet loss tolerance (LT) expressed in percentage of packets transmitted. NDR and PDR are discovered for different Ethernet L2 frame sizes using MLRsearch library.

Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to umber of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG ode interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 64b-1t4c-ethip4ipsec2tnlswasync-scheduler- 
ip4base-int-aes128cbc-hmac512sha-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’shYkfCzFrceMCPOe’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’kcpvdWvwzkSVqtnOWuDNOiBGGnUOHfzGUAwBiVJkBhpmpCSKvchRaCSQfKVDnEIU’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’shYkfCzFrceMCPOe’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’kcpvdWvwzkSVqtnOWuDNOiBGGnUOHfzGUAwBiVJkBhpmpCSKvchRaCSQfKVDnEIU’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’PUDJVRgxJkrpXziB’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’YryxRPzGEhvIgeWKEjlUfDlDPjsjyNTBCRAJaAeevZtDdWfBtcDgFikxShmuCOGR’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’PUDJVRgxJkrpXziB’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’YryxRPzGEhvIgeWKEjlUfDlDPjsjyNTBCRAJaAeevZtDdWfBtcDgFikxShmuCOGR’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-1t2c-ethip4ipsec2tnlswasync-scheduler- 
ip4base-int-aes128cbc-hmac512sha-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’bEUpzFIltJEINmRg’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’bRJeKPgAtUUFsaKYifXBjYrxEOXRcWEqObRmsuLuwHZnWiGlSGhItjynSecxFmwA’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’bEUpzFIltJEINmRg’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’bRJeKPgAtUUFsaKYifXBjYrxEOXRcWEqObRmsuLuwHZnWiGlSGhItjynSecxFmwA’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’TTDoXkOxTLDgUxhn’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’ikhmnitdMDWTqndmvtNHNhvWxkiUstbyuxODdtxcrjSsEMrgDwFYzAxFlpWLGDRn’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’TTDoXkOxTLDgUxhn’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’ikhmnitdMDWTqndmvtNHNhvWxkiUstbyuxODdtxcrjSsEMrgDwFYzAxFlpWLGDRn’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-1t2c-ethip4ipsec2tnlswasync-scheduler- 
ip4base-int-aes128cbc-hmac512sha-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’fjZquXjJBYUhLtOd’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’qdTCutXYwNoDfMJroSLCTvuUvYbiOrvJGqYMPcHbaeDrDBnxBvbaCPaGchOKGCgQ’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’fjZquXjJBYUhLtOd’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’qdTCutXYwNoDfMJroSLCTvuUvYbiOrvJGqYMPcHbaeDrDBnxBvbaCPaGchOKGCgQ’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’OuEEgIknODfLUlzb’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’xjpHJFQxRdRVGLdhdNvUDhcBsBRwxzSbPcpQZeymlYrmicyiWtsZAieZYOFbcOPk’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’OuEEgIknODfLUlzb’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’xjpHJFQxRdRVGLdhdNvUDhcBsBRwxzSbPcpQZeymlYrmicyiWtsZAieZYOFbcOPk’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-1t4c-ethip4ipsec2tnlswasync-scheduler- 
ip4base-int-aes128cbc-hmac512sha-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’FCcWHqKvqybqnsLl’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’nmUnndMGQZTfpKvVpbIiYWfQdDEjfSDicwwUxvMHiAbRZMkwKPdFlZzkNbRzKrCM’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’FCcWHqKvqybqnsLl’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’nmUnndMGQZTfpKvVpbIiYWfQdDEjfSDicwwUxvMHiAbRZMkwKPdFlZzkNbRzKrCM’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’gRPtqRKKzKQRRTKh’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’HUKdVxGWzJyakblzebCtjFmgxHAgFtrSUFCxqhxVDsKcHEvvZBhddLLXUWqdBJYd’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’gRPtqRKKzKQRRTKh’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’HUKdVxGWzJyakblzebCtjFmgxHAgFtrSUFCxqhxVDsKcHEvvZBhddLLXUWqdBJYd’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

10ge2p1x553-ethip4ipsec2tnlswasync-scheduler-ip4base-int-aes128gcm-ndrpdr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular opology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them, run with IPsec async mode and use crypto sw scheduler engine to schedule crypto work to crypto cores. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG verification: TG finds and reports throughput NDR (Non Drop Rate) with zero packet loss tolerance and throughput PDR (Partial Drop Rate) with non-zero packet loss tolerance (LT) expressed in percentage of packets transmitted. NDR and PDR are discovered for different Ethernet L2 frame sizes using MLRsearch library.

Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to umber of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG ode interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 64b-1t2c-ethip4ipsec2tnlswasync-scheduler- 
ip4base-int-aes128gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’KqOAEmbSGohUnGvG’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’KqOAEmbSGohUnGvG’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’ambTANwxGAviUMnZ’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’ambTANwxGAviUMnZ’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 64b-1t4c-ethip4ipsec2tnlswasync-scheduler- 
ip4base-int-aes128gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’pRAYceyHExqCrycX’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’pRAYceyHExqCrycX’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’PqwHzPSPyxilmVrq’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’PqwHzPSPyxilmVrq’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-1t2c-ethip4ipsec2tnlswasync-scheduler- 
ip4base-int-aes128gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’VALxypKBYBIHHmnl’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’VALxypKBYBIHHmnl’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’KSYwzqNiissdvqbv’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’KSYwzqNiissdvqbv’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-1t2c-ethip4ipsec2tnlswasync-scheduler- 
ip4base-int-aes128gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’YwaljqfzOZtrlCqb’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’YwaljqfzOZtrlCqb’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’zhJRmMyveuunQxEz’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’zhJRmMyveuunQxEz’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-1t4c-ethip4ipsec2tnlswasync-scheduler- 
ip4base-int-aes128gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’KalhDVrKPNrVLJus’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’KalhDVrKPNrVLJus’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’IGIRSvWXMuLJooLy’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’IGIRSvWXMuLJooLy’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

10ge2p1x553-ethip4ipsec2tnlswasync-scheduler-ip4base-int-aes256gcm-ndrpdr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular opology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them, run with IPsec async mode and use crypto sw scheduler engine to schedule crypto work to crypto cores. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG verification: TG finds and reports throughput NDR (Non Drop Rate) with zero packet loss tolerance and throughput PDR (Partial Drop Rate) with non-zero packet loss tolerance (LT) expressed in percentage of packets transmitted. NDR and PDR are discovered for different Ethernet L2 frame sizes using MLRsearch library.

Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to umber of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG ode interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 64b-1t2c-ethip4ipsec2tnlswasync-scheduler- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’ClDGUBuHcXRbNibfFnuaAGzWfrCzJROM’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’ClDGUBuHcXRbNibfFnuaAGzWfrCzJROM’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’asvwilPtKEjrYfTpJFubwTXNruakNDXn’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’asvwilPtKEjrYfTpJFubwTXNruakNDXn’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-1t2c-ethip4ipsec2tnlswasync-scheduler- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’JYTQmMXtMpjjdLUCmLYyJwKrlcFFMNYb’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’JYTQmMXtMpjjdLUCmLYyJwKrlcFFMNYb’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’bHshmHrTPWtEXoxIwbktWXVJbyYYYhkq’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’bHshmHrTPWtEXoxIwbktWXVJbyYYYhkq’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-1t2c-ethip4ipsec2tnlswasync-scheduler- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’baUjbXUrrpKXlNeRwmAEUAwcDOSToBWx’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’baUjbXUrrpKXlNeRwmAEUAwcDOSToBWx’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’iEBSOEMHyuxeTyczhnAgkHwcVDKpvmbM’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’iEBSOEMHyuxeTyczhnAgkHwcVDKpvmbM’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-1t4c-ethip4ipsec2tnlswasync-scheduler- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’GEaelktKBdBiGVBAPqMkYOoGNFvqEVQz’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’GEaelktKBdBiGVBAPqMkYOoGNFvqEVQz’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’QHWBDpsyoNWUHiGRVdrLpVQBOsSuXJze’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’QHWBDpsyoNWUHiGRVdrLpVQBOsSuXJze’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

10ge2p1x553-ethip4ipsec40tnlsw-ip4base-int-aes128cbc-hmac512sha-ndrpdr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular opology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG verification: TG finds and reports throughput NDR (Non Drop Rate) with zero packet loss tolerance and throughput PDR (Partial Drop Rate) with non-zero packet loss tolerance (LT) expressed in percentage of packets transmitted. NDR and PDR are discovered for different Ethernet L2 frame sizes using MLRsearch library.

Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to umber of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG ode interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 64b-1t1c-ethip4ipsec40tnlsw-ip4base- 
int-aes128cbc-hmac512sha-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec set interface ip address TenGigabitEthernet8/0/0 200.0.0.102/24.0
exec create ipip tunnel src 200.0.0.102 dst 100.0.0.1 p2p
exec ipsec sa add 100000 spi 200000 crypto-alg aes-cbc-128 crypto-key 73475746466e504a6f72747577544576 integ-alg sha-512-256 integ-key 7368756979696a45617074776e627151727a4d4e42516949724846714f7078734265675a71634569585871486171657a6e58647a625751755663706566556355 esp
exec ipsec sa add 0 spi 100000 crypto-alg aes-cbc-128 crypto-key 73475746466e504a6f72747577544576 integ-alg sha-512-256 integ-key 7368756979696a45617074776e627151727a4d4e42516949724846714f7078734265675a71634569585871486171657a6e58647a625751755663706566556355 esp
exec ipsec tunnel protect ipip0 sa-out 100000 sa-in 0 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.1.1 p2p
exec ipsec sa add 100001 spi 200001 crypto-alg aes-cbc-128 crypto-key 6945456363674f6358704a575a686857 integ-alg sha-512-256 integ-key 6c7772775556445072415644645a62636f53797751736b71556848734c4f42476f5570464e4744436d4b4f78755a6844496578754765627151494a76506f6f72 esp
exec ipsec sa add 1 spi 100001 crypto-alg aes-cbc-128 crypto-key 6945456363674f6358704a575a686857 integ-alg sha-512-256 integ-key 6c7772775556445072415644645a62636f53797751736b71556848734c4f42476f5570464e4744436d4b4f78755a6844496578754765627151494a76506f6f72 esp
exec ipsec tunnel protect ipip1 sa-out 100001 sa-in 1 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.2.1 p2p
exec ipsec sa add 100002 spi 200002 crypto-alg aes-cbc-128 crypto-key 4e585a476c526b64715850455152796f integ-alg sha-512-256 integ-key 6255684362634c50706c674151706768656d5259595152596b56575a4e465a554167587350466871614e476b566241536f7a436b6a566a596e4b4b526b5a7751 esp
exec ipsec sa add 2 spi 100002 crypto-alg aes-cbc-128 crypto-key 4e585a476c526b64715850455152796f integ-alg sha-512-256 integ-key 6255684362634c50706c674151706768656d5259595152596b56575a4e465a554167587350466871614e476b566241536f7a436b6a566a596e4b4b526b5a7751 esp
exec ipsec tunnel protect ipip2 sa-out 100002 sa-in 2 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.3.1 p2p
exec ipsec sa add 100003 spi 200003 crypto-alg aes-cbc-128 crypto-key 6476576375747653426b7466556b4862 integ-alg sha-512-256 integ-key 4f6b476b515054774a46776d7171455957544358777a66784e4d54684a566b4471654558596f54546f64694b714b4d676363716c4a7451635267455875596b77 esp
exec ipsec sa add 3 spi 100003 crypto-alg aes-cbc-128 crypto-key 6476576375747653426b7466556b4862 integ-alg sha-512-256 integ-key 4f6b476b515054774a46776d7171455957544358777a66784e4d54684a566b4471654558596f54546f64694b714b4d676363716c4a7451635267455875596b77 esp
exec ipsec tunnel protect ipip3 sa-out 100003 sa-in 3 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.4.1 p2p
exec ipsec sa add 100004 spi 200004 crypto-alg aes-cbc-128 crypto-key 4d6c56416746416656594f6c6c65524b integ-alg sha-512-256 integ-key 6644444f4f6d71637575526e5770695350525079686d746444625a744e45415a5a666f62786f446268726e43754a78646675637a7766534a79676c4172566544 esp
exec ipsec sa add 4 spi 100004 crypto-alg aes-cbc-128 crypto-key 4d6c56416746416656594f6c6c65524b integ-alg sha-512-256 integ-key 6644444f4f6d71637575526e5770695350525079686d746444625a744e45415a5a666f62786f446268726e43754a78646675637a7766534a79676c4172566544 esp
exec ipsec tunnel protect ipip4 sa-out 100004 sa-in 4 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.5.1 p2p
exec ipsec sa add 100005 spi 200005 crypto-alg aes-cbc-128 crypto-key 4566477a5273634e65486e7950777474 integ-alg sha-512-256 integ-key 79625047496a45494a49666756656c71786b624e6c77616c4157486a6369697249644a466156767858737174706c6c5a6f7542546a577653476b4f7778416844 esp
exec ipsec sa add 5 spi 100005 crypto-alg aes-cbc-128 crypto-key 4566477a5273634e65486e7950777474 integ-alg sha-512-256 integ-key 79625047496a45494a49666756656c71786b624e6c77616c4157486a6369697249644a466156767858737174706c6c5a6f7542546a577653476b4f7778416844 esp
exec ipsec tunnel protect ipip5 sa-out 100005 sa-in 5 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.6.1 p2p
exec ipsec sa add 100006 spi 200006 crypto-alg aes-cbc-128 crypto-key 7253484b6d714f496650444a78525a6a integ-alg sha-512-256 integ-key 735463646a46526358497a6d56756d514841596d4e5a434a6d654d53704259684f6f4b55687071456354696948564153796d6351614661736a47567757664946 esp
exec ipsec sa add 6 spi 100006 crypto-alg aes-cbc-128 crypto-key 7253484b6d714f496650444a78525a6a integ-alg sha-512-256 integ-key 735463646a46526358497a6d56756d514841596d4e5a434a6d654d53704259684f6f4b55687071456354696948564153796d6351614661736a47567757664946 esp
exec ipsec tunnel protect ipip6 sa-out 100006 sa-in 6 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.7.1 p2p
exec ipsec sa add 100007 spi 200007 crypto-alg aes-cbc-128 crypto-key 79566e705248704f586b55704d63466a integ-alg sha-512-256 integ-key 516d706f48546f776d4e6a54676142425765637174777041455967444a4a4e6c425363515a514b57616a7675566c6e6c78767047434b736a566d654e704d506b esp
exec ipsec sa add 7 spi 100007 crypto-alg aes-cbc-128 crypto-key 79566e705248704f586b55704d63466a integ-alg sha-512-256 integ-key 516d706f48546f776d4e6a54676142425765637174777041455967444a4a4e6c425363515a514b57616a7675566c6e6c78767047434b736a566d654e704d506b esp
exec ipsec tunnel protect ipip7 sa-out 100007 sa-in 7 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.8.1 p2p
exec ipsec sa add 100008 spi 200008 crypto-alg aes-cbc-128 crypto-key 46746b4f654e42795775616e42417578 integ-alg sha-512-256 integ-key 5a446353455962565941767969794a656d53785664497948427a78644e6b546169646a524a716a545943644f6b4c4a6e53554f616d7646665865514262687656 esp
exec ipsec sa add 8 spi 100008 crypto-alg aes-cbc-128 crypto-key 46746b4f654e42795775616e42417578 integ-alg sha-512-256 integ-key 5a446353455962565941767969794a656d53785664497948427a78644e6b546169646a524a716a545943644f6b4c4a6e53554f616d7646665865514262687656 esp
exec ipsec tunnel protect ipip8 sa-out 100008 sa-in 8 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.9.1 p2p
exec ipsec sa add 100009 spi 200009 crypto-alg aes-cbc-128 crypto-key 4a41524c65465766657378644954504d integ-alg sha-512-256 integ-key 58694f65446d6a6d44546c4c6f4a6e5173565a696852694446766b7463505968724d7a50457454736f70476d586d5061416d766174536f5161584d444e4b4d50 esp
exec ipsec sa add 9 spi 100009 crypto-alg aes-cbc-128 crypto-key 4a41524c65465766657378644954504d integ-alg sha-512-256 integ-key 58694f65446d6a6d44546c4c6f4a6e5173565a696852694446766b7463505968724d7a50457454736f70476d586d5061416d766174536f5161584d444e4b4d50 esp
exec ipsec tunnel protect ipip9 sa-out 100009 sa-in 9 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.10.1 p2p
exec ipsec sa add 100010 spi 200010 crypto-alg aes-cbc-128 crypto-key 5576695974776f6564556b4c645a5974 integ-alg sha-512-256 integ-key 426e725a6b4f414e735a624d66774e7a466e434154794b456a476c725177734a4163556965656171616c4145656948446956516777577a536a5546675a73544f esp
exec ipsec sa add 10 spi 100010 crypto-alg aes-cbc-128 crypto-key 5576695974776f6564556b4c645a5974 integ-alg sha-512-256 integ-key 426e725a6b4f414e735a624d66774e7a466e434154794b456a476c725177734a4163556965656171616c4145656948446956516777577a536a5546675a73544f esp
exec ipsec tunnel protect ipip10 sa-out 100010 sa-in 10 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.11.1 p2p
exec ipsec sa add 100011 spi 200011 crypto-alg aes-cbc-128 crypto-key 48465163617350454f53415a734f4e64 integ-alg sha-512-256 integ-key 6b6b4a4158584256555a686c4b43467a76685164637379517a486a69466647764745636246784c71426752744d45425a55716d597754497772546e4a59527078 esp
exec ipsec sa add 11 spi 100011 crypto-alg aes-cbc-128 crypto-key 48465163617350454f53415a734f4e64 integ-alg sha-512-256 integ-key 6b6b4a4158584256555a686c4b43467a76685164637379517a486a69466647764745636246784c71426752744d45425a55716d597754497772546e4a59527078 esp
exec ipsec tunnel protect ipip11 sa-out 100011 sa-in 11 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.12.1 p2p
exec ipsec sa add 100012 spi 200012 crypto-alg aes-cbc-128 crypto-key 7746676f7a49435a4a4f4c6158746443 integ-alg sha-512-256 integ-key 70427061566d707a69446b59667471595749416674424c574c6448536d6568706e76467466496f77436f62496e44527352756a494d6d61426a50655452586e4a esp
exec ipsec sa add 12 spi 100012 crypto-alg aes-cbc-128 crypto-key 7746676f7a49435a4a4f4c6158746443 integ-alg sha-512-256 integ-key 70427061566d707a69446b59667471595749416674424c574c6448536d6568706e76467466496f77436f62496e44527352756a494d6d61426a50655452586e4a esp
exec ipsec tunnel protect ipip12 sa-out 100012 sa-in 12 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.13.1 p2p
exec ipsec sa add 100013 spi 200013 crypto-alg aes-cbc-128 crypto-key 68574256704458484466774d6e684c71 integ-alg sha-512-256 integ-key 6d6678445962717947586863434e73634b676e4b556642736d6375487866577155514c6950766e5872786f644970447a58534d4b585875545076707358777866 esp
exec ipsec sa add 13 spi 100013 crypto-alg aes-cbc-128 crypto-key 68574256704458484466774d6e684c71 integ-alg sha-512-256 integ-key 6d6678445962717947586863434e73634b676e4b556642736d6375487866577155514c6950766e5872786f644970447a58534d4b585875545076707358777866 esp
exec ipsec tunnel protect ipip13 sa-out 100013 sa-in 13 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.14.1 p2p
exec ipsec sa add 100014 spi 200014 crypto-alg aes-cbc-128 crypto-key 4f48655153687a6e7a6d5374686d6d6a integ-alg sha-512-256 integ-key 4d586b67784954774e6b57644641445965637154766678756a636477666e70687645725474715345645365704e776f764951526c4e524a4156734b65794b756e esp
exec ipsec sa add 14 spi 100014 crypto-alg aes-cbc-128 crypto-key 4f48655153687a6e7a6d5374686d6d6a integ-alg sha-512-256 integ-key 4d586b67784954774e6b57644641445965637154766678756a636477666e70687645725474715345645365704e776f764951526c4e524a4156734b65794b756e esp
exec ipsec tunnel protect ipip14 sa-out 100014 sa-in 14 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.15.1 p2p
exec ipsec sa add 100015 spi 200015 crypto-alg aes-cbc-128 crypto-key 74526d7a475a736e4a68515464657765 integ-alg sha-512-256 integ-key 4d4d646a62436b526a4248716358724b6e6156645565744c586878626c4d427245727264526f78664f774b49794a4568616272754e64575a7470454953746651 esp
exec ipsec sa add 15 spi 100015 crypto-alg aes-cbc-128 crypto-key 74526d7a475a736e4a68515464657765 integ-alg sha-512-256 integ-key 4d4d646a62436b526a4248716358724b6e6156645565744c586878626c4d427245727264526f78664f774b49794a4568616272754e64575a7470454953746651 esp
exec ipsec tunnel protect ipip15 sa-out 100015 sa-in 15 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.16.1 p2p
exec ipsec sa add 100016 spi 200016 crypto-alg aes-cbc-128 crypto-key 786e4e7a7243766671425a7a50454243 integ-alg sha-512-256 integ-key 74495a4c5075484f55777269467344457346525474536f41744650597157414b446266576372736e5a5764656b44497a7268456765417147464277754f6b7a70 esp
exec ipsec sa add 16 spi 100016 crypto-alg aes-cbc-128 crypto-key 786e4e7a7243766671425a7a50454243 integ-alg sha-512-256 integ-key 74495a4c5075484f55777269467344457346525474536f41744650597157414b446266576372736e5a5764656b44497a7268456765417147464277754f6b7a70 esp
exec ipsec tunnel protect ipip16 sa-out 100016 sa-in 16 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.17.1 p2p
exec ipsec sa add 100017 spi 200017 crypto-alg aes-cbc-128 crypto-key 7774724a725a4e656a69476f76685746 integ-alg sha-512-256 integ-key 6b784f4a70547754706a685574574d567052724c576a4d494e4962556570624d6a646271765a7751526c44457646757662764b4c6f5274464356665151584c49 esp
exec ipsec sa add 17 spi 100017 crypto-alg aes-cbc-128 crypto-key 7774724a725a4e656a69476f76685746 integ-alg sha-512-256 integ-key 6b784f4a70547754706a685574574d567052724c576a4d494e4962556570624d6a646271765a7751526c44457646757662764b4c6f5274464356665151584c49 esp
exec ipsec tunnel protect ipip17 sa-out 100017 sa-in 17 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.18.1 p2p
exec ipsec sa add 100018 spi 200018 crypto-alg aes-cbc-128 crypto-key 45564666466479684a4e6b554d71734e integ-alg sha-512-256 integ-key 694d484f57644b7a7757504b4a636f556753506677416b7847746c7163477262746463744e5762456a744267545055796c56544d58427469474458586a4a6b76 esp
exec ipsec sa add 18 spi 100018 crypto-alg aes-cbc-128 crypto-key 45564666466479684a4e6b554d71734e integ-alg sha-512-256 integ-key 694d484f57644b7a7757504b4a636f556753506677416b7847746c7163477262746463744e5762456a744267545055796c56544d58427469474458586a4a6b76 esp
exec ipsec tunnel protect ipip18 sa-out 100018 sa-in 18 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.19.1 p2p
exec ipsec sa add 100019 spi 200019 crypto-alg aes-cbc-128 crypto-key 49766a44676b5a4e53486d4468556d58 integ-alg sha-512-256 integ-key 69757059584f7164795458694e71577570615a73686e6c68555362507269574372784f784e6f616e4e736a6d626f5141776e595549546f476e5a4b6568467271 esp
exec ipsec sa add 19 spi 100019 crypto-alg aes-cbc-128 crypto-key 49766a44676b5a4e53486d4468556d58 integ-alg sha-512-256 integ-key 69757059584f7164795458694e71577570615a73686e6c68555362507269574372784f784e6f616e4e736a6d626f5141776e595549546f476e5a4b6568467271 esp
exec ipsec tunnel protect ipip19 sa-out 100019 sa-in 19 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.20.1 p2p
exec ipsec sa add 100020 spi 200020 crypto-alg aes-cbc-128 crypto-key 6d684f4a5161694d6f546f5763755a61 integ-alg sha-512-256 integ-key 68586c45504e57726d566d566f6f6e494746476f656157684858774c6a4a645554476f4f534c68456166695049667a7173447063486e6851667a56547a4a4e45 esp
exec ipsec sa add 20 spi 100020 crypto-alg aes-cbc-128 crypto-key 6d684f4a5161694d6f546f5763755a61 integ-alg sha-512-256 integ-key 68586c45504e57726d566d566f6f6e494746476f656157684858774c6a4a645554476f4f534c68456166695049667a7173447063486e6851667a56547a4a4e45 esp
exec ipsec tunnel protect ipip20 sa-out 100020 sa-in 20 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.21.1 p2p
exec ipsec sa add 100021 spi 200021 crypto-alg aes-cbc-128 crypto-key 6a4c5658515859634b41716f4e514a79 integ-alg sha-512-256 integ-key 43624664414d497074584a71414c627041484768596a62526d67777846537a67434f58507764625643784e5a596574546174425979734c744f494a70704f7779 esp
exec ipsec sa add 21 spi 100021 crypto-alg aes-cbc-128 crypto-key 6a4c5658515859634b41716f4e514a79 integ-alg sha-512-256 integ-key 43624664414d497074584a71414c627041484768596a62526d67777846537a67434f58507764625643784e5a596574546174425979734c744f494a70704f7779 esp
exec ipsec tunnel protect ipip21 sa-out 100021 sa-in 21 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.22.1 p2p
exec ipsec sa add 100022 spi 200022 crypto-alg aes-cbc-128 crypto-key 51505768706859666166567a726f4950 integ-alg sha-512-256 integ-key 625a5a635073616c6668696b78745467424a4e796a4f475557515157577a7076544c7551674348647446596a64756a4a514b4f755a486d72456750786a504a41 esp
exec ipsec sa add 22 spi 100022 crypto-alg aes-cbc-128 crypto-key 51505768706859666166567a726f4950 integ-alg sha-512-256 integ-key 625a5a635073616c6668696b78745467424a4e796a4f475557515157577a7076544c7551674348647446596a64756a4a514b4f755a486d72456750786a504a41 esp
exec ipsec tunnel protect ipip22 sa-out 100022 sa-in 22 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.23.1 p2p
exec ipsec sa add 100023 spi 200023 crypto-alg aes-cbc-128 crypto-key 68714168454c63556d65436d54547552 integ-alg sha-512-256 integ-key 446274514446434a554f4f554a4e666d6b79787457417352736f456d5556436767654169734e4d7474706372416f76675358655a4448764a715856616152764e esp
exec ipsec sa add 23 spi 100023 crypto-alg aes-cbc-128 crypto-key 68714168454c63556d65436d54547552 integ-alg sha-512-256 integ-key 446274514446434a554f4f554a4e666d6b79787457417352736f456d5556436767654169734e4d7474706372416f76675358655a4448764a715856616152764e esp
exec ipsec tunnel protect ipip23 sa-out 100023 sa-in 23 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.24.1 p2p
exec ipsec sa add 100024 spi 200024 crypto-alg aes-cbc-128 crypto-key 4b6e7a476f556c51626f634b6e45754b integ-alg sha-512-256 integ-key 6951534c4d67585449645345504e727568615062794650506967634f6969495076525a736d7565415a516b59545a4d6546644351796f516b6457706b616e4e6f esp
exec ipsec sa add 24 spi 100024 crypto-alg aes-cbc-128 crypto-key 4b6e7a476f556c51626f634b6e45754b integ-alg sha-512-256 integ-key 6951534c4d67585449645345504e727568615062794650506967634f6969495076525a736d7565415a516b59545a4d6546644351796f516b6457706b616e4e6f esp
exec ipsec tunnel protect ipip24 sa-out 100024 sa-in 24 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.25.1 p2p
exec ipsec sa add 100025 spi 200025 crypto-alg aes-cbc-128 crypto-key 496c52696f506f50784e416c57674e63 integ-alg sha-512-256 integ-key 7a6c735267595863466d414b706362534271424f4778564e68784948515766564c6969506a58695367487958764c44474f77597a50594c79774f4f614c63694a esp
exec ipsec sa add 25 spi 100025 crypto-alg aes-cbc-128 crypto-key 496c52696f506f50784e416c57674e63 integ-alg sha-512-256 integ-key 7a6c735267595863466d414b706362534271424f4778564e68784948515766564c6969506a58695367487958764c44474f77597a50594c79774f4f614c63694a esp
exec ipsec tunnel protect ipip25 sa-out 100025 sa-in 25 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.26.1 p2p
exec ipsec sa add 100026 spi 200026 crypto-alg aes-cbc-128 crypto-key 48705770437a674e70516e736e555053 integ-alg sha-512-256 integ-key 4e666471794a52525946504c724a52734b717078644a574a714c727162694e67516548705644614f7669754f546744526c727454756c65796b494d6855504955 esp
exec ipsec sa add 26 spi 100026 crypto-alg aes-cbc-128 crypto-key 48705770437a674e70516e736e555053 integ-alg sha-512-256 integ-key 4e666471794a52525946504c724a52734b717078644a574a714c727162694e67516548705644614f7669754f546744526c727454756c65796b494d6855504955 esp
exec ipsec tunnel protect ipip26 sa-out 100026 sa-in 26 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.27.1 p2p
exec ipsec sa add 100027 spi 200027 crypto-alg aes-cbc-128 crypto-key 6d564a64756d7a4775554b4d7854655a integ-alg sha-512-256 integ-key 444b4e6a4755415a42644e696e584252654c584559575a6575744d4a786d50434e66777a5a7143444355546746616474726b78784850436d6a4968734a627848 esp
exec ipsec sa add 27 spi 100027 crypto-alg aes-cbc-128 crypto-key 6d564a64756d7a4775554b4d7854655a integ-alg sha-512-256 integ-key 444b4e6a4755415a42644e696e584252654c584559575a6575744d4a786d50434e66777a5a7143444355546746616474726b78784850436d6a4968734a627848 esp
exec ipsec tunnel protect ipip27 sa-out 100027 sa-in 27 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.28.1 p2p
exec ipsec sa add 100028 spi 200028 crypto-alg aes-cbc-128 crypto-key 70764e7a55684b436469567265696141 integ-alg sha-512-256 integ-key 44737750636b6254784e75694d41594e734e57516e506e76777456506a625643417a564675575845586c6d4c52527757514d5a6a544347554656447a694c7a6f esp
exec ipsec sa add 28 spi 100028 crypto-alg aes-cbc-128 crypto-key 70764e7a55684b436469567265696141 integ-alg sha-512-256 integ-key 44737750636b6254784e75694d41594e734e57516e506e76777456506a625643417a564675575845586c6d4c52527757514d5a6a544347554656447a694c7a6f esp
exec ipsec tunnel protect ipip28 sa-out 100028 sa-in 28 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.29.1 p2p
exec ipsec sa add 100029 spi 200029 crypto-alg aes-cbc-128 crypto-key 76776145486a68787544635a63437253 integ-alg sha-512-256 integ-key 514d6d4b4747687379444e595659684363686f475371664551796962754869506f56727966655375474f75464c77716a55757248465651554e614e7364527354 esp
exec ipsec sa add 29 spi 100029 crypto-alg aes-cbc-128 crypto-key 76776145486a68787544635a63437253 integ-alg sha-512-256 integ-key 514d6d4b4747687379444e595659684363686f475371664551796962754869506f56727966655375474f75464c77716a55757248465651554e614e7364527354 esp
exec ipsec tunnel protect ipip29 sa-out 100029 sa-in 29 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.30.1 p2p
exec ipsec sa add 100030 spi 200030 crypto-alg aes-cbc-128 crypto-key 447a79444b7178596c735a41574a4958 integ-alg sha-512-256 integ-key 5072574d6c4d6b4b65536551426b6d7172724257644f6b49795252736746575a786e7a4c6b70757945684352636344756f614a6d547869554d506552784a516b esp
exec ipsec sa add 30 spi 100030 crypto-alg aes-cbc-128 crypto-key 447a79444b7178596c735a41574a4958 integ-alg sha-512-256 integ-key 5072574d6c4d6b4b65536551426b6d7172724257644f6b49795252736746575a786e7a4c6b70757945684352636344756f614a6d547869554d506552784a516b esp
exec ipsec tunnel protect ipip30 sa-out 100030 sa-in 30 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.31.1 p2p
exec ipsec sa add 100031 spi 200031 crypto-alg aes-cbc-128 crypto-key 4d434c6b755964725a79495459617351 integ-alg sha-512-256 integ-key 6453734e4c534e61624e744b6e635a6b516c496f6f6f43464c63556e696c64654c7858636e546e5541646f5346485478445976714e454271654f636962426f56 esp
exec ipsec sa add 31 spi 100031 crypto-alg aes-cbc-128 crypto-key 4d434c6b755964725a79495459617351 integ-alg sha-512-256 integ-key 6453734e4c534e61624e744b6e635a6b516c496f6f6f43464c63556e696c64654c7858636e546e5541646f5346485478445976714e454271654f636962426f56 esp
exec ipsec tunnel protect ipip31 sa-out 100031 sa-in 31 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.32.1 p2p
exec ipsec sa add 100032 spi 200032 crypto-alg aes-cbc-128 crypto-key 4e595279534274724344516d73416e6c integ-alg sha-512-256 integ-key 427476636f5541765962716343664b725976517258737153715842727859556b6e594346487867514a55656a4a734341626446496557505a766b4c4476767158 esp
exec ipsec sa add 32 spi 100032 crypto-alg aes-cbc-128 crypto-key 4e595279534274724344516d73416e6c integ-alg sha-512-256 integ-key 427476636f5541765962716343664b725976517258737153715842727859556b6e594346487867514a55656a4a734341626446496557505a766b4c4476767158 esp
exec ipsec tunnel protect ipip32 sa-out 100032 sa-in 32 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.33.1 p2p
exec ipsec sa add 100033 spi 200033 crypto-alg aes-cbc-128 crypto-key 7546694a5a64576a537754784c546765 integ-alg sha-512-256 integ-key 6973416258547257744a6d7568796a7975556e75546a4e4c567149664a67476a4f4b6c745977676f48535052644e5147697857715747696b4642796a48507645 esp
exec ipsec sa add 33 spi 100033 crypto-alg aes-cbc-128 crypto-key 7546694a5a64576a537754784c546765 integ-alg sha-512-256 integ-key 6973416258547257744a6d7568796a7975556e75546a4e4c567149664a67476a4f4b6c745977676f48535052644e5147697857715747696b4642796a48507645 esp
exec ipsec tunnel protect ipip33 sa-out 100033 sa-in 33 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.34.1 p2p
exec ipsec sa add 100034 spi 200034 crypto-alg aes-cbc-128 crypto-key 6a41536c6d4f536546745a526f457967 integ-alg sha-512-256 integ-key 6768486653657341445371747a68566442696e5261616d5367646c6a634c517a657a7843755168547742736d4d4b68436558697652584f6c53504f596f464d7a esp
exec ipsec sa add 34 spi 100034 crypto-alg aes-cbc-128 crypto-key 6a41536c6d4f536546745a526f457967 integ-alg sha-512-256 integ-key 6768486653657341445371747a68566442696e5261616d5367646c6a634c517a657a7843755168547742736d4d4b68436558697652584f6c53504f596f464d7a esp
exec ipsec tunnel protect ipip34 sa-out 100034 sa-in 34 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.35.1 p2p
exec ipsec sa add 100035 spi 200035 crypto-alg aes-cbc-128 crypto-key 78586c6a636943754e794e5a59525263 integ-alg sha-512-256 integ-key 6144546c44487864564e524e796b52776964456b6e5142696f6d78625248414d76506451626e424265666f5244724b52584d664c6f4948594964697551714b42 esp
exec ipsec sa add 35 spi 100035 crypto-alg aes-cbc-128 crypto-key 78586c6a636943754e794e5a59525263 integ-alg sha-512-256 integ-key 6144546c44487864564e524e796b52776964456b6e5142696f6d78625248414d76506451626e424265666f5244724b52584d664c6f4948594964697551714b42 esp
exec ipsec tunnel protect ipip35 sa-out 100035 sa-in 35 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.36.1 p2p
exec ipsec sa add 100036 spi 200036 crypto-alg aes-cbc-128 crypto-key 5343586b705454656c48474379754277 integ-alg sha-512-256 integ-key 7647624775594c5557455a444876686f6c6f61426f525557656158505a425055516d55524d7746437553536267746e4f6c5a544c56474e7050485a6a72644778 esp
exec ipsec sa add 36 spi 100036 crypto-alg aes-cbc-128 crypto-key 5343586b705454656c48474379754277 integ-alg sha-512-256 integ-key 7647624775594c5557455a444876686f6c6f61426f525557656158505a425055516d55524d7746437553536267746e4f6c5a544c56474e7050485a6a72644778 esp
exec ipsec tunnel protect ipip36 sa-out 100036 sa-in 36 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.37.1 p2p
exec ipsec sa add 100037 spi 200037 crypto-alg aes-cbc-128 crypto-key 547a4a57706b5061766a44684b724e5a integ-alg sha-512-256 integ-key 4741446a4d6b41756e50496c775865646c554b6467754e4162725552435a75736d7a51476b4d6e614b506373696a5547746e74414649786e4a6f70496e785669 esp
exec ipsec sa add 37 spi 100037 crypto-alg aes-cbc-128 crypto-key 547a4a57706b5061766a44684b724e5a integ-alg sha-512-256 integ-key 4741446a4d6b41756e50496c775865646c554b6467754e4162725552435a75736d7a51476b4d6e614b506373696a5547746e74414649786e4a6f70496e785669 esp
exec ipsec tunnel protect ipip37 sa-out 100037 sa-in 37 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.38.1 p2p
exec ipsec sa add 100038 spi 200038 crypto-alg aes-cbc-128 crypto-key 516458476a4f485071494b6f415a6d58 integ-alg sha-512-256 integ-key 756a5755654b42586d6677557a7564677178795a65457654744a4250654d5566725359676f7969656c61617073506546764e416f786d5a4a4f46705671585544 esp
exec ipsec sa add 38 spi 100038 crypto-alg aes-cbc-128 crypto-key 516458476a4f485071494b6f415a6d58 integ-alg sha-512-256 integ-key 756a5755654b42586d6677557a7564677178795a65457654744a4250654d5566725359676f7969656c61617073506546764e416f786d5a4a4f46705671585544 esp
exec ipsec tunnel protect ipip38 sa-out 100038 sa-in 38 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.39.1 p2p
exec ipsec sa add 100039 spi 200039 crypto-alg aes-cbc-128 crypto-key 7a597343766b57566944574841694643 integ-alg sha-512-256 integ-key 6d4f447261497377424f6656674d616b62636b70474441594b576576744768686872716c44704f6353496f737a6b4e5654666d48745272455a744565494f7a75 esp
exec ipsec sa add 39 spi 100039 crypto-alg aes-cbc-128 crypto-key 7a597343766b57566944574841694643 integ-alg sha-512-256 integ-key 6d4f447261497377424f6656674d616b62636b70474441594b576576744768686872716c44704f6353496f737a6b4e5654666d48745272455a744565494f7a75 esp
exec ipsec tunnel protect ipip39 sa-out 100039 sa-in 39 add
exec ip route add 100.0.0.1/8 via 200.0.0.101 TenGigabitEthernet8/0/0
exec set interface unnumbered ipip0 use TenGigabitEthernet8/0/0
exec set interface state ipip0 up
exec ip route add 10.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use TenGigabitEthernet8/0/0
exec set interface state ipip1 up
exec ip route add 10.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use TenGigabitEthernet8/0/0
exec set interface state ipip2 up
exec ip route add 10.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use TenGigabitEthernet8/0/0
exec set interface state ipip3 up
exec ip route add 10.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use TenGigabitEthernet8/0/0
exec set interface state ipip4 up
exec ip route add 10.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use TenGigabitEthernet8/0/0
exec set interface state ipip5 up
exec ip route add 10.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use TenGigabitEthernet8/0/0
exec set interface state ipip6 up
exec ip route add 10.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use TenGigabitEthernet8/0/0
exec set interface state ipip7 up
exec ip route add 10.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use TenGigabitEthernet8/0/0
exec set interface state ipip8 up
exec ip route add 10.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use TenGigabitEthernet8/0/0
exec set interface state ipip9 up
exec ip route add 10.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use TenGigabitEthernet8/0/0
exec set interface state ipip10 up
exec ip route add 10.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use TenGigabitEthernet8/0/0
exec set interface state ipip11 up
exec ip route add 10.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use TenGigabitEthernet8/0/0
exec set interface state ipip12 up
exec ip route add 10.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use TenGigabitEthernet8/0/0
exec set interface state ipip13 up
exec ip route add 10.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use TenGigabitEthernet8/0/0
exec set interface state ipip14 up
exec ip route add 10.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use TenGigabitEthernet8/0/0
exec set interface state ipip15 up
exec ip route add 10.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use TenGigabitEthernet8/0/0
exec set interface state ipip16 up
exec ip route add 10.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use TenGigabitEthernet8/0/0
exec set interface state ipip17 up
exec ip route add 10.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use TenGigabitEthernet8/0/0
exec set interface state ipip18 up
exec ip route add 10.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use TenGigabitEthernet8/0/0
exec set interface state ipip19 up
exec ip route add 10.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use TenGigabitEthernet8/0/0
exec set interface state ipip20 up
exec ip route add 10.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use TenGigabitEthernet8/0/0
exec set interface state ipip21 up
exec ip route add 10.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use TenGigabitEthernet8/0/0
exec set interface state ipip22 up
exec ip route add 10.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use TenGigabitEthernet8/0/0
exec set interface state ipip23 up
exec ip route add 10.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use TenGigabitEthernet8/0/0
exec set interface state ipip24 up
exec ip route add 10.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use TenGigabitEthernet8/0/0
exec set interface state ipip25 up
exec ip route add 10.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use TenGigabitEthernet8/0/0
exec set interface state ipip26 up
exec ip route add 10.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use TenGigabitEthernet8/0/0
exec set interface state ipip27 up
exec ip route add 10.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use TenGigabitEthernet8/0/0
exec set interface state ipip28 up
exec ip route add 10.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use TenGigabitEthernet8/0/0
exec set interface state ipip29 up
exec ip route add 10.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use TenGigabitEthernet8/0/0
exec set interface state ipip30 up
exec ip route add 10.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use TenGigabitEthernet8/0/0
exec set interface state ipip31 up
exec ip route add 10.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use TenGigabitEthernet8/0/0
exec set interface state ipip32 up
exec ip route add 10.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use TenGigabitEthernet8/0/0
exec set interface state ipip33 up
exec ip route add 10.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use TenGigabitEthernet8/0/0
exec set interface state ipip34 up
exec ip route add 10.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use TenGigabitEthernet8/0/0
exec set interface state ipip35 up
exec ip route add 10.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use TenGigabitEthernet8/0/0
exec set interface state ipip36 up
exec ip route add 10.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use TenGigabitEthernet8/0/0
exec set interface state ipip37 up
exec ip route add 10.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use TenGigabitEthernet8/0/0
exec set interface state ipip38 up
exec ip route add 10.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use TenGigabitEthernet8/0/0
exec set interface state ipip39 up
exec ip route add 10.0.0.39/32 via ipip39

 1518b-1t1c-ethip4ipsec40tnlsw-ip4base- 
int-aes128cbc-hmac512sha-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec set interface ip address TenGigabitEthernet8/0/0 200.0.0.102/24.0
exec create ipip tunnel src 200.0.0.102 dst 100.0.0.1 p2p
exec ipsec sa add 100000 spi 200000 crypto-alg aes-cbc-128 crypto-key 6b75636b647943486578726a50624b6a integ-alg sha-512-256 integ-key 49615477506c4145757472686679584c74426e5759416478796b7649696771524354624d4e7163536a797264694e724c4d664858664849426863594956507069 esp
exec ipsec sa add 0 spi 100000 crypto-alg aes-cbc-128 crypto-key 6b75636b647943486578726a50624b6a integ-alg sha-512-256 integ-key 49615477506c4145757472686679584c74426e5759416478796b7649696771524354624d4e7163536a797264694e724c4d664858664849426863594956507069 esp
exec ipsec tunnel protect ipip0 sa-out 100000 sa-in 0 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.1.1 p2p
exec ipsec sa add 100001 spi 200001 crypto-alg aes-cbc-128 crypto-key 4c6f4a7479617652734d54586b49446b integ-alg sha-512-256 integ-key 5857526b7147494c77705373424f43475254444f666c4d7576745772707567666f674d7a7152457979494d7942635256477950684f6649736f55666b41515772 esp
exec ipsec sa add 1 spi 100001 crypto-alg aes-cbc-128 crypto-key 4c6f4a7479617652734d54586b49446b integ-alg sha-512-256 integ-key 5857526b7147494c77705373424f43475254444f666c4d7576745772707567666f674d7a7152457979494d7942635256477950684f6649736f55666b41515772 esp
exec ipsec tunnel protect ipip1 sa-out 100001 sa-in 1 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.2.1 p2p
exec ipsec sa add 100002 spi 200002 crypto-alg aes-cbc-128 crypto-key 61614273796b44445a6e674c4e6e5450 integ-alg sha-512-256 integ-key 6a4b7a7558584861446957496e4d496742744a434a6867454371656b74616d765576726f63614f564949504d69524d55686c597845546349636a4c6a42524968 esp
exec ipsec sa add 2 spi 100002 crypto-alg aes-cbc-128 crypto-key 61614273796b44445a6e674c4e6e5450 integ-alg sha-512-256 integ-key 6a4b7a7558584861446957496e4d496742744a434a6867454371656b74616d765576726f63614f564949504d69524d55686c597845546349636a4c6a42524968 esp
exec ipsec tunnel protect ipip2 sa-out 100002 sa-in 2 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.3.1 p2p
exec ipsec sa add 100003 spi 200003 crypto-alg aes-cbc-128 crypto-key 6a4c4c4f7a4575654a51667266537655 integ-alg sha-512-256 integ-key 6c786a68657a576341784770567a704c5775536949675744536e5a516a5461416b416173646b786c6e57676250574a5279715652427346426a4f564e74676770 esp
exec ipsec sa add 3 spi 100003 crypto-alg aes-cbc-128 crypto-key 6a4c4c4f7a4575654a51667266537655 integ-alg sha-512-256 integ-key 6c786a68657a576341784770567a704c5775536949675744536e5a516a5461416b416173646b786c6e57676250574a5279715652427346426a4f564e74676770 esp
exec ipsec tunnel protect ipip3 sa-out 100003 sa-in 3 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.4.1 p2p
exec ipsec sa add 100004 spi 200004 crypto-alg aes-cbc-128 crypto-key 464147496f6c6a7976724b5479736b77 integ-alg sha-512-256 integ-key 7471685469426d4879474f4e464e4851796357637741766d7353654b685670624a41794767794e7751546d76654879564b48514f7447747663794c5376535355 esp
exec ipsec sa add 4 spi 100004 crypto-alg aes-cbc-128 crypto-key 464147496f6c6a7976724b5479736b77 integ-alg sha-512-256 integ-key 7471685469426d4879474f4e464e4851796357637741766d7353654b685670624a41794767794e7751546d76654879564b48514f7447747663794c5376535355 esp
exec ipsec tunnel protect ipip4 sa-out 100004 sa-in 4 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.5.1 p2p
exec ipsec sa add 100005 spi 200005 crypto-alg aes-cbc-128 crypto-key 53726a4a6f74796165556b70624c574c integ-alg sha-512-256 integ-key 616c6b75475a4c624d746567687143634f4d44526e77474e4e52427369624d4979637a56635769466e686147714f544145556e55756a496b75715745746c4c70 esp
exec ipsec sa add 5 spi 100005 crypto-alg aes-cbc-128 crypto-key 53726a4a6f74796165556b70624c574c integ-alg sha-512-256 integ-key 616c6b75475a4c624d746567687143634f4d44526e77474e4e52427369624d4979637a56635769466e686147714f544145556e55756a496b75715745746c4c70 esp
exec ipsec tunnel protect ipip5 sa-out 100005 sa-in 5 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.6.1 p2p
exec ipsec sa add 100006 spi 200006 crypto-alg aes-cbc-128 crypto-key 6271686376464e617576626e666f5147 integ-alg sha-512-256 integ-key 4f494a516c7177654750726d41707763696c75436d6a444d54494b654d62554b48416a62464c4f76747555476f4e656c4f7a59577a7664656f5646764a51506c esp
exec ipsec sa add 6 spi 100006 crypto-alg aes-cbc-128 crypto-key 6271686376464e617576626e666f5147 integ-alg sha-512-256 integ-key 4f494a516c7177654750726d41707763696c75436d6a444d54494b654d62554b48416a62464c4f76747555476f4e656c4f7a59577a7664656f5646764a51506c esp
exec ipsec tunnel protect ipip6 sa-out 100006 sa-in 6 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.7.1 p2p
exec ipsec sa add 100007 spi 200007 crypto-alg aes-cbc-128 crypto-key 514b7a6b794778506c4d7a526f4f504f integ-alg sha-512-256 integ-key 477a704253526e5162727570414a47424b674966734f556b46424a67415579457470476556594445525666557870426a724e4d4c70505477696b64506d4c6767 esp
exec ipsec sa add 7 spi 100007 crypto-alg aes-cbc-128 crypto-key 514b7a6b794778506c4d7a526f4f504f integ-alg sha-512-256 integ-key 477a704253526e5162727570414a47424b674966734f556b46424a67415579457470476556594445525666557870426a724e4d4c70505477696b64506d4c6767 esp
exec ipsec tunnel protect ipip7 sa-out 100007 sa-in 7 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.8.1 p2p
exec ipsec sa add 100008 spi 200008 crypto-alg aes-cbc-128 crypto-key 42706c4168564d444e544b75436d5773 integ-alg sha-512-256 integ-key 6e504176684f4d5a7a464f574f47655041496b41415370647444706b55576b6f4c6d70457a484b6d794c664176436378414c696959437a72467669756c635048 esp
exec ipsec sa add 8 spi 100008 crypto-alg aes-cbc-128 crypto-key 42706c4168564d444e544b75436d5773 integ-alg sha-512-256 integ-key 6e504176684f4d5a7a464f574f47655041496b41415370647444706b55576b6f4c6d70457a484b6d794c664176436378414c696959437a72467669756c635048 esp
exec ipsec tunnel protect ipip8 sa-out 100008 sa-in 8 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.9.1 p2p
exec ipsec sa add 100009 spi 200009 crypto-alg aes-cbc-128 crypto-key 4a446766624e514f68544648724a4d75 integ-alg sha-512-256 integ-key 5952516e64555a76466465566b676d4749437a4664524d56684b67524745556d466375444e64666c44437775777478754463596a625567486b6c7154746f4c54 esp
exec ipsec sa add 9 spi 100009 crypto-alg aes-cbc-128 crypto-key 4a446766624e514f68544648724a4d75 integ-alg sha-512-256 integ-key 5952516e64555a76466465566b676d4749437a4664524d56684b67524745556d466375444e64666c44437775777478754463596a625567486b6c7154746f4c54 esp
exec ipsec tunnel protect ipip9 sa-out 100009 sa-in 9 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.10.1 p2p
exec ipsec sa add 100010 spi 200010 crypto-alg aes-cbc-128 crypto-key 56516163417a474c6d67575070484b61 integ-alg sha-512-256 integ-key 52435354566e7771485572524a576c57754e68677a62635556556b546f6977666b696f7572796d5754506f73464a6759687a566c656f416471524e6d6f6a5567 esp
exec ipsec sa add 10 spi 100010 crypto-alg aes-cbc-128 crypto-key 56516163417a474c6d67575070484b61 integ-alg sha-512-256 integ-key 52435354566e7771485572524a576c57754e68677a62635556556b546f6977666b696f7572796d5754506f73464a6759687a566c656f416471524e6d6f6a5567 esp
exec ipsec tunnel protect ipip10 sa-out 100010 sa-in 10 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.11.1 p2p
exec ipsec sa add 100011 spi 200011 crypto-alg aes-cbc-128 crypto-key 4c4d65587a79616b755151796159664e integ-alg sha-512-256 integ-key 5267416d4a635966487a526856715778566253486c774c556b7475705662745942415a4977757062585867686a67476f6d5056616545464272684a57586c6d7a esp
exec ipsec sa add 11 spi 100011 crypto-alg aes-cbc-128 crypto-key 4c4d65587a79616b755151796159664e integ-alg sha-512-256 integ-key 5267416d4a635966487a526856715778566253486c774c556b7475705662745942415a4977757062585867686a67476f6d5056616545464272684a57586c6d7a esp
exec ipsec tunnel protect ipip11 sa-out 100011 sa-in 11 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.12.1 p2p
exec ipsec sa add 100012 spi 200012 crypto-alg aes-cbc-128 crypto-key 655272786a477759757a525a51707365 integ-alg sha-512-256 integ-key 4f6376635553505a6f526c684f7064754e5851564e5458686f6151796f624d4c4b537a5173496d6b506c435976616e566c6551585665544d6b5851577250726d esp
exec ipsec sa add 12 spi 100012 crypto-alg aes-cbc-128 crypto-key 655272786a477759757a525a51707365 integ-alg sha-512-256 integ-key 4f6376635553505a6f526c684f7064754e5851564e5458686f6151796f624d4c4b537a5173496d6b506c435976616e566c6551585665544d6b5851577250726d esp
exec ipsec tunnel protect ipip12 sa-out 100012 sa-in 12 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.13.1 p2p
exec ipsec sa add 100013 spi 200013 crypto-alg aes-cbc-128 crypto-key 476f505a6e5953685859617567525050 integ-alg sha-512-256 integ-key 6a414f6341444173534764544577546b4f4d754272417a7561754f75415064515179516b7859565167455345434a546665715956436154464474497145456d75 esp
exec ipsec sa add 13 spi 100013 crypto-alg aes-cbc-128 crypto-key 476f505a6e5953685859617567525050 integ-alg sha-512-256 integ-key 6a414f6341444173534764544577546b4f4d754272417a7561754f75415064515179516b7859565167455345434a546665715956436154464474497145456d75 esp
exec ipsec tunnel protect ipip13 sa-out 100013 sa-in 13 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.14.1 p2p
exec ipsec sa add 100014 spi 200014 crypto-alg aes-cbc-128 crypto-key 6b46616147415a505362726c6b724343 integ-alg sha-512-256 integ-key 454468684a6c596f4f6849784a774a634f64797a6253546b684b4a6378754b6e7a746b72714367574774656f784c6e646852797a6b4468667a62757464544571 esp
exec ipsec sa add 14 spi 100014 crypto-alg aes-cbc-128 crypto-key 6b46616147415a505362726c6b724343 integ-alg sha-512-256 integ-key 454468684a6c596f4f6849784a774a634f64797a6253546b684b4a6378754b6e7a746b72714367574774656f784c6e646852797a6b4468667a62757464544571 esp
exec ipsec tunnel protect ipip14 sa-out 100014 sa-in 14 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.15.1 p2p
exec ipsec sa add 100015 spi 200015 crypto-alg aes-cbc-128 crypto-key 4645416b5a73636f6954696a6c484171 integ-alg sha-512-256 integ-key 574a77634949485a446277726b736261516b694b4269516d66736b6c56525369685053487746586c567659616542545766594947656e75634845687569725043 esp
exec ipsec sa add 15 spi 100015 crypto-alg aes-cbc-128 crypto-key 4645416b5a73636f6954696a6c484171 integ-alg sha-512-256 integ-key 574a77634949485a446277726b736261516b694b4269516d66736b6c56525369685053487746586c567659616542545766594947656e75634845687569725043 esp
exec ipsec tunnel protect ipip15 sa-out 100015 sa-in 15 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.16.1 p2p
exec ipsec sa add 100016 spi 200016 crypto-alg aes-cbc-128 crypto-key 6f4e43766459565261466c6a4c6f4852 integ-alg sha-512-256 integ-key 41596b6456597275534d4e425579766f46614364594543766a526c77667956736e5144765a58584f65414758454d41624379774574656378717056467356556c esp
exec ipsec sa add 16 spi 100016 crypto-alg aes-cbc-128 crypto-key 6f4e43766459565261466c6a4c6f4852 integ-alg sha-512-256 integ-key 41596b6456597275534d4e425579766f46614364594543766a526c77667956736e5144765a58584f65414758454d41624379774574656378717056467356556c esp
exec ipsec tunnel protect ipip16 sa-out 100016 sa-in 16 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.17.1 p2p
exec ipsec sa add 100017 spi 200017 crypto-alg aes-cbc-128 crypto-key 5a77566f76646a4c59626d4f46757461 integ-alg sha-512-256 integ-key 5965647253426649424671765a755a7a594977684a41715869457051634b614c626d58546f4d666849644c7079545a4150586f634352656e62746568547a7262 esp
exec ipsec sa add 17 spi 100017 crypto-alg aes-cbc-128 crypto-key 5a77566f76646a4c59626d4f46757461 integ-alg sha-512-256 integ-key 5965647253426649424671765a755a7a594977684a41715869457051634b614c626d58546f4d666849644c7079545a4150586f634352656e62746568547a7262 esp
exec ipsec tunnel protect ipip17 sa-out 100017 sa-in 17 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.18.1 p2p
exec ipsec sa add 100018 spi 200018 crypto-alg aes-cbc-128 crypto-key 63666d524d636c6e67506c4f43665376 integ-alg sha-512-256 integ-key 6c784a614a65526a68545a5071576562465a537746656172796f626572704d4a484e726b4841714d6a65474b524c6275507471706f7855416764457277436252 esp
exec ipsec sa add 18 spi 100018 crypto-alg aes-cbc-128 crypto-key 63666d524d636c6e67506c4f43665376 integ-alg sha-512-256 integ-key 6c784a614a65526a68545a5071576562465a537746656172796f626572704d4a484e726b4841714d6a65474b524c6275507471706f7855416764457277436252 esp
exec ipsec tunnel protect ipip18 sa-out 100018 sa-in 18 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.19.1 p2p
exec ipsec sa add 100019 spi 200019 crypto-alg aes-cbc-128 crypto-key 54564e615a77674174704d43666f4866 integ-alg sha-512-256 integ-key 4658766f4a73465a57445070794e4e62597456625352677a4a6c6c724f587a67565a4f4c766879654e41444563594e7851745a5653706a506149505148666970 esp
exec ipsec sa add 19 spi 100019 crypto-alg aes-cbc-128 crypto-key 54564e615a77674174704d43666f4866 integ-alg sha-512-256 integ-key 4658766f4a73465a57445070794e4e62597456625352677a4a6c6c724f587a67565a4f4c766879654e41444563594e7851745a5653706a506149505148666970 esp
exec ipsec tunnel protect ipip19 sa-out 100019 sa-in 19 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.20.1 p2p
exec ipsec sa add 100020 spi 200020 crypto-alg aes-cbc-128 crypto-key 724e7475447356437159515146574845 integ-alg sha-512-256 integ-key 466878614848756e425a685a7964416e4472696f577a754c616e565344534f71444d7252794545774f486d475745786449544e49714f674c53765a526e507678 esp
exec ipsec sa add 20 spi 100020 crypto-alg aes-cbc-128 crypto-key 724e7475447356437159515146574845 integ-alg sha-512-256 integ-key 466878614848756e425a685a7964416e4472696f577a754c616e565344534f71444d7252794545774f486d475745786449544e49714f674c53765a526e507678 esp
exec ipsec tunnel protect ipip20 sa-out 100020 sa-in 20 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.21.1 p2p
exec ipsec sa add 100021 spi 200021 crypto-alg aes-cbc-128 crypto-key 456f686365707465757554665a686246 integ-alg sha-512-256 integ-key 6a64554b636266706a57694f67494271576c51497464486a434c536b57686c6c504c4a4b5a6950616a6c556265615448684e72414b427178496d536e4962654c esp
exec ipsec sa add 21 spi 100021 crypto-alg aes-cbc-128 crypto-key 456f686365707465757554665a686246 integ-alg sha-512-256 integ-key 6a64554b636266706a57694f67494271576c51497464486a434c536b57686c6c504c4a4b5a6950616a6c556265615448684e72414b427178496d536e4962654c esp
exec ipsec tunnel protect ipip21 sa-out 100021 sa-in 21 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.22.1 p2p
exec ipsec sa add 100022 spi 200022 crypto-alg aes-cbc-128 crypto-key 69715851456b6a4a71676d6756566948 integ-alg sha-512-256 integ-key 4953486273444854594c4345634e506a535a577443546b695265646c716158464c64665652514543687a6965774369516e716c4671696e6c6d534442616e7349 esp
exec ipsec sa add 22 spi 100022 crypto-alg aes-cbc-128 crypto-key 69715851456b6a4a71676d6756566948 integ-alg sha-512-256 integ-key 4953486273444854594c4345634e506a535a577443546b695265646c716158464c64665652514543687a6965774369516e716c4671696e6c6d534442616e7349 esp
exec ipsec tunnel protect ipip22 sa-out 100022 sa-in 22 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.23.1 p2p
exec ipsec sa add 100023 spi 200023 crypto-alg aes-cbc-128 crypto-key 5a61566f48726b484e684c656c436972 integ-alg sha-512-256 integ-key 684e4f5658466b6a7062616e747279446e6b686d6e477341506c4556595658726b74476556426943556944674b6b65746848737956674f707674746c7a66415a esp
exec ipsec sa add 23 spi 100023 crypto-alg aes-cbc-128 crypto-key 5a61566f48726b484e684c656c436972 integ-alg sha-512-256 integ-key 684e4f5658466b6a7062616e747279446e6b686d6e477341506c4556595658726b74476556426943556944674b6b65746848737956674f707674746c7a66415a esp
exec ipsec tunnel protect ipip23 sa-out 100023 sa-in 23 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.24.1 p2p
exec ipsec sa add 100024 spi 200024 crypto-alg aes-cbc-128 crypto-key 49756f70694a686b71457a7469665758 integ-alg sha-512-256 integ-key 4d64724e624c53676e696c6c725a58614a46554a6458706d71447575496d6e4564616c426d57624f6b4b6e41554d437a587975476572784e694947466b776250 esp
exec ipsec sa add 24 spi 100024 crypto-alg aes-cbc-128 crypto-key 49756f70694a686b71457a7469665758 integ-alg sha-512-256 integ-key 4d64724e624c53676e696c6c725a58614a46554a6458706d71447575496d6e4564616c426d57624f6b4b6e41554d437a587975476572784e694947466b776250 esp
exec ipsec tunnel protect ipip24 sa-out 100024 sa-in 24 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.25.1 p2p
exec ipsec sa add 100025 spi 200025 crypto-alg aes-cbc-128 crypto-key 69566b744a516b54446b686142674d46 integ-alg sha-512-256 integ-key 687464566375507753546b6d4d5669755764556a5a734b756c50416878574e534152687768495355695763507453694d5745696a45546a6757636843655a5366 esp
exec ipsec sa add 25 spi 100025 crypto-alg aes-cbc-128 crypto-key 69566b744a516b54446b686142674d46 integ-alg sha-512-256 integ-key 687464566375507753546b6d4d5669755764556a5a734b756c50416878574e534152687768495355695763507453694d5745696a45546a6757636843655a5366 esp
exec ipsec tunnel protect ipip25 sa-out 100025 sa-in 25 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.26.1 p2p
exec ipsec sa add 100026 spi 200026 crypto-alg aes-cbc-128 crypto-key 5a7a675a564e6c704e6a4a68676b4f6a integ-alg sha-512-256 integ-key 49686b614d6c6a514d76565a6f49754a426f5a6c4a596c7363654557474e544d4254596154557769784d5a6b4d5978627a75567068664356534f584b4a76736a esp
exec ipsec sa add 26 spi 100026 crypto-alg aes-cbc-128 crypto-key 5a7a675a564e6c704e6a4a68676b4f6a integ-alg sha-512-256 integ-key 49686b614d6c6a514d76565a6f49754a426f5a6c4a596c7363654557474e544d4254596154557769784d5a6b4d5978627a75567068664356534f584b4a76736a esp
exec ipsec tunnel protect ipip26 sa-out 100026 sa-in 26 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.27.1 p2p
exec ipsec sa add 100027 spi 200027 crypto-alg aes-cbc-128 crypto-key 57426d51627a41666a6d4b666b4d6c59 integ-alg sha-512-256 integ-key 4b477a544c53516e696b676e7353724555557049435a744d5467696f6f686f646155424e546d4e49504e6c7a574f6668725861646a467877646e677242596f71 esp
exec ipsec sa add 27 spi 100027 crypto-alg aes-cbc-128 crypto-key 57426d51627a41666a6d4b666b4d6c59 integ-alg sha-512-256 integ-key 4b477a544c53516e696b676e7353724555557049435a744d5467696f6f686f646155424e546d4e49504e6c7a574f6668725861646a467877646e677242596f71 esp
exec ipsec tunnel protect ipip27 sa-out 100027 sa-in 27 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.28.1 p2p
exec ipsec sa add 100028 spi 200028 crypto-alg aes-cbc-128 crypto-key 7054486b6a4e48574d4f674865764e6c integ-alg sha-512-256 integ-key 6255716f51434249506d735570586241595858426f584258505752594176706f6e59444a5545794962485a77766851774b6c724369746b787169556e7a717461 esp
exec ipsec sa add 28 spi 100028 crypto-alg aes-cbc-128 crypto-key 7054486b6a4e48574d4f674865764e6c integ-alg sha-512-256 integ-key 6255716f51434249506d735570586241595858426f584258505752594176706f6e59444a5545794962485a77766851774b6c724369746b787169556e7a717461 esp
exec ipsec tunnel protect ipip28 sa-out 100028 sa-in 28 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.29.1 p2p
exec ipsec sa add 100029 spi 200029 crypto-alg aes-cbc-128 crypto-key 5a586a41476265776f48744f4d58474b integ-alg sha-512-256 integ-key 644e4a78486f485444536376787462747647786e66417a4f4b516e4b494a65696951736f67657451504a5258747055627571624656485448665a594f5a714548 esp
exec ipsec sa add 29 spi 100029 crypto-alg aes-cbc-128 crypto-key 5a586a41476265776f48744f4d58474b integ-alg sha-512-256 integ-key 644e4a78486f485444536376787462747647786e66417a4f4b516e4b494a65696951736f67657451504a5258747055627571624656485448665a594f5a714548 esp
exec ipsec tunnel protect ipip29 sa-out 100029 sa-in 29 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.30.1 p2p
exec ipsec sa add 100030 spi 200030 crypto-alg aes-cbc-128 crypto-key 7363676673776b48416e55734b586e71 integ-alg sha-512-256 integ-key 634c6374595a6b4a4d7964497074586a4a576d786a4f44447141596f6d4845485a4e7a544366766d5a4a7054724875426c627277734f4248794e68636d585a49 esp
exec ipsec sa add 30 spi 100030 crypto-alg aes-cbc-128 crypto-key 7363676673776b48416e55734b586e71 integ-alg sha-512-256 integ-key 634c6374595a6b4a4d7964497074586a4a576d786a4f44447141596f6d4845485a4e7a544366766d5a4a7054724875426c627277734f4248794e68636d585a49 esp
exec ipsec tunnel protect ipip30 sa-out 100030 sa-in 30 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.31.1 p2p
exec ipsec sa add 100031 spi 200031 crypto-alg aes-cbc-128 crypto-key 704f4f436472625077615041687a4246 integ-alg sha-512-256 integ-key 695655624368445a6472536c6768776372786c4f6e644a564c4f6d6e6762577170656865574852746c6c41644c4b6154786a4b4c686245654d49774272446b6a esp
exec ipsec sa add 31 spi 100031 crypto-alg aes-cbc-128 crypto-key 704f4f436472625077615041687a4246 integ-alg sha-512-256 integ-key 695655624368445a6472536c6768776372786c4f6e644a564c4f6d6e6762577170656865574852746c6c41644c4b6154786a4b4c686245654d49774272446b6a esp
exec ipsec tunnel protect ipip31 sa-out 100031 sa-in 31 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.32.1 p2p
exec ipsec sa add 100032 spi 200032 crypto-alg aes-cbc-128 crypto-key 53776d7a4e4e69697753576147545344 integ-alg sha-512-256 integ-key 67564a67456c6d646b7976484b7774645a426a4856705a53514c626958544e5166465a577073594846736b616e5059554a42436c6c4d7948776c734d7246425a esp
exec ipsec sa add 32 spi 100032 crypto-alg aes-cbc-128 crypto-key 53776d7a4e4e69697753576147545344 integ-alg sha-512-256 integ-key 67564a67456c6d646b7976484b7774645a426a4856705a53514c626958544e5166465a577073594846736b616e5059554a42436c6c4d7948776c734d7246425a esp
exec ipsec tunnel protect ipip32 sa-out 100032 sa-in 32 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.33.1 p2p
exec ipsec sa add 100033 spi 200033 crypto-alg aes-cbc-128 crypto-key 4e6b6168415665585a68795556444f64 integ-alg sha-512-256 integ-key 514f786b7165437a4d4467664b6b6861745a565568455a7075467277706f6a414b6876754e4858434d6b447a6d71616e724e4f57786a4474454a554c49764453 esp
exec ipsec sa add 33 spi 100033 crypto-alg aes-cbc-128 crypto-key 4e6b6168415665585a68795556444f64 integ-alg sha-512-256 integ-key 514f786b7165437a4d4467664b6b6861745a565568455a7075467277706f6a414b6876754e4858434d6b447a6d71616e724e4f57786a4474454a554c49764453 esp
exec ipsec tunnel protect ipip33 sa-out 100033 sa-in 33 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.34.1 p2p
exec ipsec sa add 100034 spi 200034 crypto-alg aes-cbc-128 crypto-key 4b65626e63785a574b6176476e475a66 integ-alg sha-512-256 integ-key 49616571705154644666514c57656177767567744e707a6a4f56434c61746f454c4a6b495349434a75524c6362634c4d4e554d617a4c6350515861496a714e71 esp
exec ipsec sa add 34 spi 100034 crypto-alg aes-cbc-128 crypto-key 4b65626e63785a574b6176476e475a66 integ-alg sha-512-256 integ-key 49616571705154644666514c57656177767567744e707a6a4f56434c61746f454c4a6b495349434a75524c6362634c4d4e554d617a4c6350515861496a714e71 esp
exec ipsec tunnel protect ipip34 sa-out 100034 sa-in 34 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.35.1 p2p
exec ipsec sa add 100035 spi 200035 crypto-alg aes-cbc-128 crypto-key 447a5751565a4e637675724578576772 integ-alg sha-512-256 integ-key 456867454a706352714a426349415874684a4647514b76414953526e496347554a7877466e4151786a5266586544466b5a526f4e50416f446857596a4a4d4f57 esp
exec ipsec sa add 35 spi 100035 crypto-alg aes-cbc-128 crypto-key 447a5751565a4e637675724578576772 integ-alg sha-512-256 integ-key 456867454a706352714a426349415874684a4647514b76414953526e496347554a7877466e4151786a5266586544466b5a526f4e50416f446857596a4a4d4f57 esp
exec ipsec tunnel protect ipip35 sa-out 100035 sa-in 35 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.36.1 p2p
exec ipsec sa add 100036 spi 200036 crypto-alg aes-cbc-128 crypto-key 42427278614756794649494b4c4d5263 integ-alg sha-512-256 integ-key 7765536c6a474f42745152414e774f506b6d6a7159704767776d68454b5956535964595143644c4159746d577367667a6d58414f746261627071757a6970706b esp
exec ipsec sa add 36 spi 100036 crypto-alg aes-cbc-128 crypto-key 42427278614756794649494b4c4d5263 integ-alg sha-512-256 integ-key 7765536c6a474f42745152414e774f506b6d6a7159704767776d68454b5956535964595143644c4159746d577367667a6d58414f746261627071757a6970706b esp
exec ipsec tunnel protect ipip36 sa-out 100036 sa-in 36 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.37.1 p2p
exec ipsec sa add 100037 spi 200037 crypto-alg aes-cbc-128 crypto-key 54715979486646566a427374434f4d78 integ-alg sha-512-256 integ-key 734455456b597869587049486d6c7a645a4148764e6979636f6e45496943697243485a6a61586e536f44496673475471566a4e4376637455785a674665556c6f esp
exec ipsec sa add 37 spi 100037 crypto-alg aes-cbc-128 crypto-key 54715979486646566a427374434f4d78 integ-alg sha-512-256 integ-key 734455456b597869587049486d6c7a645a4148764e6979636f6e45496943697243485a6a61586e536f44496673475471566a4e4376637455785a674665556c6f esp
exec ipsec tunnel protect ipip37 sa-out 100037 sa-in 37 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.38.1 p2p
exec ipsec sa add 100038 spi 200038 crypto-alg aes-cbc-128 crypto-key 6d564571667151644c6b646f584d624f integ-alg sha-512-256 integ-key 6b4b697a566d4f544b6a6374476f7277696c414843547944584d59564a6a76415a7567535a79697a70726163537570726d67417274475249716c736c594d5673 esp
exec ipsec sa add 38 spi 100038 crypto-alg aes-cbc-128 crypto-key 6d564571667151644c6b646f584d624f integ-alg sha-512-256 integ-key 6b4b697a566d4f544b6a6374476f7277696c414843547944584d59564a6a76415a7567535a79697a70726163537570726d67417274475249716c736c594d5673 esp
exec ipsec tunnel protect ipip38 sa-out 100038 sa-in 38 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.39.1 p2p
exec ipsec sa add 100039 spi 200039 crypto-alg aes-cbc-128 crypto-key 556c64764e6c78786a59425256514a75 integ-alg sha-512-256 integ-key 656c7673425052514d4b4275444b4a48614d6472487352576e425941494c774178794e4759576c566851736f444f7876634c5162504954746176474f656e6a73 esp
exec ipsec sa add 39 spi 100039 crypto-alg aes-cbc-128 crypto-key 556c64764e6c78786a59425256514a75 integ-alg sha-512-256 integ-key 656c7673425052514d4b4275444b4a48614d6472487352576e425941494c774178794e4759576c566851736f444f7876634c5162504954746176474f656e6a73 esp
exec ipsec tunnel protect ipip39 sa-out 100039 sa-in 39 add
exec ip route add 100.0.0.1/8 via 200.0.0.101 TenGigabitEthernet8/0/0
exec set interface unnumbered ipip0 use TenGigabitEthernet8/0/0
exec set interface state ipip0 up
exec ip route add 10.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use TenGigabitEthernet8/0/0
exec set interface state ipip1 up
exec ip route add 10.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use TenGigabitEthernet8/0/0
exec set interface state ipip2 up
exec ip route add 10.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use TenGigabitEthernet8/0/0
exec set interface state ipip3 up
exec ip route add 10.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use TenGigabitEthernet8/0/0
exec set interface state ipip4 up
exec ip route add 10.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use TenGigabitEthernet8/0/0
exec set interface state ipip5 up
exec ip route add 10.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use TenGigabitEthernet8/0/0
exec set interface state ipip6 up
exec ip route add 10.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use TenGigabitEthernet8/0/0
exec set interface state ipip7 up
exec ip route add 10.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use TenGigabitEthernet8/0/0
exec set interface state ipip8 up
exec ip route add 10.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use TenGigabitEthernet8/0/0
exec set interface state ipip9 up
exec ip route add 10.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use TenGigabitEthernet8/0/0
exec set interface state ipip10 up
exec ip route add 10.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use TenGigabitEthernet8/0/0
exec set interface state ipip11 up
exec ip route add 10.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use TenGigabitEthernet8/0/0
exec set interface state ipip12 up
exec ip route add 10.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use TenGigabitEthernet8/0/0
exec set interface state ipip13 up
exec ip route add 10.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use TenGigabitEthernet8/0/0
exec set interface state ipip14 up
exec ip route add 10.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use TenGigabitEthernet8/0/0
exec set interface state ipip15 up
exec ip route add 10.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use TenGigabitEthernet8/0/0
exec set interface state ipip16 up
exec ip route add 10.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use TenGigabitEthernet8/0/0
exec set interface state ipip17 up
exec ip route add 10.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use TenGigabitEthernet8/0/0
exec set interface state ipip18 up
exec ip route add 10.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use TenGigabitEthernet8/0/0
exec set interface state ipip19 up
exec ip route add 10.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use TenGigabitEthernet8/0/0
exec set interface state ipip20 up
exec ip route add 10.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use TenGigabitEthernet8/0/0
exec set interface state ipip21 up
exec ip route add 10.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use TenGigabitEthernet8/0/0
exec set interface state ipip22 up
exec ip route add 10.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use TenGigabitEthernet8/0/0
exec set interface state ipip23 up
exec ip route add 10.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use TenGigabitEthernet8/0/0
exec set interface state ipip24 up
exec ip route add 10.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use TenGigabitEthernet8/0/0
exec set interface state ipip25 up
exec ip route add 10.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use TenGigabitEthernet8/0/0
exec set interface state ipip26 up
exec ip route add 10.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use TenGigabitEthernet8/0/0
exec set interface state ipip27 up
exec ip route add 10.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use TenGigabitEthernet8/0/0
exec set interface state ipip28 up
exec ip route add 10.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use TenGigabitEthernet8/0/0
exec set interface state ipip29 up
exec ip route add 10.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use TenGigabitEthernet8/0/0
exec set interface state ipip30 up
exec ip route add 10.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use TenGigabitEthernet8/0/0
exec set interface state ipip31 up
exec ip route add 10.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use TenGigabitEthernet8/0/0
exec set interface state ipip32 up
exec ip route add 10.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use TenGigabitEthernet8/0/0
exec set interface state ipip33 up
exec ip route add 10.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use TenGigabitEthernet8/0/0
exec set interface state ipip34 up
exec ip route add 10.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use TenGigabitEthernet8/0/0
exec set interface state ipip35 up
exec ip route add 10.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use TenGigabitEthernet8/0/0
exec set interface state ipip36 up
exec ip route add 10.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use TenGigabitEthernet8/0/0
exec set interface state ipip37 up
exec ip route add 10.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use TenGigabitEthernet8/0/0
exec set interface state ipip38 up
exec ip route add 10.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use TenGigabitEthernet8/0/0
exec set interface state ipip39 up
exec ip route add 10.0.0.39/32 via ipip39

 imix-1t1c-ethip4ipsec40tnlsw-ip4base- 
int-aes128cbc-hmac512sha-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec set interface ip address TenGigabitEthernet8/0/0 200.0.0.102/24.0
exec create ipip tunnel src 200.0.0.102 dst 100.0.0.1 p2p
exec ipsec sa add 100000 spi 200000 crypto-alg aes-cbc-128 crypto-key 4e5a6e5874546346415472584d454677 integ-alg sha-512-256 integ-key 635475594e634f484853586d76666279787149674149576b6a48786f756f415a61495379655a6b4b634d734942584f516c775045767463514f6b4d73644f6e50 esp
exec ipsec sa add 0 spi 100000 crypto-alg aes-cbc-128 crypto-key 4e5a6e5874546346415472584d454677 integ-alg sha-512-256 integ-key 635475594e634f484853586d76666279787149674149576b6a48786f756f415a61495379655a6b4b634d734942584f516c775045767463514f6b4d73644f6e50 esp
exec ipsec tunnel protect ipip0 sa-out 100000 sa-in 0 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.1.1 p2p
exec ipsec sa add 100001 spi 200001 crypto-alg aes-cbc-128 crypto-key 61454648566e767a416a726c52457377 integ-alg sha-512-256 integ-key 66446b6e7564544155456b6871684c5a5265484f70634767655a63436277437869455375757a6549464d4f415772706368426c5076766e416952667348464e65 esp
exec ipsec sa add 1 spi 100001 crypto-alg aes-cbc-128 crypto-key 61454648566e767a416a726c52457377 integ-alg sha-512-256 integ-key 66446b6e7564544155456b6871684c5a5265484f70634767655a63436277437869455375757a6549464d4f415772706368426c5076766e416952667348464e65 esp
exec ipsec tunnel protect ipip1 sa-out 100001 sa-in 1 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.2.1 p2p
exec ipsec sa add 100002 spi 200002 crypto-alg aes-cbc-128 crypto-key 4951414b704b4b496f737777774e716e integ-alg sha-512-256 integ-key 556d734f4950466350624a656e52676a655a685148784267746d6d69627749546b516f4b51656d4a50565948477075444352746c7056476f4677767068517857 esp
exec ipsec sa add 2 spi 100002 crypto-alg aes-cbc-128 crypto-key 4951414b704b4b496f737777774e716e integ-alg sha-512-256 integ-key 556d734f4950466350624a656e52676a655a685148784267746d6d69627749546b516f4b51656d4a50565948477075444352746c7056476f4677767068517857 esp
exec ipsec tunnel protect ipip2 sa-out 100002 sa-in 2 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.3.1 p2p
exec ipsec sa add 100003 spi 200003 crypto-alg aes-cbc-128 crypto-key 65534b4a4859745068556d7767727546 integ-alg sha-512-256 integ-key 586f7a6c576467676647564a4b48634a5152644d6d78646d416e5a4b425a47727370656b53685741515379515a777a58765679656a6c68456151544a55425645 esp
exec ipsec sa add 3 spi 100003 crypto-alg aes-cbc-128 crypto-key 65534b4a4859745068556d7767727546 integ-alg sha-512-256 integ-key 586f7a6c576467676647564a4b48634a5152644d6d78646d416e5a4b425a47727370656b53685741515379515a777a58765679656a6c68456151544a55425645 esp
exec ipsec tunnel protect ipip3 sa-out 100003 sa-in 3 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.4.1 p2p
exec ipsec sa add 100004 spi 200004 crypto-alg aes-cbc-128 crypto-key 4a74514871486e4b7447456d4f4e5950 integ-alg sha-512-256 integ-key 67507a646964586c574a5572706765464a59716165794d65414157594478646d7a4c57456b587069494c6f4c4d69556b53516278727477646d50664c4d6d7953 esp
exec ipsec sa add 4 spi 100004 crypto-alg aes-cbc-128 crypto-key 4a74514871486e4b7447456d4f4e5950 integ-alg sha-512-256 integ-key 67507a646964586c574a5572706765464a59716165794d65414157594478646d7a4c57456b587069494c6f4c4d69556b53516278727477646d50664c4d6d7953 esp
exec ipsec tunnel protect ipip4 sa-out 100004 sa-in 4 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.5.1 p2p
exec ipsec sa add 100005 spi 200005 crypto-alg aes-cbc-128 crypto-key 555872504c6848546a4954586c775955 integ-alg sha-512-256 integ-key 626e754368674977594d46734d68435a6f4e6c5465784b486a7263756b546c6a7962487252456b587653706e7463416b7459755142584e4d6841634c7356666f esp
exec ipsec sa add 5 spi 100005 crypto-alg aes-cbc-128 crypto-key 555872504c6848546a4954586c775955 integ-alg sha-512-256 integ-key 626e754368674977594d46734d68435a6f4e6c5465784b486a7263756b546c6a7962487252456b587653706e7463416b7459755142584e4d6841634c7356666f esp
exec ipsec tunnel protect ipip5 sa-out 100005 sa-in 5 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.6.1 p2p
exec ipsec sa add 100006 spi 200006 crypto-alg aes-cbc-128 crypto-key 4f65736a4d774a486c5562444d7a4d51 integ-alg sha-512-256 integ-key 6547526d51474449797457635555576778767a6b786743477a6e5649586c7349794e59515767687869536d6b61616447565046484f6b76546673795241494a47 esp
exec ipsec sa add 6 spi 100006 crypto-alg aes-cbc-128 crypto-key 4f65736a4d774a486c5562444d7a4d51 integ-alg sha-512-256 integ-key 6547526d51474449797457635555576778767a6b786743477a6e5649586c7349794e59515767687869536d6b61616447565046484f6b76546673795241494a47 esp
exec ipsec tunnel protect ipip6 sa-out 100006 sa-in 6 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.7.1 p2p
exec ipsec sa add 100007 spi 200007 crypto-alg aes-cbc-128 crypto-key 7441596a654546544d7579444f727245 integ-alg sha-512-256 integ-key 58494c745951454b5873625754654e58596a697a616663524950764f684975514355537a4c72647669575368774a51475651626c46776b5a486b537a4d557758 esp
exec ipsec sa add 7 spi 100007 crypto-alg aes-cbc-128 crypto-key 7441596a654546544d7579444f727245 integ-alg sha-512-256 integ-key 58494c745951454b5873625754654e58596a697a616663524950764f684975514355537a4c72647669575368774a51475651626c46776b5a486b537a4d557758 esp
exec ipsec tunnel protect ipip7 sa-out 100007 sa-in 7 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.8.1 p2p
exec ipsec sa add 100008 spi 200008 crypto-alg aes-cbc-128 crypto-key 6849656c6f4a7a425552696462426a64 integ-alg sha-512-256 integ-key 576c6f5962624e6c577554717452746e76726f684651496c676b4e475575565170586c5865496d435572757156447a5244505759717951564173696c49777242 esp
exec ipsec sa add 8 spi 100008 crypto-alg aes-cbc-128 crypto-key 6849656c6f4a7a425552696462426a64 integ-alg sha-512-256 integ-key 576c6f5962624e6c577554717452746e76726f684651496c676b4e475575565170586c5865496d435572757156447a5244505759717951564173696c49777242 esp
exec ipsec tunnel protect ipip8 sa-out 100008 sa-in 8 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.9.1 p2p
exec ipsec sa add 100009 spi 200009 crypto-alg aes-cbc-128 crypto-key 5365477a6b6c57555144517664414776 integ-alg sha-512-256 integ-key 43566d536348424a4262634b48686e4a4e42714778746941656e4a56476a50614d5744577563526b496473794261415479705667796d4b4e5257656f57496d4e esp
exec ipsec sa add 9 spi 100009 crypto-alg aes-cbc-128 crypto-key 5365477a6b6c57555144517664414776 integ-alg sha-512-256 integ-key 43566d536348424a4262634b48686e4a4e42714778746941656e4a56476a50614d5744577563526b496473794261415479705667796d4b4e5257656f57496d4e esp
exec ipsec tunnel protect ipip9 sa-out 100009 sa-in 9 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.10.1 p2p
exec ipsec sa add 100010 spi 200010 crypto-alg aes-cbc-128 crypto-key 424b4d5174626952764b737154717143 integ-alg sha-512-256 integ-key 6361524a4653576856764372636c62754f6f474f70574f44664a4d616c74506955555a574a626450554b6846566d6f476e796943517376644847635577575a79 esp
exec ipsec sa add 10 spi 100010 crypto-alg aes-cbc-128 crypto-key 424b4d5174626952764b737154717143 integ-alg sha-512-256 integ-key 6361524a4653576856764372636c62754f6f474f70574f44664a4d616c74506955555a574a626450554b6846566d6f476e796943517376644847635577575a79 esp
exec ipsec tunnel protect ipip10 sa-out 100010 sa-in 10 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.11.1 p2p
exec ipsec sa add 100011 spi 200011 crypto-alg aes-cbc-128 crypto-key 4e44786a53556c59414a79716a426866 integ-alg sha-512-256 integ-key 585543507147787a6b6957457177504950795a536e4a43504b78535846446c7a7171434f49596d5764746c425772455a466972565153594d4257775544754377 esp
exec ipsec sa add 11 spi 100011 crypto-alg aes-cbc-128 crypto-key 4e44786a53556c59414a79716a426866 integ-alg sha-512-256 integ-key 585543507147787a6b6957457177504950795a536e4a43504b78535846446c7a7171434f49596d5764746c425772455a466972565153594d4257775544754377 esp
exec ipsec tunnel protect ipip11 sa-out 100011 sa-in 11 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.12.1 p2p
exec ipsec sa add 100012 spi 200012 crypto-alg aes-cbc-128 crypto-key 744c6c64766b7a4d764f5176524c6e79 integ-alg sha-512-256 integ-key 74736b5671536e446571484b5269454d7851674a704c6f584478694a72546a554d76756e6b4b6956596f5365484c6d7378745477555968484f536d6f6a777864 esp
exec ipsec sa add 12 spi 100012 crypto-alg aes-cbc-128 crypto-key 744c6c64766b7a4d764f5176524c6e79 integ-alg sha-512-256 integ-key 74736b5671536e446571484b5269454d7851674a704c6f584478694a72546a554d76756e6b4b6956596f5365484c6d7378745477555968484f536d6f6a777864 esp
exec ipsec tunnel protect ipip12 sa-out 100012 sa-in 12 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.13.1 p2p
exec ipsec sa add 100013 spi 200013 crypto-alg aes-cbc-128 crypto-key 544549514258786c516a6572505a446a integ-alg sha-512-256 integ-key 42646f4f67505067554a496f6e504c77444c435a6b41784c514447494b4646485a4b444d6f526f657a54675763444a705669545070747878694d636d43757848 esp
exec ipsec sa add 13 spi 100013 crypto-alg aes-cbc-128 crypto-key 544549514258786c516a6572505a446a integ-alg sha-512-256 integ-key 42646f4f67505067554a496f6e504c77444c435a6b41784c514447494b4646485a4b444d6f526f657a54675763444a705669545070747878694d636d43757848 esp
exec ipsec tunnel protect ipip13 sa-out 100013 sa-in 13 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.14.1 p2p
exec ipsec sa add 100014 spi 200014 crypto-alg aes-cbc-128 crypto-key 4b6a6472664d487046716d497545536f integ-alg sha-512-256 integ-key 57734f4f576d77454e4752687062736658674c67756c5971594e4b45624f6d6e624341746e4a465a6b4c566475484d6153444b785558487872574f69596b616c esp
exec ipsec sa add 14 spi 100014 crypto-alg aes-cbc-128 crypto-key 4b6a6472664d487046716d497545536f integ-alg sha-512-256 integ-key 57734f4f576d77454e4752687062736658674c67756c5971594e4b45624f6d6e624341746e4a465a6b4c566475484d6153444b785558487872574f69596b616c esp
exec ipsec tunnel protect ipip14 sa-out 100014 sa-in 14 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.15.1 p2p
exec ipsec sa add 100015 spi 200015 crypto-alg aes-cbc-128 crypto-key 59585372464a67707a6647764a575a66 integ-alg sha-512-256 integ-key 694673636e73426a4f41656455566164486e70477862536677417873617855654b614d6a6c68486b727143675547434a6651707748714769644b6e7668766b47 esp
exec ipsec sa add 15 spi 100015 crypto-alg aes-cbc-128 crypto-key 59585372464a67707a6647764a575a66 integ-alg sha-512-256 integ-key 694673636e73426a4f41656455566164486e70477862536677417873617855654b614d6a6c68486b727143675547434a6651707748714769644b6e7668766b47 esp
exec ipsec tunnel protect ipip15 sa-out 100015 sa-in 15 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.16.1 p2p
exec ipsec sa add 100016 spi 200016 crypto-alg aes-cbc-128 crypto-key 506a426c704e6b42514b5277506e754b integ-alg sha-512-256 integ-key 6a627345515953697641475a44476c7a4a7455575a714d4641496c5372614d576875637861566d734379484b434d56476f794550444c7473444374414b505a6a esp
exec ipsec sa add 16 spi 100016 crypto-alg aes-cbc-128 crypto-key 506a426c704e6b42514b5277506e754b integ-alg sha-512-256 integ-key 6a627345515953697641475a44476c7a4a7455575a714d4641496c5372614d576875637861566d734379484b434d56476f794550444c7473444374414b505a6a esp
exec ipsec tunnel protect ipip16 sa-out 100016 sa-in 16 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.17.1 p2p
exec ipsec sa add 100017 spi 200017 crypto-alg aes-cbc-128 crypto-key 6742434f7a5a7942456c566770747456 integ-alg sha-512-256 integ-key 79535a66616e66644443786c456f634f6d666f43507263536b47654b544944595876437a6a76675477515771694579466a4458445164784c4e6b4a446e664b74 esp
exec ipsec sa add 17 spi 100017 crypto-alg aes-cbc-128 crypto-key 6742434f7a5a7942456c566770747456 integ-alg sha-512-256 integ-key 79535a66616e66644443786c456f634f6d666f43507263536b47654b544944595876437a6a76675477515771694579466a4458445164784c4e6b4a446e664b74 esp
exec ipsec tunnel protect ipip17 sa-out 100017 sa-in 17 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.18.1 p2p
exec ipsec sa add 100018 spi 200018 crypto-alg aes-cbc-128 crypto-key 626b44666a55777a4364566245726e67 integ-alg sha-512-256 integ-key 616e716d744f4875556e704277447a4d7973645258694c675a4f5a4c6455656b706c46696c6a77774e664a4b4d45665475734f71484771466c764b71514b5652 esp
exec ipsec sa add 18 spi 100018 crypto-alg aes-cbc-128 crypto-key 626b44666a55777a4364566245726e67 integ-alg sha-512-256 integ-key 616e716d744f4875556e704277447a4d7973645258694c675a4f5a4c6455656b706c46696c6a77774e664a4b4d45665475734f71484771466c764b71514b5652 esp
exec ipsec tunnel protect ipip18 sa-out 100018 sa-in 18 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.19.1 p2p
exec ipsec sa add 100019 spi 200019 crypto-alg aes-cbc-128 crypto-key 657a78735676726d546f436455746661 integ-alg sha-512-256 integ-key 75746b724565766252696554514758534c654e6c6c434179687977474f5a794c754c6b4b52534f536341466d4b616678465170696e6e514b49454d526a517741 esp
exec ipsec sa add 19 spi 100019 crypto-alg aes-cbc-128 crypto-key 657a78735676726d546f436455746661 integ-alg sha-512-256 integ-key 75746b724565766252696554514758534c654e6c6c434179687977474f5a794c754c6b4b52534f536341466d4b616678465170696e6e514b49454d526a517741 esp
exec ipsec tunnel protect ipip19 sa-out 100019 sa-in 19 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.20.1 p2p
exec ipsec sa add 100020 spi 200020 crypto-alg aes-cbc-128 crypto-key 4c6f79714d625177616c6e637a76456b integ-alg sha-512-256 integ-key 6e55694d51724866646e51507864796a47587154696845494b4a47506268516a666f6b4441504243414f67646b665642527262524d444a77726d57436e43566f esp
exec ipsec sa add 20 spi 100020 crypto-alg aes-cbc-128 crypto-key 4c6f79714d625177616c6e637a76456b integ-alg sha-512-256 integ-key 6e55694d51724866646e51507864796a47587154696845494b4a47506268516a666f6b4441504243414f67646b665642527262524d444a77726d57436e43566f esp
exec ipsec tunnel protect ipip20 sa-out 100020 sa-in 20 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.21.1 p2p
exec ipsec sa add 100021 spi 200021 crypto-alg aes-cbc-128 crypto-key 457a4e594a53514765757057466d4163 integ-alg sha-512-256 integ-key 6b415a526f515a64677447726276696e666c6358734f6b794c7a4154594c67574771657371415a584546774e537a694b706c4f796d5664564a494f676f657744 esp
exec ipsec sa add 21 spi 100021 crypto-alg aes-cbc-128 crypto-key 457a4e594a53514765757057466d4163 integ-alg sha-512-256 integ-key 6b415a526f515a64677447726276696e666c6358734f6b794c7a4154594c67574771657371415a584546774e537a694b706c4f796d5664564a494f676f657744 esp
exec ipsec tunnel protect ipip21 sa-out 100021 sa-in 21 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.22.1 p2p
exec ipsec sa add 100022 spi 200022 crypto-alg aes-cbc-128 crypto-key 74504f7a6f6773566e7259596f69636b integ-alg sha-512-256 integ-key 766b6b4b574a4e5261534252624e724a416f4879496a4b70634c506c56774556756679525863745343684543444a64566f4f4d6768766a626c4155494a4c5877 esp
exec ipsec sa add 22 spi 100022 crypto-alg aes-cbc-128 crypto-key 74504f7a6f6773566e7259596f69636b integ-alg sha-512-256 integ-key 766b6b4b574a4e5261534252624e724a416f4879496a4b70634c506c56774556756679525863745343684543444a64566f4f4d6768766a626c4155494a4c5877 esp
exec ipsec tunnel protect ipip22 sa-out 100022 sa-in 22 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.23.1 p2p
exec ipsec sa add 100023 spi 200023 crypto-alg aes-cbc-128 crypto-key 7476514c45676a4c754676544369636b integ-alg sha-512-256 integ-key 574f4c57424c46435a5677484a787174577a4c68796f546871757a796147765877506d4d686255747a784c4d5a4d427059626847644b45696a745a6e43756f6f esp
exec ipsec sa add 23 spi 100023 crypto-alg aes-cbc-128 crypto-key 7476514c45676a4c754676544369636b integ-alg sha-512-256 integ-key 574f4c57424c46435a5677484a787174577a4c68796f546871757a796147765877506d4d686255747a784c4d5a4d427059626847644b45696a745a6e43756f6f esp
exec ipsec tunnel protect ipip23 sa-out 100023 sa-in 23 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.24.1 p2p
exec ipsec sa add 100024 spi 200024 crypto-alg aes-cbc-128 crypto-key 6d685a585742486c704d52766a6c514f integ-alg sha-512-256 integ-key 587356475372506f7171534b52556444616c63736a4a61585575667a76796d686b716b45464d4966596444636770655571695966757a6366584a57736d674554 esp
exec ipsec sa add 24 spi 100024 crypto-alg aes-cbc-128 crypto-key 6d685a585742486c704d52766a6c514f integ-alg sha-512-256 integ-key 587356475372506f7171534b52556444616c63736a4a61585575667a76796d686b716b45464d4966596444636770655571695966757a6366584a57736d674554 esp
exec ipsec tunnel protect ipip24 sa-out 100024 sa-in 24 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.25.1 p2p
exec ipsec sa add 100025 spi 200025 crypto-alg aes-cbc-128 crypto-key 6a43416c6c76477658656f567a6e7945 integ-alg sha-512-256 integ-key 754d4f49626a6764787473746f66764172755259556a5463675161426553594768504a5966537679435a504146626563577a4b56494b63646a454973496b6554 esp
exec ipsec sa add 25 spi 100025 crypto-alg aes-cbc-128 crypto-key 6a43416c6c76477658656f567a6e7945 integ-alg sha-512-256 integ-key 754d4f49626a6764787473746f66764172755259556a5463675161426553594768504a5966537679435a504146626563577a4b56494b63646a454973496b6554 esp
exec ipsec tunnel protect ipip25 sa-out 100025 sa-in 25 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.26.1 p2p
exec ipsec sa add 100026 spi 200026 crypto-alg aes-cbc-128 crypto-key 546b63524f755a7a467346564d58725a integ-alg sha-512-256 integ-key 76454d4443687064737449706c56644b6b6d5748536564766d4454775072756156634d527a5262424b7561466a6d7645585448564f6271475872724c6b4e7157 esp
exec ipsec sa add 26 spi 100026 crypto-alg aes-cbc-128 crypto-key 546b63524f755a7a467346564d58725a integ-alg sha-512-256 integ-key 76454d4443687064737449706c56644b6b6d5748536564766d4454775072756156634d527a5262424b7561466a6d7645585448564f6271475872724c6b4e7157 esp
exec ipsec tunnel protect ipip26 sa-out 100026 sa-in 26 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.27.1 p2p
exec ipsec sa add 100027 spi 200027 crypto-alg aes-cbc-128 crypto-key 514963474e6256646479585a6f4b574e integ-alg sha-512-256 integ-key 4e47454e726157566b56756f6c624c75617a6d5a546c6e544e5142577174486b654c5a536f4c524d756773586a797171716c634d4f7764625a6f614958637157 esp
exec ipsec sa add 27 spi 100027 crypto-alg aes-cbc-128 crypto-key 514963474e6256646479585a6f4b574e integ-alg sha-512-256 integ-key 4e47454e726157566b56756f6c624c75617a6d5a546c6e544e5142577174486b654c5a536f4c524d756773586a797171716c634d4f7764625a6f614958637157 esp
exec ipsec tunnel protect ipip27 sa-out 100027 sa-in 27 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.28.1 p2p
exec ipsec sa add 100028 spi 200028 crypto-alg aes-cbc-128 crypto-key 4570685054644159675874636d454756 integ-alg sha-512-256 integ-key 674a6166494178445676444c4255496c44686b537475717671706b697853636853716245495a704a6c636350574c6164744e52626f634d6e7663484f58634953 esp
exec ipsec sa add 28 spi 100028 crypto-alg aes-cbc-128 crypto-key 4570685054644159675874636d454756 integ-alg sha-512-256 integ-key 674a6166494178445676444c4255496c44686b537475717671706b697853636853716245495a704a6c636350574c6164744e52626f634d6e7663484f58634953 esp
exec ipsec tunnel protect ipip28 sa-out 100028 sa-in 28 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.29.1 p2p
exec ipsec sa add 100029 spi 200029 crypto-alg aes-cbc-128 crypto-key 4368746342616d6c62506f7a72484948 integ-alg sha-512-256 integ-key 6768496a72506b696a464b426a41674465776d514e68444b627667735359585a4264536d456362774b726a415a44416d62614279756144745a69577771777155 esp
exec ipsec sa add 29 spi 100029 crypto-alg aes-cbc-128 crypto-key 4368746342616d6c62506f7a72484948 integ-alg sha-512-256 integ-key 6768496a72506b696a464b426a41674465776d514e68444b627667735359585a4264536d456362774b726a415a44416d62614279756144745a69577771777155 esp
exec ipsec tunnel protect ipip29 sa-out 100029 sa-in 29 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.30.1 p2p
exec ipsec sa add 100030 spi 200030 crypto-alg aes-cbc-128 crypto-key 794969727675556d6c56694475724a75 integ-alg sha-512-256 integ-key 6b48697a4a4c4f5756436f52487846784256534a515556655962446d627a526a774958744c49596a705374465045516b786977796d4f4e785448454259756942 esp
exec ipsec sa add 30 spi 100030 crypto-alg aes-cbc-128 crypto-key 794969727675556d6c56694475724a75 integ-alg sha-512-256 integ-key 6b48697a4a4c4f5756436f52487846784256534a515556655962446d627a526a774958744c49596a705374465045516b786977796d4f4e785448454259756942 esp
exec ipsec tunnel protect ipip30 sa-out 100030 sa-in 30 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.31.1 p2p
exec ipsec sa add 100031 spi 200031 crypto-alg aes-cbc-128 crypto-key 516e434566487071526273587a474662 integ-alg sha-512-256 integ-key 7963464c68694644786a495a4d645261577a76646d65726f637944764d486f46736f6b4c6575496e7a62517976515154557168724f4a767448567845596f6351 esp
exec ipsec sa add 31 spi 100031 crypto-alg aes-cbc-128 crypto-key 516e434566487071526273587a474662 integ-alg sha-512-256 integ-key 7963464c68694644786a495a4d645261577a76646d65726f637944764d486f46736f6b4c6575496e7a62517976515154557168724f4a767448567845596f6351 esp
exec ipsec tunnel protect ipip31 sa-out 100031 sa-in 31 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.32.1 p2p
exec ipsec sa add 100032 spi 200032 crypto-alg aes-cbc-128 crypto-key 4d4555696f474b477479686d4342716c integ-alg sha-512-256 integ-key 7056725659794f6f71576547597755696567626349624359765361596955656f4a59526c73494e775072536f447866586370735062714661755a685463724c77 esp
exec ipsec sa add 32 spi 100032 crypto-alg aes-cbc-128 crypto-key 4d4555696f474b477479686d4342716c integ-alg sha-512-256 integ-key 7056725659794f6f71576547597755696567626349624359765361596955656f4a59526c73494e775072536f447866586370735062714661755a685463724c77 esp
exec ipsec tunnel protect ipip32 sa-out 100032 sa-in 32 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.33.1 p2p
exec ipsec sa add 100033 spi 200033 crypto-alg aes-cbc-128 crypto-key 6f766e63414b4e6e6753704c58614450 integ-alg sha-512-256 integ-key 6d4b5744755747416375657357597656695872485769484c6c66614d4e416a5554774d61466b53667241657554754c585655686c745070767246424b726b4f6b esp
exec ipsec sa add 33 spi 100033 crypto-alg aes-cbc-128 crypto-key 6f766e63414b4e6e6753704c58614450 integ-alg sha-512-256 integ-key 6d4b5744755747416375657357597656695872485769484c6c66614d4e416a5554774d61466b53667241657554754c585655686c745070767246424b726b4f6b esp
exec ipsec tunnel protect ipip33 sa-out 100033 sa-in 33 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.34.1 p2p
exec ipsec sa add 100034 spi 200034 crypto-alg aes-cbc-128 crypto-key 526c634c796947644e4c5250584d456f integ-alg sha-512-256 integ-key 6f4a6a58546964704e6f47756b4b70417676494c4a48764c516b63594e6974466e687a6943445979595a525a48514653434650476b716f67427551746f5a4162 esp
exec ipsec sa add 34 spi 100034 crypto-alg aes-cbc-128 crypto-key 526c634c796947644e4c5250584d456f integ-alg sha-512-256 integ-key 6f4a6a58546964704e6f47756b4b70417676494c4a48764c516b63594e6974466e687a6943445979595a525a48514653434650476b716f67427551746f5a4162 esp
exec ipsec tunnel protect ipip34 sa-out 100034 sa-in 34 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.35.1 p2p
exec ipsec sa add 100035 spi 200035 crypto-alg aes-cbc-128 crypto-key 474c4c5348495268765044796a764c41 integ-alg sha-512-256 integ-key 624e676359574f566f76507378446d6a504e614a7744536276695745624675664a6d546c464b7453795562707575495566464365786b4445687657634b514974 esp
exec ipsec sa add 35 spi 100035 crypto-alg aes-cbc-128 crypto-key 474c4c5348495268765044796a764c41 integ-alg sha-512-256 integ-key 624e676359574f566f76507378446d6a504e614a7744536276695745624675664a6d546c464b7453795562707575495566464365786b4445687657634b514974 esp
exec ipsec tunnel protect ipip35 sa-out 100035 sa-in 35 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.36.1 p2p
exec ipsec sa add 100036 spi 200036 crypto-alg aes-cbc-128 crypto-key 566368414671524241484242514d4c65 integ-alg sha-512-256 integ-key 774e79786765754f74736c65556b6e7857514f666d70735a73424979706d4f6f584467626e4d555a6258764b4d5574486b556d465a44416e516750454d494b4f esp
exec ipsec sa add 36 spi 100036 crypto-alg aes-cbc-128 crypto-key 566368414671524241484242514d4c65 integ-alg sha-512-256 integ-key 774e79786765754f74736c65556b6e7857514f666d70735a73424979706d4f6f584467626e4d555a6258764b4d5574486b556d465a44416e516750454d494b4f esp
exec ipsec tunnel protect ipip36 sa-out 100036 sa-in 36 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.37.1 p2p
exec ipsec sa add 100037 spi 200037 crypto-alg aes-cbc-128 crypto-key 4f664a4e7972586753585576496c684e integ-alg sha-512-256 integ-key 517a7269544e51726f784b79647074536b6466575672766f6c6d714f696379504a704859556e7975735276464f5a67674e665276587a6e486c59757970586372 esp
exec ipsec sa add 37 spi 100037 crypto-alg aes-cbc-128 crypto-key 4f664a4e7972586753585576496c684e integ-alg sha-512-256 integ-key 517a7269544e51726f784b79647074536b6466575672766f6c6d714f696379504a704859556e7975735276464f5a67674e665276587a6e486c59757970586372 esp
exec ipsec tunnel protect ipip37 sa-out 100037 sa-in 37 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.38.1 p2p
exec ipsec sa add 100038 spi 200038 crypto-alg aes-cbc-128 crypto-key 4c6a53646e596c4f43594259676a4a70 integ-alg sha-512-256 integ-key 7a766642754a644451704a616273536342694575435566684953596e476f7055444c67667a4b614659676b6165495955665463414a58677446474f5761687173 esp
exec ipsec sa add 38 spi 100038 crypto-alg aes-cbc-128 crypto-key 4c6a53646e596c4f43594259676a4a70 integ-alg sha-512-256 integ-key 7a766642754a644451704a616273536342694575435566684953596e476f7055444c67667a4b614659676b6165495955665463414a58677446474f5761687173 esp
exec ipsec tunnel protect ipip38 sa-out 100038 sa-in 38 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.39.1 p2p
exec ipsec sa add 100039 spi 200039 crypto-alg aes-cbc-128 crypto-key 6b5041574c535275426f785061594761 integ-alg sha-512-256 integ-key 624e696e4f727557687349616f44574f4d6a704772566a6e636a7749554f567652794b736d52737862526765627075434a526b5145624b4e67594c6557476569 esp
exec ipsec sa add 39 spi 100039 crypto-alg aes-cbc-128 crypto-key 6b5041574c535275426f785061594761 integ-alg sha-512-256 integ-key 624e696e4f727557687349616f44574f4d6a704772566a6e636a7749554f567652794b736d52737862526765627075434a526b5145624b4e67594c6557476569 esp
exec ipsec tunnel protect ipip39 sa-out 100039 sa-in 39 add
exec ip route add 100.0.0.1/8 via 200.0.0.101 TenGigabitEthernet8/0/0
exec set interface unnumbered ipip0 use TenGigabitEthernet8/0/0
exec set interface state ipip0 up
exec ip route add 10.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use TenGigabitEthernet8/0/0
exec set interface state ipip1 up
exec ip route add 10.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use TenGigabitEthernet8/0/0
exec set interface state ipip2 up
exec ip route add 10.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use TenGigabitEthernet8/0/0
exec set interface state ipip3 up
exec ip route add 10.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use TenGigabitEthernet8/0/0
exec set interface state ipip4 up
exec ip route add 10.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use TenGigabitEthernet8/0/0
exec set interface state ipip5 up
exec ip route add 10.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use TenGigabitEthernet8/0/0
exec set interface state ipip6 up
exec ip route add 10.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use TenGigabitEthernet8/0/0
exec set interface state ipip7 up
exec ip route add 10.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use TenGigabitEthernet8/0/0
exec set interface state ipip8 up
exec ip route add 10.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use TenGigabitEthernet8/0/0
exec set interface state ipip9 up
exec ip route add 10.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use TenGigabitEthernet8/0/0
exec set interface state ipip10 up
exec ip route add 10.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use TenGigabitEthernet8/0/0
exec set interface state ipip11 up
exec ip route add 10.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use TenGigabitEthernet8/0/0
exec set interface state ipip12 up
exec ip route add 10.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use TenGigabitEthernet8/0/0
exec set interface state ipip13 up
exec ip route add 10.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use TenGigabitEthernet8/0/0
exec set interface state ipip14 up
exec ip route add 10.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use TenGigabitEthernet8/0/0
exec set interface state ipip15 up
exec ip route add 10.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use TenGigabitEthernet8/0/0
exec set interface state ipip16 up
exec ip route add 10.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use TenGigabitEthernet8/0/0
exec set interface state ipip17 up
exec ip route add 10.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use TenGigabitEthernet8/0/0
exec set interface state ipip18 up
exec ip route add 10.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use TenGigabitEthernet8/0/0
exec set interface state ipip19 up
exec ip route add 10.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use TenGigabitEthernet8/0/0
exec set interface state ipip20 up
exec ip route add 10.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use TenGigabitEthernet8/0/0
exec set interface state ipip21 up
exec ip route add 10.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use TenGigabitEthernet8/0/0
exec set interface state ipip22 up
exec ip route add 10.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use TenGigabitEthernet8/0/0
exec set interface state ipip23 up
exec ip route add 10.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use TenGigabitEthernet8/0/0
exec set interface state ipip24 up
exec ip route add 10.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use TenGigabitEthernet8/0/0
exec set interface state ipip25 up
exec ip route add 10.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use TenGigabitEthernet8/0/0
exec set interface state ipip26 up
exec ip route add 10.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use TenGigabitEthernet8/0/0
exec set interface state ipip27 up
exec ip route add 10.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use TenGigabitEthernet8/0/0
exec set interface state ipip28 up
exec ip route add 10.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use TenGigabitEthernet8/0/0
exec set interface state ipip29 up
exec ip route add 10.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use TenGigabitEthernet8/0/0
exec set interface state ipip30 up
exec ip route add 10.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use TenGigabitEthernet8/0/0
exec set interface state ipip31 up
exec ip route add 10.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use TenGigabitEthernet8/0/0
exec set interface state ipip32 up
exec ip route add 10.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use TenGigabitEthernet8/0/0
exec set interface state ipip33 up
exec ip route add 10.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use TenGigabitEthernet8/0/0
exec set interface state ipip34 up
exec ip route add 10.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use TenGigabitEthernet8/0/0
exec set interface state ipip35 up
exec ip route add 10.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use TenGigabitEthernet8/0/0
exec set interface state ipip36 up
exec ip route add 10.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use TenGigabitEthernet8/0/0
exec set interface state ipip37 up
exec ip route add 10.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use TenGigabitEthernet8/0/0
exec set interface state ipip38 up
exec ip route add 10.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use TenGigabitEthernet8/0/0
exec set interface state ipip39 up
exec ip route add 10.0.0.39/32 via ipip39

10ge2p1x553-ethip4ipsec40tnlsw-ip4base-int-aes128gcm-ndrpdr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular opology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG verification: TG finds and reports throughput NDR (Non Drop Rate) with zero packet loss tolerance and throughput PDR (Partial Drop Rate) with non-zero packet loss tolerance (LT) expressed in percentage of packets transmitted. NDR and PDR are discovered for different Ethernet L2 frame sizes using MLRsearch library.

Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to umber of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG ode interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 64b-1t1c-ethip4ipsec40tnlsw- 
ip4base-int-aes128gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec set interface ip address TenGigabitEthernet8/0/0 200.0.0.102/24.0
exec create ipip tunnel src 200.0.0.102 dst 100.0.0.1 p2p
exec ipsec sa add 100000 spi 200000 crypto-alg aes-gcm-128 crypto-key 6c6c52716f7a684a456e716661585864 esp
exec ipsec sa add 0 spi 100000 crypto-alg aes-gcm-128 crypto-key 6c6c52716f7a684a456e716661585864 esp
exec ipsec tunnel protect ipip0 sa-out 100000 sa-in 0 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.1.1 p2p
exec ipsec sa add 100001 spi 200001 crypto-alg aes-gcm-128 crypto-key 4a5a6b6f5a784c6d785a466c47674962 esp
exec ipsec sa add 1 spi 100001 crypto-alg aes-gcm-128 crypto-key 4a5a6b6f5a784c6d785a466c47674962 esp
exec ipsec tunnel protect ipip1 sa-out 100001 sa-in 1 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.2.1 p2p
exec ipsec sa add 100002 spi 200002 crypto-alg aes-gcm-128 crypto-key 656a4a437943426c4352445a59755546 esp
exec ipsec sa add 2 spi 100002 crypto-alg aes-gcm-128 crypto-key 656a4a437943426c4352445a59755546 esp
exec ipsec tunnel protect ipip2 sa-out 100002 sa-in 2 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.3.1 p2p
exec ipsec sa add 100003 spi 200003 crypto-alg aes-gcm-128 crypto-key 7456665058585a59616f416379455944 esp
exec ipsec sa add 3 spi 100003 crypto-alg aes-gcm-128 crypto-key 7456665058585a59616f416379455944 esp
exec ipsec tunnel protect ipip3 sa-out 100003 sa-in 3 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.4.1 p2p
exec ipsec sa add 100004 spi 200004 crypto-alg aes-gcm-128 crypto-key 4770674a666170647557526a79514375 esp
exec ipsec sa add 4 spi 100004 crypto-alg aes-gcm-128 crypto-key 4770674a666170647557526a79514375 esp
exec ipsec tunnel protect ipip4 sa-out 100004 sa-in 4 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.5.1 p2p
exec ipsec sa add 100005 spi 200005 crypto-alg aes-gcm-128 crypto-key 6c657a6972684f54486c6c7171636672 esp
exec ipsec sa add 5 spi 100005 crypto-alg aes-gcm-128 crypto-key 6c657a6972684f54486c6c7171636672 esp
exec ipsec tunnel protect ipip5 sa-out 100005 sa-in 5 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.6.1 p2p
exec ipsec sa add 100006 spi 200006 crypto-alg aes-gcm-128 crypto-key 6d484f566f6a55787a594f66636f4f74 esp
exec ipsec sa add 6 spi 100006 crypto-alg aes-gcm-128 crypto-key 6d484f566f6a55787a594f66636f4f74 esp
exec ipsec tunnel protect ipip6 sa-out 100006 sa-in 6 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.7.1 p2p
exec ipsec sa add 100007 spi 200007 crypto-alg aes-gcm-128 crypto-key 635772687453694b42535868664b414b esp
exec ipsec sa add 7 spi 100007 crypto-alg aes-gcm-128 crypto-key 635772687453694b42535868664b414b esp
exec ipsec tunnel protect ipip7 sa-out 100007 sa-in 7 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.8.1 p2p
exec ipsec sa add 100008 spi 200008 crypto-alg aes-gcm-128 crypto-key 6f6f4249647650726a5762586e794767 esp
exec ipsec sa add 8 spi 100008 crypto-alg aes-gcm-128 crypto-key 6f6f4249647650726a5762586e794767 esp
exec ipsec tunnel protect ipip8 sa-out 100008 sa-in 8 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.9.1 p2p
exec ipsec sa add 100009 spi 200009 crypto-alg aes-gcm-128 crypto-key 536b704175525156715848424c6b7344 esp
exec ipsec sa add 9 spi 100009 crypto-alg aes-gcm-128 crypto-key 536b704175525156715848424c6b7344 esp
exec ipsec tunnel protect ipip9 sa-out 100009 sa-in 9 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.10.1 p2p
exec ipsec sa add 100010 spi 200010 crypto-alg aes-gcm-128 crypto-key 654d627068706870696e5a74456c5449 esp
exec ipsec sa add 10 spi 100010 crypto-alg aes-gcm-128 crypto-key 654d627068706870696e5a74456c5449 esp
exec ipsec tunnel protect ipip10 sa-out 100010 sa-in 10 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.11.1 p2p
exec ipsec sa add 100011 spi 200011 crypto-alg aes-gcm-128 crypto-key 4d4a675273587a654d7445436b536758 esp
exec ipsec sa add 11 spi 100011 crypto-alg aes-gcm-128 crypto-key 4d4a675273587a654d7445436b536758 esp
exec ipsec tunnel protect ipip11 sa-out 100011 sa-in 11 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.12.1 p2p
exec ipsec sa add 100012 spi 200012 crypto-alg aes-gcm-128 crypto-key 674f685252686f444243746f54785a44 esp
exec ipsec sa add 12 spi 100012 crypto-alg aes-gcm-128 crypto-key 674f685252686f444243746f54785a44 esp
exec ipsec tunnel protect ipip12 sa-out 100012 sa-in 12 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.13.1 p2p
exec ipsec sa add 100013 spi 200013 crypto-alg aes-gcm-128 crypto-key 41484a5155464253676148556f526663 esp
exec ipsec sa add 13 spi 100013 crypto-alg aes-gcm-128 crypto-key 41484a5155464253676148556f526663 esp
exec ipsec tunnel protect ipip13 sa-out 100013 sa-in 13 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.14.1 p2p
exec ipsec sa add 100014 spi 200014 crypto-alg aes-gcm-128 crypto-key 4d4245494967425974636c6445747552 esp
exec ipsec sa add 14 spi 100014 crypto-alg aes-gcm-128 crypto-key 4d4245494967425974636c6445747552 esp
exec ipsec tunnel protect ipip14 sa-out 100014 sa-in 14 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.15.1 p2p
exec ipsec sa add 100015 spi 200015 crypto-alg aes-gcm-128 crypto-key 4745595653694b6759626b7a564e7a78 esp
exec ipsec sa add 15 spi 100015 crypto-alg aes-gcm-128 crypto-key 4745595653694b6759626b7a564e7a78 esp
exec ipsec tunnel protect ipip15 sa-out 100015 sa-in 15 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.16.1 p2p
exec ipsec sa add 100016 spi 200016 crypto-alg aes-gcm-128 crypto-key 67645968424a4c4f684f6a766f4b5556 esp
exec ipsec sa add 16 spi 100016 crypto-alg aes-gcm-128 crypto-key 67645968424a4c4f684f6a766f4b5556 esp
exec ipsec tunnel protect ipip16 sa-out 100016 sa-in 16 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.17.1 p2p
exec ipsec sa add 100017 spi 200017 crypto-alg aes-gcm-128 crypto-key 69576e4b424d494357706a6f4a46464d esp
exec ipsec sa add 17 spi 100017 crypto-alg aes-gcm-128 crypto-key 69576e4b424d494357706a6f4a46464d esp
exec ipsec tunnel protect ipip17 sa-out 100017 sa-in 17 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.18.1 p2p
exec ipsec sa add 100018 spi 200018 crypto-alg aes-gcm-128 crypto-key 576b586e654273704b4b474f514e7675 esp
exec ipsec sa add 18 spi 100018 crypto-alg aes-gcm-128 crypto-key 576b586e654273704b4b474f514e7675 esp
exec ipsec tunnel protect ipip18 sa-out 100018 sa-in 18 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.19.1 p2p
exec ipsec sa add 100019 spi 200019 crypto-alg aes-gcm-128 crypto-key 4b69654f6a6c6374534d4c686b5a7941 esp
exec ipsec sa add 19 spi 100019 crypto-alg aes-gcm-128 crypto-key 4b69654f6a6c6374534d4c686b5a7941 esp
exec ipsec tunnel protect ipip19 sa-out 100019 sa-in 19 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.20.1 p2p
exec ipsec sa add 100020 spi 200020 crypto-alg aes-gcm-128 crypto-key 625774617a6d66536366774743496f73 esp
exec ipsec sa add 20 spi 100020 crypto-alg aes-gcm-128 crypto-key 625774617a6d66536366774743496f73 esp
exec ipsec tunnel protect ipip20 sa-out 100020 sa-in 20 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.21.1 p2p
exec ipsec sa add 100021 spi 200021 crypto-alg aes-gcm-128 crypto-key 64786b466d4f4a5069694a637a754b51 esp
exec ipsec sa add 21 spi 100021 crypto-alg aes-gcm-128 crypto-key 64786b466d4f4a5069694a637a754b51 esp
exec ipsec tunnel protect ipip21 sa-out 100021 sa-in 21 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.22.1 p2p
exec ipsec sa add 100022 spi 200022 crypto-alg aes-gcm-128 crypto-key 56574955457067457553474d68536670 esp
exec ipsec sa add 22 spi 100022 crypto-alg aes-gcm-128 crypto-key 56574955457067457553474d68536670 esp
exec ipsec tunnel protect ipip22 sa-out 100022 sa-in 22 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.23.1 p2p
exec ipsec sa add 100023 spi 200023 crypto-alg aes-gcm-128 crypto-key 67795744615859756463486e49514662 esp
exec ipsec sa add 23 spi 100023 crypto-alg aes-gcm-128 crypto-key 67795744615859756463486e49514662 esp
exec ipsec tunnel protect ipip23 sa-out 100023 sa-in 23 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.24.1 p2p
exec ipsec sa add 100024 spi 200024 crypto-alg aes-gcm-128 crypto-key 5a596b41757951654c786c5a7379476b esp
exec ipsec sa add 24 spi 100024 crypto-alg aes-gcm-128 crypto-key 5a596b41757951654c786c5a7379476b esp
exec ipsec tunnel protect ipip24 sa-out 100024 sa-in 24 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.25.1 p2p
exec ipsec sa add 100025 spi 200025 crypto-alg aes-gcm-128 crypto-key 56485152437565674a7948534355694b esp
exec ipsec sa add 25 spi 100025 crypto-alg aes-gcm-128 crypto-key 56485152437565674a7948534355694b esp
exec ipsec tunnel protect ipip25 sa-out 100025 sa-in 25 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.26.1 p2p
exec ipsec sa add 100026 spi 200026 crypto-alg aes-gcm-128 crypto-key 71747967776b79744670485543716962 esp
exec ipsec sa add 26 spi 100026 crypto-alg aes-gcm-128 crypto-key 71747967776b79744670485543716962 esp
exec ipsec tunnel protect ipip26 sa-out 100026 sa-in 26 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.27.1 p2p
exec ipsec sa add 100027 spi 200027 crypto-alg aes-gcm-128 crypto-key 637a4a465a524b4b4c50615758704247 esp
exec ipsec sa add 27 spi 100027 crypto-alg aes-gcm-128 crypto-key 637a4a465a524b4b4c50615758704247 esp
exec ipsec tunnel protect ipip27 sa-out 100027 sa-in 27 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.28.1 p2p
exec ipsec sa add 100028 spi 200028 crypto-alg aes-gcm-128 crypto-key 45797961575553706e5550536e496547 esp
exec ipsec sa add 28 spi 100028 crypto-alg aes-gcm-128 crypto-key 45797961575553706e5550536e496547 esp
exec ipsec tunnel protect ipip28 sa-out 100028 sa-in 28 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.29.1 p2p
exec ipsec sa add 100029 spi 200029 crypto-alg aes-gcm-128 crypto-key 5654674f63734c5a5273504a71787763 esp
exec ipsec sa add 29 spi 100029 crypto-alg aes-gcm-128 crypto-key 5654674f63734c5a5273504a71787763 esp
exec ipsec tunnel protect ipip29 sa-out 100029 sa-in 29 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.30.1 p2p
exec ipsec sa add 100030 spi 200030 crypto-alg aes-gcm-128 crypto-key 6546464d757258746273764956416b52 esp
exec ipsec sa add 30 spi 100030 crypto-alg aes-gcm-128 crypto-key 6546464d757258746273764956416b52 esp
exec ipsec tunnel protect ipip30 sa-out 100030 sa-in 30 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.31.1 p2p
exec ipsec sa add 100031 spi 200031 crypto-alg aes-gcm-128 crypto-key 4f5975674e455068414c595955545965 esp
exec ipsec sa add 31 spi 100031 crypto-alg aes-gcm-128 crypto-key 4f5975674e455068414c595955545965 esp
exec ipsec tunnel protect ipip31 sa-out 100031 sa-in 31 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.32.1 p2p
exec ipsec sa add 100032 spi 200032 crypto-alg aes-gcm-128 crypto-key 496c4445467076445a62786e6a7a7169 esp
exec ipsec sa add 32 spi 100032 crypto-alg aes-gcm-128 crypto-key 496c4445467076445a62786e6a7a7169 esp
exec ipsec tunnel protect ipip32 sa-out 100032 sa-in 32 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.33.1 p2p
exec ipsec sa add 100033 spi 200033 crypto-alg aes-gcm-128 crypto-key 775a444d576c75715959476144426b48 esp
exec ipsec sa add 33 spi 100033 crypto-alg aes-gcm-128 crypto-key 775a444d576c75715959476144426b48 esp
exec ipsec tunnel protect ipip33 sa-out 100033 sa-in 33 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.34.1 p2p
exec ipsec sa add 100034 spi 200034 crypto-alg aes-gcm-128 crypto-key 796d52455672734351747542714c4952 esp
exec ipsec sa add 34 spi 100034 crypto-alg aes-gcm-128 crypto-key 796d52455672734351747542714c4952 esp
exec ipsec tunnel protect ipip34 sa-out 100034 sa-in 34 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.35.1 p2p
exec ipsec sa add 100035 spi 200035 crypto-alg aes-gcm-128 crypto-key 6c415366534653734d6363444649656d esp
exec ipsec sa add 35 spi 100035 crypto-alg aes-gcm-128 crypto-key 6c415366534653734d6363444649656d esp
exec ipsec tunnel protect ipip35 sa-out 100035 sa-in 35 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.36.1 p2p
exec ipsec sa add 100036 spi 200036 crypto-alg aes-gcm-128 crypto-key 725352424e68545a5841737a7768526e esp
exec ipsec sa add 36 spi 100036 crypto-alg aes-gcm-128 crypto-key 725352424e68545a5841737a7768526e esp
exec ipsec tunnel protect ipip36 sa-out 100036 sa-in 36 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.37.1 p2p
exec ipsec sa add 100037 spi 200037 crypto-alg aes-gcm-128 crypto-key 62755646595a65676e595a6344594359 esp
exec ipsec sa add 37 spi 100037 crypto-alg aes-gcm-128 crypto-key 62755646595a65676e595a6344594359 esp
exec ipsec tunnel protect ipip37 sa-out 100037 sa-in 37 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.38.1 p2p
exec ipsec sa add 100038 spi 200038 crypto-alg aes-gcm-128 crypto-key 734544537641734644564f6f514d6a67 esp
exec ipsec sa add 38 spi 100038 crypto-alg aes-gcm-128 crypto-key 734544537641734644564f6f514d6a67 esp
exec ipsec tunnel protect ipip38 sa-out 100038 sa-in 38 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.39.1 p2p
exec ipsec sa add 100039 spi 200039 crypto-alg aes-gcm-128 crypto-key 7250424562565273474279794852736b esp
exec ipsec sa add 39 spi 100039 crypto-alg aes-gcm-128 crypto-key 7250424562565273474279794852736b esp
exec ipsec tunnel protect ipip39 sa-out 100039 sa-in 39 add
exec ip route add 100.0.0.1/8 via 200.0.0.101 TenGigabitEthernet8/0/0
exec set interface unnumbered ipip0 use TenGigabitEthernet8/0/0
exec set interface state ipip0 up
exec ip route add 10.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use TenGigabitEthernet8/0/0
exec set interface state ipip1 up
exec ip route add 10.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use TenGigabitEthernet8/0/0
exec set interface state ipip2 up
exec ip route add 10.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use TenGigabitEthernet8/0/0
exec set interface state ipip3 up
exec ip route add 10.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use TenGigabitEthernet8/0/0
exec set interface state ipip4 up
exec ip route add 10.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use TenGigabitEthernet8/0/0
exec set interface state ipip5 up
exec ip route add 10.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use TenGigabitEthernet8/0/0
exec set interface state ipip6 up
exec ip route add 10.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use TenGigabitEthernet8/0/0
exec set interface state ipip7 up
exec ip route add 10.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use TenGigabitEthernet8/0/0
exec set interface state ipip8 up
exec ip route add 10.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use TenGigabitEthernet8/0/0
exec set interface state ipip9 up
exec ip route add 10.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use TenGigabitEthernet8/0/0
exec set interface state ipip10 up
exec ip route add 10.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use TenGigabitEthernet8/0/0
exec set interface state ipip11 up
exec ip route add 10.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use TenGigabitEthernet8/0/0
exec set interface state ipip12 up
exec ip route add 10.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use TenGigabitEthernet8/0/0
exec set interface state ipip13 up
exec ip route add 10.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use TenGigabitEthernet8/0/0
exec set interface state ipip14 up
exec ip route add 10.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use TenGigabitEthernet8/0/0
exec set interface state ipip15 up
exec ip route add 10.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use TenGigabitEthernet8/0/0
exec set interface state ipip16 up
exec ip route add 10.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use TenGigabitEthernet8/0/0
exec set interface state ipip17 up
exec ip route add 10.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use TenGigabitEthernet8/0/0
exec set interface state ipip18 up
exec ip route add 10.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use TenGigabitEthernet8/0/0
exec set interface state ipip19 up
exec ip route add 10.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use TenGigabitEthernet8/0/0
exec set interface state ipip20 up
exec ip route add 10.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use TenGigabitEthernet8/0/0
exec set interface state ipip21 up
exec ip route add 10.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use TenGigabitEthernet8/0/0
exec set interface state ipip22 up
exec ip route add 10.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use TenGigabitEthernet8/0/0
exec set interface state ipip23 up
exec ip route add 10.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use TenGigabitEthernet8/0/0
exec set interface state ipip24 up
exec ip route add 10.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use TenGigabitEthernet8/0/0
exec set interface state ipip25 up
exec ip route add 10.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use TenGigabitEthernet8/0/0
exec set interface state ipip26 up
exec ip route add 10.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use TenGigabitEthernet8/0/0
exec set interface state ipip27 up
exec ip route add 10.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use TenGigabitEthernet8/0/0
exec set interface state ipip28 up
exec ip route add 10.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use TenGigabitEthernet8/0/0
exec set interface state ipip29 up
exec ip route add 10.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use TenGigabitEthernet8/0/0
exec set interface state ipip30 up
exec ip route add 10.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use TenGigabitEthernet8/0/0
exec set interface state ipip31 up
exec ip route add 10.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use TenGigabitEthernet8/0/0
exec set interface state ipip32 up
exec ip route add 10.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use TenGigabitEthernet8/0/0
exec set interface state ipip33 up
exec ip route add 10.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use TenGigabitEthernet8/0/0
exec set interface state ipip34 up
exec ip route add 10.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use TenGigabitEthernet8/0/0
exec set interface state ipip35 up
exec ip route add 10.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use TenGigabitEthernet8/0/0
exec set interface state ipip36 up
exec ip route add 10.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use TenGigabitEthernet8/0/0
exec set interface state ipip37 up
exec ip route add 10.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use TenGigabitEthernet8/0/0
exec set interface state ipip38 up
exec ip route add 10.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use TenGigabitEthernet8/0/0
exec set interface state ipip39 up
exec ip route add 10.0.0.39/32 via ipip39

 64b-2t2c-ethip4ipsec40tnlsw- 
ip4base-int-aes128gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec set interface ip address TenGigabitEthernet8/0/0 200.0.0.102/24.0
exec create ipip tunnel src 200.0.0.102 dst 100.0.0.1 p2p
exec ipsec sa add 100000 spi 200000 crypto-alg aes-gcm-128 crypto-key 716c62684a70714846706e6f66724c51 esp
exec ipsec sa add 0 spi 100000 crypto-alg aes-gcm-128 crypto-key 716c62684a70714846706e6f66724c51 esp
exec ipsec tunnel protect ipip0 sa-out 100000 sa-in 0 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.1.1 p2p
exec ipsec sa add 100001 spi 200001 crypto-alg aes-gcm-128 crypto-key 7a534e4251614578796e4e516f707558 esp
exec ipsec sa add 1 spi 100001 crypto-alg aes-gcm-128 crypto-key 7a534e4251614578796e4e516f707558 esp
exec ipsec tunnel protect ipip1 sa-out 100001 sa-in 1 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.2.1 p2p
exec ipsec sa add 100002 spi 200002 crypto-alg aes-gcm-128 crypto-key 557878776a7674704f666e7449684b61 esp
exec ipsec sa add 2 spi 100002 crypto-alg aes-gcm-128 crypto-key 557878776a7674704f666e7449684b61 esp
exec ipsec tunnel protect ipip2 sa-out 100002 sa-in 2 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.3.1 p2p
exec ipsec sa add 100003 spi 200003 crypto-alg aes-gcm-128 crypto-key 52514e7165516b5371504f6e466d464a esp
exec ipsec sa add 3 spi 100003 crypto-alg aes-gcm-128 crypto-key 52514e7165516b5371504f6e466d464a esp
exec ipsec tunnel protect ipip3 sa-out 100003 sa-in 3 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.4.1 p2p
exec ipsec sa add 100004 spi 200004 crypto-alg aes-gcm-128 crypto-key 49527746464751574564546a6354416a esp
exec ipsec sa add 4 spi 100004 crypto-alg aes-gcm-128 crypto-key 49527746464751574564546a6354416a esp
exec ipsec tunnel protect ipip4 sa-out 100004 sa-in 4 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.5.1 p2p
exec ipsec sa add 100005 spi 200005 crypto-alg aes-gcm-128 crypto-key 627463715172676374676f714b564652 esp
exec ipsec sa add 5 spi 100005 crypto-alg aes-gcm-128 crypto-key 627463715172676374676f714b564652 esp
exec ipsec tunnel protect ipip5 sa-out 100005 sa-in 5 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.6.1 p2p
exec ipsec sa add 100006 spi 200006 crypto-alg aes-gcm-128 crypto-key 58524352534f4d6d4243575552694f61 esp
exec ipsec sa add 6 spi 100006 crypto-alg aes-gcm-128 crypto-key 58524352534f4d6d4243575552694f61 esp
exec ipsec tunnel protect ipip6 sa-out 100006 sa-in 6 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.7.1 p2p
exec ipsec sa add 100007 spi 200007 crypto-alg aes-gcm-128 crypto-key 5a74446941586b4a46446c5358415842 esp
exec ipsec sa add 7 spi 100007 crypto-alg aes-gcm-128 crypto-key 5a74446941586b4a46446c5358415842 esp
exec ipsec tunnel protect ipip7 sa-out 100007 sa-in 7 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.8.1 p2p
exec ipsec sa add 100008 spi 200008 crypto-alg aes-gcm-128 crypto-key 7563615152456f455a63464358597457 esp
exec ipsec sa add 8 spi 100008 crypto-alg aes-gcm-128 crypto-key 7563615152456f455a63464358597457 esp
exec ipsec tunnel protect ipip8 sa-out 100008 sa-in 8 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.9.1 p2p
exec ipsec sa add 100009 spi 200009 crypto-alg aes-gcm-128 crypto-key 6879436753505563477762486c65424c esp
exec ipsec sa add 9 spi 100009 crypto-alg aes-gcm-128 crypto-key 6879436753505563477762486c65424c esp
exec ipsec tunnel protect ipip9 sa-out 100009 sa-in 9 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.10.1 p2p
exec ipsec sa add 100010 spi 200010 crypto-alg aes-gcm-128 crypto-key 61716758636e5665466956714d597769 esp
exec ipsec sa add 10 spi 100010 crypto-alg aes-gcm-128 crypto-key 61716758636e5665466956714d597769 esp
exec ipsec tunnel protect ipip10 sa-out 100010 sa-in 10 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.11.1 p2p
exec ipsec sa add 100011 spi 200011 crypto-alg aes-gcm-128 crypto-key 4a4d696367706446675941737163465a esp
exec ipsec sa add 11 spi 100011 crypto-alg aes-gcm-128 crypto-key 4a4d696367706446675941737163465a esp
exec ipsec tunnel protect ipip11 sa-out 100011 sa-in 11 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.12.1 p2p
exec ipsec sa add 100012 spi 200012 crypto-alg aes-gcm-128 crypto-key 516a4d6b446b48547365785663484471 esp
exec ipsec sa add 12 spi 100012 crypto-alg aes-gcm-128 crypto-key 516a4d6b446b48547365785663484471 esp
exec ipsec tunnel protect ipip12 sa-out 100012 sa-in 12 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.13.1 p2p
exec ipsec sa add 100013 spi 200013 crypto-alg aes-gcm-128 crypto-key 4e706468574a534462767974786a7953 esp
exec ipsec sa add 13 spi 100013 crypto-alg aes-gcm-128 crypto-key 4e706468574a534462767974786a7953 esp
exec ipsec tunnel protect ipip13 sa-out 100013 sa-in 13 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.14.1 p2p
exec ipsec sa add 100014 spi 200014 crypto-alg aes-gcm-128 crypto-key 6874464c56476f4e4a615662565a6f62 esp
exec ipsec sa add 14 spi 100014 crypto-alg aes-gcm-128 crypto-key 6874464c56476f4e4a615662565a6f62 esp
exec ipsec tunnel protect ipip14 sa-out 100014 sa-in 14 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.15.1 p2p
exec ipsec sa add 100015 spi 200015 crypto-alg aes-gcm-128 crypto-key 73436e54685658546b6f534241625965 esp
exec ipsec sa add 15 spi 100015 crypto-alg aes-gcm-128 crypto-key 73436e54685658546b6f534241625965 esp
exec ipsec tunnel protect ipip15 sa-out 100015 sa-in 15 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.16.1 p2p
exec ipsec sa add 100016 spi 200016 crypto-alg aes-gcm-128 crypto-key 6f797a51695041536848647a686c4877 esp
exec ipsec sa add 16 spi 100016 crypto-alg aes-gcm-128 crypto-key 6f797a51695041536848647a686c4877 esp
exec ipsec tunnel protect ipip16 sa-out 100016 sa-in 16 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.17.1 p2p
exec ipsec sa add 100017 spi 200017 crypto-alg aes-gcm-128 crypto-key 706b6477674d766e417352754d6f7961 esp
exec ipsec sa add 17 spi 100017 crypto-alg aes-gcm-128 crypto-key 706b6477674d766e417352754d6f7961 esp
exec ipsec tunnel protect ipip17 sa-out 100017 sa-in 17 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.18.1 p2p
exec ipsec sa add 100018 spi 200018 crypto-alg aes-gcm-128 crypto-key 694c6874566c6a6d73577272596f6655 esp
exec ipsec sa add 18 spi 100018 crypto-alg aes-gcm-128 crypto-key 694c6874566c6a6d73577272596f6655 esp
exec ipsec tunnel protect ipip18 sa-out 100018 sa-in 18 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.19.1 p2p
exec ipsec sa add 100019 spi 200019 crypto-alg aes-gcm-128 crypto-key 76485a5a587766474a697a6a5677666d esp
exec ipsec sa add 19 spi 100019 crypto-alg aes-gcm-128 crypto-key 76485a5a587766474a697a6a5677666d esp
exec ipsec tunnel protect ipip19 sa-out 100019 sa-in 19 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.20.1 p2p
exec ipsec sa add 100020 spi 200020 crypto-alg aes-gcm-128 crypto-key 6c746844486774436f7147496b644e61 esp
exec ipsec sa add 20 spi 100020 crypto-alg aes-gcm-128 crypto-key 6c746844486774436f7147496b644e61 esp
exec ipsec tunnel protect ipip20 sa-out 100020 sa-in 20 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.21.1 p2p
exec ipsec sa add 100021 spi 200021 crypto-alg aes-gcm-128 crypto-key 4747416c6d524b425655684c71794e77 esp
exec ipsec sa add 21 spi 100021 crypto-alg aes-gcm-128 crypto-key 4747416c6d524b425655684c71794e77 esp
exec ipsec tunnel protect ipip21 sa-out 100021 sa-in 21 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.22.1 p2p
exec ipsec sa add 100022 spi 200022 crypto-alg aes-gcm-128 crypto-key 52766463556c5841704e767472674c75 esp
exec ipsec sa add 22 spi 100022 crypto-alg aes-gcm-128 crypto-key 52766463556c5841704e767472674c75 esp
exec ipsec tunnel protect ipip22 sa-out 100022 sa-in 22 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.23.1 p2p
exec ipsec sa add 100023 spi 200023 crypto-alg aes-gcm-128 crypto-key 4f516b684a467753754e6b6b55735158 esp
exec ipsec sa add 23 spi 100023 crypto-alg aes-gcm-128 crypto-key 4f516b684a467753754e6b6b55735158 esp
exec ipsec tunnel protect ipip23 sa-out 100023 sa-in 23 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.24.1 p2p
exec ipsec sa add 100024 spi 200024 crypto-alg aes-gcm-128 crypto-key 5066615946626f6961614b6549527a4e esp
exec ipsec sa add 24 spi 100024 crypto-alg aes-gcm-128 crypto-key 5066615946626f6961614b6549527a4e esp
exec ipsec tunnel protect ipip24 sa-out 100024 sa-in 24 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.25.1 p2p
exec ipsec sa add 100025 spi 200025 crypto-alg aes-gcm-128 crypto-key 594e79676b61497a7857564d6d484b62 esp
exec ipsec sa add 25 spi 100025 crypto-alg aes-gcm-128 crypto-key 594e79676b61497a7857564d6d484b62 esp
exec ipsec tunnel protect ipip25 sa-out 100025 sa-in 25 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.26.1 p2p
exec ipsec sa add 100026 spi 200026 crypto-alg aes-gcm-128 crypto-key 584b6f4a6f5576744f7174656c794e73 esp
exec ipsec sa add 26 spi 100026 crypto-alg aes-gcm-128 crypto-key 584b6f4a6f5576744f7174656c794e73 esp
exec ipsec tunnel protect ipip26 sa-out 100026 sa-in 26 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.27.1 p2p
exec ipsec sa add 100027 spi 200027 crypto-alg aes-gcm-128 crypto-key 556b4454444a66706676505270517562 esp
exec ipsec sa add 27 spi 100027 crypto-alg aes-gcm-128 crypto-key 556b4454444a66706676505270517562 esp
exec ipsec tunnel protect ipip27 sa-out 100027 sa-in 27 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.28.1 p2p
exec ipsec sa add 100028 spi 200028 crypto-alg aes-gcm-128 crypto-key 4c67666872466d457867634c55677458 esp
exec ipsec sa add 28 spi 100028 crypto-alg aes-gcm-128 crypto-key 4c67666872466d457867634c55677458 esp
exec ipsec tunnel protect ipip28 sa-out 100028 sa-in 28 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.29.1 p2p
exec ipsec sa add 100029 spi 200029 crypto-alg aes-gcm-128 crypto-key 744672486b4f624964526d66544f4374 esp
exec ipsec sa add 29 spi 100029 crypto-alg aes-gcm-128 crypto-key 744672486b4f624964526d66544f4374 esp
exec ipsec tunnel protect ipip29 sa-out 100029 sa-in 29 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.30.1 p2p
exec ipsec sa add 100030 spi 200030 crypto-alg aes-gcm-128 crypto-key 614f7768514b4d584b44634253664169 esp
exec ipsec sa add 30 spi 100030 crypto-alg aes-gcm-128 crypto-key 614f7768514b4d584b44634253664169 esp
exec ipsec tunnel protect ipip30 sa-out 100030 sa-in 30 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.31.1 p2p
exec ipsec sa add 100031 spi 200031 crypto-alg aes-gcm-128 crypto-key 4a594d434561484e6f6b4f564a6c5556 esp
exec ipsec sa add 31 spi 100031 crypto-alg aes-gcm-128 crypto-key 4a594d434561484e6f6b4f564a6c5556 esp
exec ipsec tunnel protect ipip31 sa-out 100031 sa-in 31 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.32.1 p2p
exec ipsec sa add 100032 spi 200032 crypto-alg aes-gcm-128 crypto-key 685649676f4552704b76787871454c6d esp
exec ipsec sa add 32 spi 100032 crypto-alg aes-gcm-128 crypto-key 685649676f4552704b76787871454c6d esp
exec ipsec tunnel protect ipip32 sa-out 100032 sa-in 32 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.33.1 p2p
exec ipsec sa add 100033 spi 200033 crypto-alg aes-gcm-128 crypto-key 4e7575556e6b4e78696d4d706e505755 esp
exec ipsec sa add 33 spi 100033 crypto-alg aes-gcm-128 crypto-key 4e7575556e6b4e78696d4d706e505755 esp
exec ipsec tunnel protect ipip33 sa-out 100033 sa-in 33 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.34.1 p2p
exec ipsec sa add 100034 spi 200034 crypto-alg aes-gcm-128 crypto-key 5561694b4846506c5148627970704266 esp
exec ipsec sa add 34 spi 100034 crypto-alg aes-gcm-128 crypto-key 5561694b4846506c5148627970704266 esp
exec ipsec tunnel protect ipip34 sa-out 100034 sa-in 34 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.35.1 p2p
exec ipsec sa add 100035 spi 200035 crypto-alg aes-gcm-128 crypto-key 47554e6e6c4e4e7a525358546f45514b esp
exec ipsec sa add 35 spi 100035 crypto-alg aes-gcm-128 crypto-key 47554e6e6c4e4e7a525358546f45514b esp
exec ipsec tunnel protect ipip35 sa-out 100035 sa-in 35 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.36.1 p2p
exec ipsec sa add 100036 spi 200036 crypto-alg aes-gcm-128 crypto-key 50544e616d626357524a567a4c4a4b61 esp
exec ipsec sa add 36 spi 100036 crypto-alg aes-gcm-128 crypto-key 50544e616d626357524a567a4c4a4b61 esp
exec ipsec tunnel protect ipip36 sa-out 100036 sa-in 36 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.37.1 p2p
exec ipsec sa add 100037 spi 200037 crypto-alg aes-gcm-128 crypto-key 78457571676c68454d42747974476667 esp
exec ipsec sa add 37 spi 100037 crypto-alg aes-gcm-128 crypto-key 78457571676c68454d42747974476667 esp
exec ipsec tunnel protect ipip37 sa-out 100037 sa-in 37 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.38.1 p2p
exec ipsec sa add 100038 spi 200038 crypto-alg aes-gcm-128 crypto-key 74624c50504d4c754759716367694464 esp
exec ipsec sa add 38 spi 100038 crypto-alg aes-gcm-128 crypto-key 74624c50504d4c754759716367694464 esp
exec ipsec tunnel protect ipip38 sa-out 100038 sa-in 38 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.39.1 p2p
exec ipsec sa add 100039 spi 200039 crypto-alg aes-gcm-128 crypto-key 6567684476784d6c6d73727a6f674a74 esp
exec ipsec sa add 39 spi 100039 crypto-alg aes-gcm-128 crypto-key 6567684476784d6c6d73727a6f674a74 esp
exec ipsec tunnel protect ipip39 sa-out 100039 sa-in 39 add
exec ip route add 100.0.0.1/8 via 200.0.0.101 TenGigabitEthernet8/0/0
exec set interface unnumbered ipip0 use TenGigabitEthernet8/0/0
exec set interface state ipip0 up
exec ip route add 10.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use TenGigabitEthernet8/0/0
exec set interface state ipip1 up
exec ip route add 10.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use TenGigabitEthernet8/0/0
exec set interface state ipip2 up
exec ip route add 10.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use TenGigabitEthernet8/0/0
exec set interface state ipip3 up
exec ip route add 10.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use TenGigabitEthernet8/0/0
exec set interface state ipip4 up
exec ip route add 10.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use TenGigabitEthernet8/0/0
exec set interface state ipip5 up
exec ip route add 10.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use TenGigabitEthernet8/0/0
exec set interface state ipip6 up
exec ip route add 10.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use TenGigabitEthernet8/0/0
exec set interface state ipip7 up
exec ip route add 10.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use TenGigabitEthernet8/0/0
exec set interface state ipip8 up
exec ip route add 10.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use TenGigabitEthernet8/0/0
exec set interface state ipip9 up
exec ip route add 10.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use TenGigabitEthernet8/0/0
exec set interface state ipip10 up
exec ip route add 10.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use TenGigabitEthernet8/0/0
exec set interface state ipip11 up
exec ip route add 10.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use TenGigabitEthernet8/0/0
exec set interface state ipip12 up
exec ip route add 10.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use TenGigabitEthernet8/0/0
exec set interface state ipip13 up
exec ip route add 10.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use TenGigabitEthernet8/0/0
exec set interface state ipip14 up
exec ip route add 10.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use TenGigabitEthernet8/0/0
exec set interface state ipip15 up
exec ip route add 10.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use TenGigabitEthernet8/0/0
exec set interface state ipip16 up
exec ip route add 10.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use TenGigabitEthernet8/0/0
exec set interface state ipip17 up
exec ip route add 10.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use TenGigabitEthernet8/0/0
exec set interface state ipip18 up
exec ip route add 10.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use TenGigabitEthernet8/0/0
exec set interface state ipip19 up
exec ip route add 10.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use TenGigabitEthernet8/0/0
exec set interface state ipip20 up
exec ip route add 10.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use TenGigabitEthernet8/0/0
exec set interface state ipip21 up
exec ip route add 10.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use TenGigabitEthernet8/0/0
exec set interface state ipip22 up
exec ip route add 10.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use TenGigabitEthernet8/0/0
exec set interface state ipip23 up
exec ip route add 10.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use TenGigabitEthernet8/0/0
exec set interface state ipip24 up
exec ip route add 10.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use TenGigabitEthernet8/0/0
exec set interface state ipip25 up
exec ip route add 10.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use TenGigabitEthernet8/0/0
exec set interface state ipip26 up
exec ip route add 10.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use TenGigabitEthernet8/0/0
exec set interface state ipip27 up
exec ip route add 10.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use TenGigabitEthernet8/0/0
exec set interface state ipip28 up
exec ip route add 10.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use TenGigabitEthernet8/0/0
exec set interface state ipip29 up
exec ip route add 10.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use TenGigabitEthernet8/0/0
exec set interface state ipip30 up
exec ip route add 10.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use TenGigabitEthernet8/0/0
exec set interface state ipip31 up
exec ip route add 10.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use TenGigabitEthernet8/0/0
exec set interface state ipip32 up
exec ip route add 10.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use TenGigabitEthernet8/0/0
exec set interface state ipip33 up
exec ip route add 10.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use TenGigabitEthernet8/0/0
exec set interface state ipip34 up
exec ip route add 10.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use TenGigabitEthernet8/0/0
exec set interface state ipip35 up
exec ip route add 10.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use TenGigabitEthernet8/0/0
exec set interface state ipip36 up
exec ip route add 10.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use TenGigabitEthernet8/0/0
exec set interface state ipip37 up
exec ip route add 10.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use TenGigabitEthernet8/0/0
exec set interface state ipip38 up
exec ip route add 10.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use TenGigabitEthernet8/0/0
exec set interface state ipip39 up
exec ip route add 10.0.0.39/32 via ipip39

 64b-4t4c-ethip4ipsec40tnlsw- 
ip4base-int-aes128gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec set interface ip address TenGigabitEthernet8/0/0 200.0.0.102/24.0
exec create ipip tunnel src 200.0.0.102 dst 100.0.0.1 p2p
exec ipsec sa add 100000 spi 200000 crypto-alg aes-gcm-128 crypto-key 42654d6a4b5a636d48644f64684a5a52 esp
exec ipsec sa add 0 spi 100000 crypto-alg aes-gcm-128 crypto-key 42654d6a4b5a636d48644f64684a5a52 esp
exec ipsec tunnel protect ipip0 sa-out 100000 sa-in 0 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.1.1 p2p
exec ipsec sa add 100001 spi 200001 crypto-alg aes-gcm-128 crypto-key 7170754e7a56634d435a567275735370 esp
exec ipsec sa add 1 spi 100001 crypto-alg aes-gcm-128 crypto-key 7170754e7a56634d435a567275735370 esp
exec ipsec tunnel protect ipip1 sa-out 100001 sa-in 1 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.2.1 p2p
exec ipsec sa add 100002 spi 200002 crypto-alg aes-gcm-128 crypto-key 754e4e686d525a576148686b704d5377 esp
exec ipsec sa add 2 spi 100002 crypto-alg aes-gcm-128 crypto-key 754e4e686d525a576148686b704d5377 esp
exec ipsec tunnel protect ipip2 sa-out 100002 sa-in 2 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.3.1 p2p
exec ipsec sa add 100003 spi 200003 crypto-alg aes-gcm-128 crypto-key 456e7169756a627048517855476d4859 esp
exec ipsec sa add 3 spi 100003 crypto-alg aes-gcm-128 crypto-key 456e7169756a627048517855476d4859 esp
exec ipsec tunnel protect ipip3 sa-out 100003 sa-in 3 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.4.1 p2p
exec ipsec sa add 100004 spi 200004 crypto-alg aes-gcm-128 crypto-key 44524e71637a57776b776f5669547164 esp
exec ipsec sa add 4 spi 100004 crypto-alg aes-gcm-128 crypto-key 44524e71637a57776b776f5669547164 esp
exec ipsec tunnel protect ipip4 sa-out 100004 sa-in 4 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.5.1 p2p
exec ipsec sa add 100005 spi 200005 crypto-alg aes-gcm-128 crypto-key 587a43505844596c49554a6973426a69 esp
exec ipsec sa add 5 spi 100005 crypto-alg aes-gcm-128 crypto-key 587a43505844596c49554a6973426a69 esp
exec ipsec tunnel protect ipip5 sa-out 100005 sa-in 5 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.6.1 p2p
exec ipsec sa add 100006 spi 200006 crypto-alg aes-gcm-128 crypto-key 62476c6273794668447253445a546a74 esp
exec ipsec sa add 6 spi 100006 crypto-alg aes-gcm-128 crypto-key 62476c6273794668447253445a546a74 esp
exec ipsec tunnel protect ipip6 sa-out 100006 sa-in 6 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.7.1 p2p
exec ipsec sa add 100007 spi 200007 crypto-alg aes-gcm-128 crypto-key 64556e4676767366516e67596e667850 esp
exec ipsec sa add 7 spi 100007 crypto-alg aes-gcm-128 crypto-key 64556e4676767366516e67596e667850 esp
exec ipsec tunnel protect ipip7 sa-out 100007 sa-in 7 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.8.1 p2p
exec ipsec sa add 100008 spi 200008 crypto-alg aes-gcm-128 crypto-key 53726c6d585349616c46654f596d4c6d esp
exec ipsec sa add 8 spi 100008 crypto-alg aes-gcm-128 crypto-key 53726c6d585349616c46654f596d4c6d esp
exec ipsec tunnel protect ipip8 sa-out 100008 sa-in 8 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.9.1 p2p
exec ipsec sa add 100009 spi 200009 crypto-alg aes-gcm-128 crypto-key 7748775659614678447163566b725473 esp
exec ipsec sa add 9 spi 100009 crypto-alg aes-gcm-128 crypto-key 7748775659614678447163566b725473 esp
exec ipsec tunnel protect ipip9 sa-out 100009 sa-in 9 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.10.1 p2p
exec ipsec sa add 100010 spi 200010 crypto-alg aes-gcm-128 crypto-key 746d5462544c48654444676a436f6545 esp
exec ipsec sa add 10 spi 100010 crypto-alg aes-gcm-128 crypto-key 746d5462544c48654444676a436f6545 esp
exec ipsec tunnel protect ipip10 sa-out 100010 sa-in 10 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.11.1 p2p
exec ipsec sa add 100011 spi 200011 crypto-alg aes-gcm-128 crypto-key 584c567051616a424771594451796a69 esp
exec ipsec sa add 11 spi 100011 crypto-alg aes-gcm-128 crypto-key 584c567051616a424771594451796a69 esp
exec ipsec tunnel protect ipip11 sa-out 100011 sa-in 11 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.12.1 p2p
exec ipsec sa add 100012 spi 200012 crypto-alg aes-gcm-128 crypto-key 494c6279796849746568617457676461 esp
exec ipsec sa add 12 spi 100012 crypto-alg aes-gcm-128 crypto-key 494c6279796849746568617457676461 esp
exec ipsec tunnel protect ipip12 sa-out 100012 sa-in 12 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.13.1 p2p
exec ipsec sa add 100013 spi 200013 crypto-alg aes-gcm-128 crypto-key 6c4c4e656a69506a636859726e746766 esp
exec ipsec sa add 13 spi 100013 crypto-alg aes-gcm-128 crypto-key 6c4c4e656a69506a636859726e746766 esp
exec ipsec tunnel protect ipip13 sa-out 100013 sa-in 13 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.14.1 p2p
exec ipsec sa add 100014 spi 200014 crypto-alg aes-gcm-128 crypto-key 7762424443715754765378765a657359 esp
exec ipsec sa add 14 spi 100014 crypto-alg aes-gcm-128 crypto-key 7762424443715754765378765a657359 esp
exec ipsec tunnel protect ipip14 sa-out 100014 sa-in 14 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.15.1 p2p
exec ipsec sa add 100015 spi 200015 crypto-alg aes-gcm-128 crypto-key 67627044484857767148724a76476668 esp
exec ipsec sa add 15 spi 100015 crypto-alg aes-gcm-128 crypto-key 67627044484857767148724a76476668 esp
exec ipsec tunnel protect ipip15 sa-out 100015 sa-in 15 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.16.1 p2p
exec ipsec sa add 100016 spi 200016 crypto-alg aes-gcm-128 crypto-key 4b4b6c61727a6d6f736e784a636e6447 esp
exec ipsec sa add 16 spi 100016 crypto-alg aes-gcm-128 crypto-key 4b4b6c61727a6d6f736e784a636e6447 esp
exec ipsec tunnel protect ipip16 sa-out 100016 sa-in 16 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.17.1 p2p
exec ipsec sa add 100017 spi 200017 crypto-alg aes-gcm-128 crypto-key 71644956487347504e616f706b5a556e esp
exec ipsec sa add 17 spi 100017 crypto-alg aes-gcm-128 crypto-key 71644956487347504e616f706b5a556e esp
exec ipsec tunnel protect ipip17 sa-out 100017 sa-in 17 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.18.1 p2p
exec ipsec sa add 100018 spi 200018 crypto-alg aes-gcm-128 crypto-key 58756d62624e6e73636a546e48776f52 esp
exec ipsec sa add 18 spi 100018 crypto-alg aes-gcm-128 crypto-key 58756d62624e6e73636a546e48776f52 esp
exec ipsec tunnel protect ipip18 sa-out 100018 sa-in 18 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.19.1 p2p
exec ipsec sa add 100019 spi 200019 crypto-alg aes-gcm-128 crypto-key 48435065445a6e4f474d675053515057 esp
exec ipsec sa add 19 spi 100019 crypto-alg aes-gcm-128 crypto-key 48435065445a6e4f474d675053515057 esp
exec ipsec tunnel protect ipip19 sa-out 100019 sa-in 19 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.20.1 p2p
exec ipsec sa add 100020 spi 200020 crypto-alg aes-gcm-128 crypto-key 416d466a415669495573516f794b4a6a esp
exec ipsec sa add 20 spi 100020 crypto-alg aes-gcm-128 crypto-key 416d466a415669495573516f794b4a6a esp
exec ipsec tunnel protect ipip20 sa-out 100020 sa-in 20 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.21.1 p2p
exec ipsec sa add 100021 spi 200021 crypto-alg aes-gcm-128 crypto-key 49484d65754f43706e48516c4b59516c esp
exec ipsec sa add 21 spi 100021 crypto-alg aes-gcm-128 crypto-key 49484d65754f43706e48516c4b59516c esp
exec ipsec tunnel protect ipip21 sa-out 100021 sa-in 21 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.22.1 p2p
exec ipsec sa add 100022 spi 200022 crypto-alg aes-gcm-128 crypto-key 78494659726a6f6b48436f654a465547 esp
exec ipsec sa add 22 spi 100022 crypto-alg aes-gcm-128 crypto-key 78494659726a6f6b48436f654a465547 esp
exec ipsec tunnel protect ipip22 sa-out 100022 sa-in 22 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.23.1 p2p
exec ipsec sa add 100023 spi 200023 crypto-alg aes-gcm-128 crypto-key 506249736d4d5062594465664759796d esp
exec ipsec sa add 23 spi 100023 crypto-alg aes-gcm-128 crypto-key 506249736d4d5062594465664759796d esp
exec ipsec tunnel protect ipip23 sa-out 100023 sa-in 23 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.24.1 p2p
exec ipsec sa add 100024 spi 200024 crypto-alg aes-gcm-128 crypto-key 45585367586c4b464e7379566f4a4d44 esp
exec ipsec sa add 24 spi 100024 crypto-alg aes-gcm-128 crypto-key 45585367586c4b464e7379566f4a4d44 esp
exec ipsec tunnel protect ipip24 sa-out 100024 sa-in 24 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.25.1 p2p
exec ipsec sa add 100025 spi 200025 crypto-alg aes-gcm-128 crypto-key 51437461424d4e4d4f6b4d5771775143 esp
exec ipsec sa add 25 spi 100025 crypto-alg aes-gcm-128 crypto-key 51437461424d4e4d4f6b4d5771775143 esp
exec ipsec tunnel protect ipip25 sa-out 100025 sa-in 25 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.26.1 p2p
exec ipsec sa add 100026 spi 200026 crypto-alg aes-gcm-128 crypto-key 794e626666475157466a4c626154666e esp
exec ipsec sa add 26 spi 100026 crypto-alg aes-gcm-128 crypto-key 794e626666475157466a4c626154666e esp
exec ipsec tunnel protect ipip26 sa-out 100026 sa-in 26 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.27.1 p2p
exec ipsec sa add 100027 spi 200027 crypto-alg aes-gcm-128 crypto-key 4759557a695643756e4e554168646e6d esp
exec ipsec sa add 27 spi 100027 crypto-alg aes-gcm-128 crypto-key 4759557a695643756e4e554168646e6d esp
exec ipsec tunnel protect ipip27 sa-out 100027 sa-in 27 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.28.1 p2p
exec ipsec sa add 100028 spi 200028 crypto-alg aes-gcm-128 crypto-key 505a697849766868437a49556a544952 esp
exec ipsec sa add 28 spi 100028 crypto-alg aes-gcm-128 crypto-key 505a697849766868437a49556a544952 esp
exec ipsec tunnel protect ipip28 sa-out 100028 sa-in 28 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.29.1 p2p
exec ipsec sa add 100029 spi 200029 crypto-alg aes-gcm-128 crypto-key 5563586b675a4a434561766e725a7149 esp
exec ipsec sa add 29 spi 100029 crypto-alg aes-gcm-128 crypto-key 5563586b675a4a434561766e725a7149 esp
exec ipsec tunnel protect ipip29 sa-out 100029 sa-in 29 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.30.1 p2p
exec ipsec sa add 100030 spi 200030 crypto-alg aes-gcm-128 crypto-key 684761555a4e69454b6b4164744a7946 esp
exec ipsec sa add 30 spi 100030 crypto-alg aes-gcm-128 crypto-key 684761555a4e69454b6b4164744a7946 esp
exec ipsec tunnel protect ipip30 sa-out 100030 sa-in 30 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.31.1 p2p
exec ipsec sa add 100031 spi 200031 crypto-alg aes-gcm-128 crypto-key 4453696e71615a626f6c547a475a4f62 esp
exec ipsec sa add 31 spi 100031 crypto-alg aes-gcm-128 crypto-key 4453696e71615a626f6c547a475a4f62 esp
exec ipsec tunnel protect ipip31 sa-out 100031 sa-in 31 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.32.1 p2p
exec ipsec sa add 100032 spi 200032 crypto-alg aes-gcm-128 crypto-key 7342474d75434f745075796652634550 esp
exec ipsec sa add 32 spi 100032 crypto-alg aes-gcm-128 crypto-key 7342474d75434f745075796652634550 esp
exec ipsec tunnel protect ipip32 sa-out 100032 sa-in 32 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.33.1 p2p
exec ipsec sa add 100033 spi 200033 crypto-alg aes-gcm-128 crypto-key 6a5762756e6245585a7a52596f4a6156 esp
exec ipsec sa add 33 spi 100033 crypto-alg aes-gcm-128 crypto-key 6a5762756e6245585a7a52596f4a6156 esp
exec ipsec tunnel protect ipip33 sa-out 100033 sa-in 33 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.34.1 p2p
exec ipsec sa add 100034 spi 200034 crypto-alg aes-gcm-128 crypto-key 4950775a434a7453704e564855504a70 esp
exec ipsec sa add 34 spi 100034 crypto-alg aes-gcm-128 crypto-key 4950775a434a7453704e564855504a70 esp
exec ipsec tunnel protect ipip34 sa-out 100034 sa-in 34 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.35.1 p2p
exec ipsec sa add 100035 spi 200035 crypto-alg aes-gcm-128 crypto-key 61644d43496a574d7a75566973627252 esp
exec ipsec sa add 35 spi 100035 crypto-alg aes-gcm-128 crypto-key 61644d43496a574d7a75566973627252 esp
exec ipsec tunnel protect ipip35 sa-out 100035 sa-in 35 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.36.1 p2p
exec ipsec sa add 100036 spi 200036 crypto-alg aes-gcm-128 crypto-key 69506972645070787242796359477272 esp
exec ipsec sa add 36 spi 100036 crypto-alg aes-gcm-128 crypto-key 69506972645070787242796359477272 esp
exec ipsec tunnel protect ipip36 sa-out 100036 sa-in 36 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.37.1 p2p
exec ipsec sa add 100037 spi 200037 crypto-alg aes-gcm-128 crypto-key 5941774f4443426b754d585374474863 esp
exec ipsec sa add 37 spi 100037 crypto-alg aes-gcm-128 crypto-key 5941774f4443426b754d585374474863 esp
exec ipsec tunnel protect ipip37 sa-out 100037 sa-in 37 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.38.1 p2p
exec ipsec sa add 100038 spi 200038 crypto-alg aes-gcm-128 crypto-key 7968645362575349745153596e477a71 esp
exec ipsec sa add 38 spi 100038 crypto-alg aes-gcm-128 crypto-key 7968645362575349745153596e477a71 esp
exec ipsec tunnel protect ipip38 sa-out 100038 sa-in 38 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.39.1 p2p
exec ipsec sa add 100039 spi 200039 crypto-alg aes-gcm-128 crypto-key 764e427661745a646b674d4f50747449 esp
exec ipsec sa add 39 spi 100039 crypto-alg aes-gcm-128 crypto-key 764e427661745a646b674d4f50747449 esp
exec ipsec tunnel protect ipip39 sa-out 100039 sa-in 39 add
exec ip route add 100.0.0.1/8 via 200.0.0.101 TenGigabitEthernet8/0/0
exec set interface unnumbered ipip0 use TenGigabitEthernet8/0/0
exec set interface state ipip0 up
exec ip route add 10.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use TenGigabitEthernet8/0/0
exec set interface state ipip1 up
exec ip route add 10.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use TenGigabitEthernet8/0/0
exec set interface state ipip2 up
exec ip route add 10.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use TenGigabitEthernet8/0/0
exec set interface state ipip3 up
exec ip route add 10.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use TenGigabitEthernet8/0/0
exec set interface state ipip4 up
exec ip route add 10.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use TenGigabitEthernet8/0/0
exec set interface state ipip5 up
exec ip route add 10.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use TenGigabitEthernet8/0/0
exec set interface state ipip6 up
exec ip route add 10.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use TenGigabitEthernet8/0/0
exec set interface state ipip7 up
exec ip route add 10.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use TenGigabitEthernet8/0/0
exec set interface state ipip8 up
exec ip route add 10.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use TenGigabitEthernet8/0/0
exec set interface state ipip9 up
exec ip route add 10.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use TenGigabitEthernet8/0/0
exec set interface state ipip10 up
exec ip route add 10.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use TenGigabitEthernet8/0/0
exec set interface state ipip11 up
exec ip route add 10.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use TenGigabitEthernet8/0/0
exec set interface state ipip12 up
exec ip route add 10.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use TenGigabitEthernet8/0/0
exec set interface state ipip13 up
exec ip route add 10.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use TenGigabitEthernet8/0/0
exec set interface state ipip14 up
exec ip route add 10.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use TenGigabitEthernet8/0/0
exec set interface state ipip15 up
exec ip route add 10.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use TenGigabitEthernet8/0/0
exec set interface state ipip16 up
exec ip route add 10.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use TenGigabitEthernet8/0/0
exec set interface state ipip17 up
exec ip route add 10.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use TenGigabitEthernet8/0/0
exec set interface state ipip18 up
exec ip route add 10.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use TenGigabitEthernet8/0/0
exec set interface state ipip19 up
exec ip route add 10.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use TenGigabitEthernet8/0/0
exec set interface state ipip20 up
exec ip route add 10.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use TenGigabitEthernet8/0/0
exec set interface state ipip21 up
exec ip route add 10.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use TenGigabitEthernet8/0/0
exec set interface state ipip22 up
exec ip route add 10.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use TenGigabitEthernet8/0/0
exec set interface state ipip23 up
exec ip route add 10.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use TenGigabitEthernet8/0/0
exec set interface state ipip24 up
exec ip route add 10.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use TenGigabitEthernet8/0/0
exec set interface state ipip25 up
exec ip route add 10.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use TenGigabitEthernet8/0/0
exec set interface state ipip26 up
exec ip route add 10.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use TenGigabitEthernet8/0/0
exec set interface state ipip27 up
exec ip route add 10.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use TenGigabitEthernet8/0/0
exec set interface state ipip28 up
exec ip route add 10.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use TenGigabitEthernet8/0/0
exec set interface state ipip29 up
exec ip route add 10.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use TenGigabitEthernet8/0/0
exec set interface state ipip30 up
exec ip route add 10.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use TenGigabitEthernet8/0/0
exec set interface state ipip31 up
exec ip route add 10.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use TenGigabitEthernet8/0/0
exec set interface state ipip32 up
exec ip route add 10.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use TenGigabitEthernet8/0/0
exec set interface state ipip33 up
exec ip route add 10.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use TenGigabitEthernet8/0/0
exec set interface state ipip34 up
exec ip route add 10.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use TenGigabitEthernet8/0/0
exec set interface state ipip35 up
exec ip route add 10.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use TenGigabitEthernet8/0/0
exec set interface state ipip36 up
exec ip route add 10.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use TenGigabitEthernet8/0/0
exec set interface state ipip37 up
exec ip route add 10.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use TenGigabitEthernet8/0/0
exec set interface state ipip38 up
exec ip route add 10.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use TenGigabitEthernet8/0/0
exec set interface state ipip39 up
exec ip route add 10.0.0.39/32 via ipip39

 1518b-1t1c-ethip4ipsec40tnlsw- 
ip4base-int-aes128gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec set interface ip address TenGigabitEthernet8/0/0 200.0.0.102/24.0
exec create ipip tunnel src 200.0.0.102 dst 100.0.0.1 p2p
exec ipsec sa add 100000 spi 200000 crypto-alg aes-gcm-128 crypto-key 47614a586c517443447975544c754150 esp
exec ipsec sa add 0 spi 100000 crypto-alg aes-gcm-128 crypto-key 47614a586c517443447975544c754150 esp
exec ipsec tunnel protect ipip0 sa-out 100000 sa-in 0 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.1.1 p2p
exec ipsec sa add 100001 spi 200001 crypto-alg aes-gcm-128 crypto-key 45446b56565a69475549414c76736f49 esp
exec ipsec sa add 1 spi 100001 crypto-alg aes-gcm-128 crypto-key 45446b56565a69475549414c76736f49 esp
exec ipsec tunnel protect ipip1 sa-out 100001 sa-in 1 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.2.1 p2p
exec ipsec sa add 100002 spi 200002 crypto-alg aes-gcm-128 crypto-key 5879666168714b6e42746348566a6672 esp
exec ipsec sa add 2 spi 100002 crypto-alg aes-gcm-128 crypto-key 5879666168714b6e42746348566a6672 esp
exec ipsec tunnel protect ipip2 sa-out 100002 sa-in 2 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.3.1 p2p
exec ipsec sa add 100003 spi 200003 crypto-alg aes-gcm-128 crypto-key 4144585253586e5241484e786d6d7a66 esp
exec ipsec sa add 3 spi 100003 crypto-alg aes-gcm-128 crypto-key 4144585253586e5241484e786d6d7a66 esp
exec ipsec tunnel protect ipip3 sa-out 100003 sa-in 3 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.4.1 p2p
exec ipsec sa add 100004 spi 200004 crypto-alg aes-gcm-128 crypto-key 4e4350726b59526a736d4c61734d6c53 esp
exec ipsec sa add 4 spi 100004 crypto-alg aes-gcm-128 crypto-key 4e4350726b59526a736d4c61734d6c53 esp
exec ipsec tunnel protect ipip4 sa-out 100004 sa-in 4 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.5.1 p2p
exec ipsec sa add 100005 spi 200005 crypto-alg aes-gcm-128 crypto-key 615a4c68786f59484d4c46504a484870 esp
exec ipsec sa add 5 spi 100005 crypto-alg aes-gcm-128 crypto-key 615a4c68786f59484d4c46504a484870 esp
exec ipsec tunnel protect ipip5 sa-out 100005 sa-in 5 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.6.1 p2p
exec ipsec sa add 100006 spi 200006 crypto-alg aes-gcm-128 crypto-key 4542415a55464468567470594a756f74 esp
exec ipsec sa add 6 spi 100006 crypto-alg aes-gcm-128 crypto-key 4542415a55464468567470594a756f74 esp
exec ipsec tunnel protect ipip6 sa-out 100006 sa-in 6 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.7.1 p2p
exec ipsec sa add 100007 spi 200007 crypto-alg aes-gcm-128 crypto-key 7662574258545a4e6848486a58486167 esp
exec ipsec sa add 7 spi 100007 crypto-alg aes-gcm-128 crypto-key 7662574258545a4e6848486a58486167 esp
exec ipsec tunnel protect ipip7 sa-out 100007 sa-in 7 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.8.1 p2p
exec ipsec sa add 100008 spi 200008 crypto-alg aes-gcm-128 crypto-key 68765158794a6a4b734c724748445052 esp
exec ipsec sa add 8 spi 100008 crypto-alg aes-gcm-128 crypto-key 68765158794a6a4b734c724748445052 esp
exec ipsec tunnel protect ipip8 sa-out 100008 sa-in 8 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.9.1 p2p
exec ipsec sa add 100009 spi 200009 crypto-alg aes-gcm-128 crypto-key 6776584c444e6e726778655849687463 esp
exec ipsec sa add 9 spi 100009 crypto-alg aes-gcm-128 crypto-key 6776584c444e6e726778655849687463 esp
exec ipsec tunnel protect ipip9 sa-out 100009 sa-in 9 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.10.1 p2p
exec ipsec sa add 100010 spi 200010 crypto-alg aes-gcm-128 crypto-key 4a7256496e5a4e6d4b71447964514754 esp
exec ipsec sa add 10 spi 100010 crypto-alg aes-gcm-128 crypto-key 4a7256496e5a4e6d4b71447964514754 esp
exec ipsec tunnel protect ipip10 sa-out 100010 sa-in 10 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.11.1 p2p
exec ipsec sa add 100011 spi 200011 crypto-alg aes-gcm-128 crypto-key 4c735a445a53744257717469586d5652 esp
exec ipsec sa add 11 spi 100011 crypto-alg aes-gcm-128 crypto-key 4c735a445a53744257717469586d5652 esp
exec ipsec tunnel protect ipip11 sa-out 100011 sa-in 11 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.12.1 p2p
exec ipsec sa add 100012 spi 200012 crypto-alg aes-gcm-128 crypto-key 4d4a51666f59554a77554a79446e516b esp
exec ipsec sa add 12 spi 100012 crypto-alg aes-gcm-128 crypto-key 4d4a51666f59554a77554a79446e516b esp
exec ipsec tunnel protect ipip12 sa-out 100012 sa-in 12 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.13.1 p2p
exec ipsec sa add 100013 spi 200013 crypto-alg aes-gcm-128 crypto-key 65447050464d426778734e4854626f4e esp
exec ipsec sa add 13 spi 100013 crypto-alg aes-gcm-128 crypto-key 65447050464d426778734e4854626f4e esp
exec ipsec tunnel protect ipip13 sa-out 100013 sa-in 13 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.14.1 p2p
exec ipsec sa add 100014 spi 200014 crypto-alg aes-gcm-128 crypto-key 686b58486648505374644c756b657042 esp
exec ipsec sa add 14 spi 100014 crypto-alg aes-gcm-128 crypto-key 686b58486648505374644c756b657042 esp
exec ipsec tunnel protect ipip14 sa-out 100014 sa-in 14 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.15.1 p2p
exec ipsec sa add 100015 spi 200015 crypto-alg aes-gcm-128 crypto-key 7972634d5a62595a6d6a624c4b6e5457 esp
exec ipsec sa add 15 spi 100015 crypto-alg aes-gcm-128 crypto-key 7972634d5a62595a6d6a624c4b6e5457 esp
exec ipsec tunnel protect ipip15 sa-out 100015 sa-in 15 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.16.1 p2p
exec ipsec sa add 100016 spi 200016 crypto-alg aes-gcm-128 crypto-key 4a7a6e736a456863646f666d796c6e6e esp
exec ipsec sa add 16 spi 100016 crypto-alg aes-gcm-128 crypto-key 4a7a6e736a456863646f666d796c6e6e esp
exec ipsec tunnel protect ipip16 sa-out 100016 sa-in 16 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.17.1 p2p
exec ipsec sa add 100017 spi 200017 crypto-alg aes-gcm-128 crypto-key 616f7a5358436870584c4a774f6c6b4e esp
exec ipsec sa add 17 spi 100017 crypto-alg aes-gcm-128 crypto-key 616f7a5358436870584c4a774f6c6b4e esp
exec ipsec tunnel protect ipip17 sa-out 100017 sa-in 17 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.18.1 p2p
exec ipsec sa add 100018 spi 200018 crypto-alg aes-gcm-128 crypto-key 51485068567143616f49666468444366 esp
exec ipsec sa add 18 spi 100018 crypto-alg aes-gcm-128 crypto-key 51485068567143616f49666468444366 esp
exec ipsec tunnel protect ipip18 sa-out 100018 sa-in 18 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.19.1 p2p
exec ipsec sa add 100019 spi 200019 crypto-alg aes-gcm-128 crypto-key 41585a56654b41636551654d416f6d46 esp
exec ipsec sa add 19 spi 100019 crypto-alg aes-gcm-128 crypto-key 41585a56654b41636551654d416f6d46 esp
exec ipsec tunnel protect ipip19 sa-out 100019 sa-in 19 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.20.1 p2p
exec ipsec sa add 100020 spi 200020 crypto-alg aes-gcm-128 crypto-key 414e494b476c704b5875646a59566763 esp
exec ipsec sa add 20 spi 100020 crypto-alg aes-gcm-128 crypto-key 414e494b476c704b5875646a59566763 esp
exec ipsec tunnel protect ipip20 sa-out 100020 sa-in 20 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.21.1 p2p
exec ipsec sa add 100021 spi 200021 crypto-alg aes-gcm-128 crypto-key 5571627849586d576366656c53675157 esp
exec ipsec sa add 21 spi 100021 crypto-alg aes-gcm-128 crypto-key 5571627849586d576366656c53675157 esp
exec ipsec tunnel protect ipip21 sa-out 100021 sa-in 21 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.22.1 p2p
exec ipsec sa add 100022 spi 200022 crypto-alg aes-gcm-128 crypto-key 67586143546e746851515a507a627451 esp
exec ipsec sa add 22 spi 100022 crypto-alg aes-gcm-128 crypto-key 67586143546e746851515a507a627451 esp
exec ipsec tunnel protect ipip22 sa-out 100022 sa-in 22 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.23.1 p2p
exec ipsec sa add 100023 spi 200023 crypto-alg aes-gcm-128 crypto-key 506d7a46424d7678475a6a616e787278 esp
exec ipsec sa add 23 spi 100023 crypto-alg aes-gcm-128 crypto-key 506d7a46424d7678475a6a616e787278 esp
exec ipsec tunnel protect ipip23 sa-out 100023 sa-in 23 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.24.1 p2p
exec ipsec sa add 100024 spi 200024 crypto-alg aes-gcm-128 crypto-key 4f476a70414a50754246664256685442 esp
exec ipsec sa add 24 spi 100024 crypto-alg aes-gcm-128 crypto-key 4f476a70414a50754246664256685442 esp
exec ipsec tunnel protect ipip24 sa-out 100024 sa-in 24 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.25.1 p2p
exec ipsec sa add 100025 spi 200025 crypto-alg aes-gcm-128 crypto-key 6a4e58685556435351464d6b706c5772 esp
exec ipsec sa add 25 spi 100025 crypto-alg aes-gcm-128 crypto-key 6a4e58685556435351464d6b706c5772 esp
exec ipsec tunnel protect ipip25 sa-out 100025 sa-in 25 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.26.1 p2p
exec ipsec sa add 100026 spi 200026 crypto-alg aes-gcm-128 crypto-key 4c447549486b736e42665147424f734f esp
exec ipsec sa add 26 spi 100026 crypto-alg aes-gcm-128 crypto-key 4c447549486b736e42665147424f734f esp
exec ipsec tunnel protect ipip26 sa-out 100026 sa-in 26 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.27.1 p2p
exec ipsec sa add 100027 spi 200027 crypto-alg aes-gcm-128 crypto-key 686c4b55436a7146754d626e75757248 esp
exec ipsec sa add 27 spi 100027 crypto-alg aes-gcm-128 crypto-key 686c4b55436a7146754d626e75757248 esp
exec ipsec tunnel protect ipip27 sa-out 100027 sa-in 27 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.28.1 p2p
exec ipsec sa add 100028 spi 200028 crypto-alg aes-gcm-128 crypto-key 6244565064684a42716e4259444b5661 esp
exec ipsec sa add 28 spi 100028 crypto-alg aes-gcm-128 crypto-key 6244565064684a42716e4259444b5661 esp
exec ipsec tunnel protect ipip28 sa-out 100028 sa-in 28 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.29.1 p2p
exec ipsec sa add 100029 spi 200029 crypto-alg aes-gcm-128 crypto-key 76525563784450636465626f6642494f esp
exec ipsec sa add 29 spi 100029 crypto-alg aes-gcm-128 crypto-key 76525563784450636465626f6642494f esp
exec ipsec tunnel protect ipip29 sa-out 100029 sa-in 29 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.30.1 p2p
exec ipsec sa add 100030 spi 200030 crypto-alg aes-gcm-128 crypto-key 6145766e4d6c6d556273794748515146 esp
exec ipsec sa add 30 spi 100030 crypto-alg aes-gcm-128 crypto-key 6145766e4d6c6d556273794748515146 esp
exec ipsec tunnel protect ipip30 sa-out 100030 sa-in 30 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.31.1 p2p
exec ipsec sa add 100031 spi 200031 crypto-alg aes-gcm-128 crypto-key 52447a494751506b4c4b6241654c6254 esp
exec ipsec sa add 31 spi 100031 crypto-alg aes-gcm-128 crypto-key 52447a494751506b4c4b6241654c6254 esp
exec ipsec tunnel protect ipip31 sa-out 100031 sa-in 31 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.32.1 p2p
exec ipsec sa add 100032 spi 200032 crypto-alg aes-gcm-128 crypto-key 6247565656546757674a584d44507745 esp
exec ipsec sa add 32 spi 100032 crypto-alg aes-gcm-128 crypto-key 6247565656546757674a584d44507745 esp
exec ipsec tunnel protect ipip32 sa-out 100032 sa-in 32 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.33.1 p2p
exec ipsec sa add 100033 spi 200033 crypto-alg aes-gcm-128 crypto-key 4741515162754b5962434e5642537867 esp
exec ipsec sa add 33 spi 100033 crypto-alg aes-gcm-128 crypto-key 4741515162754b5962434e5642537867 esp
exec ipsec tunnel protect ipip33 sa-out 100033 sa-in 33 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.34.1 p2p
exec ipsec sa add 100034 spi 200034 crypto-alg aes-gcm-128 crypto-key 6b4e434c504c46477246756f5946686f esp
exec ipsec sa add 34 spi 100034 crypto-alg aes-gcm-128 crypto-key 6b4e434c504c46477246756f5946686f esp
exec ipsec tunnel protect ipip34 sa-out 100034 sa-in 34 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.35.1 p2p
exec ipsec sa add 100035 spi 200035 crypto-alg aes-gcm-128 crypto-key 7059656b506c797069644c486d796168 esp
exec ipsec sa add 35 spi 100035 crypto-alg aes-gcm-128 crypto-key 7059656b506c797069644c486d796168 esp
exec ipsec tunnel protect ipip35 sa-out 100035 sa-in 35 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.36.1 p2p
exec ipsec sa add 100036 spi 200036 crypto-alg aes-gcm-128 crypto-key 6e725a4c5555624d6774554b42496a50 esp
exec ipsec sa add 36 spi 100036 crypto-alg aes-gcm-128 crypto-key 6e725a4c5555624d6774554b42496a50 esp
exec ipsec tunnel protect ipip36 sa-out 100036 sa-in 36 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.37.1 p2p
exec ipsec sa add 100037 spi 200037 crypto-alg aes-gcm-128 crypto-key 616a49527070504e7551777a6c71644c esp
exec ipsec sa add 37 spi 100037 crypto-alg aes-gcm-128 crypto-key 616a49527070504e7551777a6c71644c esp
exec ipsec tunnel protect ipip37 sa-out 100037 sa-in 37 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.38.1 p2p
exec ipsec sa add 100038 spi 200038 crypto-alg aes-gcm-128 crypto-key 774c7361564f7055534a646d4a66676f esp
exec ipsec sa add 38 spi 100038 crypto-alg aes-gcm-128 crypto-key 774c7361564f7055534a646d4a66676f esp
exec ipsec tunnel protect ipip38 sa-out 100038 sa-in 38 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.39.1 p2p
exec ipsec sa add 100039 spi 200039 crypto-alg aes-gcm-128 crypto-key 67426147716d47624c506d4472476768 esp
exec ipsec sa add 39 spi 100039 crypto-alg aes-gcm-128 crypto-key 67426147716d47624c506d4472476768 esp
exec ipsec tunnel protect ipip39 sa-out 100039 sa-in 39 add
exec ip route add 100.0.0.1/8 via 200.0.0.101 TenGigabitEthernet8/0/0
exec set interface unnumbered ipip0 use TenGigabitEthernet8/0/0
exec set interface state ipip0 up
exec ip route add 10.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use TenGigabitEthernet8/0/0
exec set interface state ipip1 up
exec ip route add 10.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use TenGigabitEthernet8/0/0
exec set interface state ipip2 up
exec ip route add 10.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use TenGigabitEthernet8/0/0
exec set interface state ipip3 up
exec ip route add 10.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use TenGigabitEthernet8/0/0
exec set interface state ipip4 up
exec ip route add 10.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use TenGigabitEthernet8/0/0
exec set interface state ipip5 up
exec ip route add 10.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use TenGigabitEthernet8/0/0
exec set interface state ipip6 up
exec ip route add 10.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use TenGigabitEthernet8/0/0
exec set interface state ipip7 up
exec ip route add 10.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use TenGigabitEthernet8/0/0
exec set interface state ipip8 up
exec ip route add 10.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use TenGigabitEthernet8/0/0
exec set interface state ipip9 up
exec ip route add 10.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use TenGigabitEthernet8/0/0
exec set interface state ipip10 up
exec ip route add 10.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use TenGigabitEthernet8/0/0
exec set interface state ipip11 up
exec ip route add 10.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use TenGigabitEthernet8/0/0
exec set interface state ipip12 up
exec ip route add 10.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use TenGigabitEthernet8/0/0
exec set interface state ipip13 up
exec ip route add 10.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use TenGigabitEthernet8/0/0
exec set interface state ipip14 up
exec ip route add 10.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use TenGigabitEthernet8/0/0
exec set interface state ipip15 up
exec ip route add 10.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use TenGigabitEthernet8/0/0
exec set interface state ipip16 up
exec ip route add 10.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use TenGigabitEthernet8/0/0
exec set interface state ipip17 up
exec ip route add 10.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use TenGigabitEthernet8/0/0
exec set interface state ipip18 up
exec ip route add 10.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use TenGigabitEthernet8/0/0
exec set interface state ipip19 up
exec ip route add 10.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use TenGigabitEthernet8/0/0
exec set interface state ipip20 up
exec ip route add 10.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use TenGigabitEthernet8/0/0
exec set interface state ipip21 up
exec ip route add 10.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use TenGigabitEthernet8/0/0
exec set interface state ipip22 up
exec ip route add 10.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use TenGigabitEthernet8/0/0
exec set interface state ipip23 up
exec ip route add 10.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use TenGigabitEthernet8/0/0
exec set interface state ipip24 up
exec ip route add 10.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use TenGigabitEthernet8/0/0
exec set interface state ipip25 up
exec ip route add 10.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use TenGigabitEthernet8/0/0
exec set interface state ipip26 up
exec ip route add 10.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use TenGigabitEthernet8/0/0
exec set interface state ipip27 up
exec ip route add 10.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use TenGigabitEthernet8/0/0
exec set interface state ipip28 up
exec ip route add 10.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use TenGigabitEthernet8/0/0
exec set interface state ipip29 up
exec ip route add 10.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use TenGigabitEthernet8/0/0
exec set interface state ipip30 up
exec ip route add 10.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use TenGigabitEthernet8/0/0
exec set interface state ipip31 up
exec ip route add 10.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use TenGigabitEthernet8/0/0
exec set interface state ipip32 up
exec ip route add 10.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use TenGigabitEthernet8/0/0
exec set interface state ipip33 up
exec ip route add 10.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use TenGigabitEthernet8/0/0
exec set interface state ipip34 up
exec ip route add 10.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use TenGigabitEthernet8/0/0
exec set interface state ipip35 up
exec ip route add 10.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use TenGigabitEthernet8/0/0
exec set interface state ipip36 up
exec ip route add 10.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use TenGigabitEthernet8/0/0
exec set interface state ipip37 up
exec ip route add 10.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use TenGigabitEthernet8/0/0
exec set interface state ipip38 up
exec ip route add 10.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use TenGigabitEthernet8/0/0
exec set interface state ipip39 up
exec ip route add 10.0.0.39/32 via ipip39

 1518b-2t2c-ethip4ipsec40tnlsw- 
ip4base-int-aes128gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec set interface ip address TenGigabitEthernet8/0/0 200.0.0.102/24.0
exec create ipip tunnel src 200.0.0.102 dst 100.0.0.1 p2p
exec ipsec sa add 100000 spi 200000 crypto-alg aes-gcm-128 crypto-key 4f46424d69487677746d6c7763436b78 esp
exec ipsec sa add 0 spi 100000 crypto-alg aes-gcm-128 crypto-key 4f46424d69487677746d6c7763436b78 esp
exec ipsec tunnel protect ipip0 sa-out 100000 sa-in 0 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.1.1 p2p
exec ipsec sa add 100001 spi 200001 crypto-alg aes-gcm-128 crypto-key 6c73564a42794d7a5773455065614271 esp
exec ipsec sa add 1 spi 100001 crypto-alg aes-gcm-128 crypto-key 6c73564a42794d7a5773455065614271 esp
exec ipsec tunnel protect ipip1 sa-out 100001 sa-in 1 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.2.1 p2p
exec ipsec sa add 100002 spi 200002 crypto-alg aes-gcm-128 crypto-key 4e7345627357556c68775956726b7677 esp
exec ipsec sa add 2 spi 100002 crypto-alg aes-gcm-128 crypto-key 4e7345627357556c68775956726b7677 esp
exec ipsec tunnel protect ipip2 sa-out 100002 sa-in 2 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.3.1 p2p
exec ipsec sa add 100003 spi 200003 crypto-alg aes-gcm-128 crypto-key 526447696d514a68754268474e684f74 esp
exec ipsec sa add 3 spi 100003 crypto-alg aes-gcm-128 crypto-key 526447696d514a68754268474e684f74 esp
exec ipsec tunnel protect ipip3 sa-out 100003 sa-in 3 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.4.1 p2p
exec ipsec sa add 100004 spi 200004 crypto-alg aes-gcm-128 crypto-key 5a5772745645616c6d4177544d684b51 esp
exec ipsec sa add 4 spi 100004 crypto-alg aes-gcm-128 crypto-key 5a5772745645616c6d4177544d684b51 esp
exec ipsec tunnel protect ipip4 sa-out 100004 sa-in 4 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.5.1 p2p
exec ipsec sa add 100005 spi 200005 crypto-alg aes-gcm-128 crypto-key 6c7177594e4e657176684853487a5377 esp
exec ipsec sa add 5 spi 100005 crypto-alg aes-gcm-128 crypto-key 6c7177594e4e657176684853487a5377 esp
exec ipsec tunnel protect ipip5 sa-out 100005 sa-in 5 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.6.1 p2p
exec ipsec sa add 100006 spi 200006 crypto-alg aes-gcm-128 crypto-key 7a6a61534d59655a6a6b496542425046 esp
exec ipsec sa add 6 spi 100006 crypto-alg aes-gcm-128 crypto-key 7a6a61534d59655a6a6b496542425046 esp
exec ipsec tunnel protect ipip6 sa-out 100006 sa-in 6 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.7.1 p2p
exec ipsec sa add 100007 spi 200007 crypto-alg aes-gcm-128 crypto-key 76664d4d684e5a6667766d4e734c5757 esp
exec ipsec sa add 7 spi 100007 crypto-alg aes-gcm-128 crypto-key 76664d4d684e5a6667766d4e734c5757 esp
exec ipsec tunnel protect ipip7 sa-out 100007 sa-in 7 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.8.1 p2p
exec ipsec sa add 100008 spi 200008 crypto-alg aes-gcm-128 crypto-key 497a7557595a54675071775459704976 esp
exec ipsec sa add 8 spi 100008 crypto-alg aes-gcm-128 crypto-key 497a7557595a54675071775459704976 esp
exec ipsec tunnel protect ipip8 sa-out 100008 sa-in 8 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.9.1 p2p
exec ipsec sa add 100009 spi 200009 crypto-alg aes-gcm-128 crypto-key 766341654e625749776c6e61517a5a63 esp
exec ipsec sa add 9 spi 100009 crypto-alg aes-gcm-128 crypto-key 766341654e625749776c6e61517a5a63 esp
exec ipsec tunnel protect ipip9 sa-out 100009 sa-in 9 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.10.1 p2p
exec ipsec sa add 100010 spi 200010 crypto-alg aes-gcm-128 crypto-key 4e6d7578597a6249656d7376666e4e6d esp
exec ipsec sa add 10 spi 100010 crypto-alg aes-gcm-128 crypto-key 4e6d7578597a6249656d7376666e4e6d esp
exec ipsec tunnel protect ipip10 sa-out 100010 sa-in 10 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.11.1 p2p
exec ipsec sa add 100011 spi 200011 crypto-alg aes-gcm-128 crypto-key 5a68456b526b4f757757464c47494773 esp
exec ipsec sa add 11 spi 100011 crypto-alg aes-gcm-128 crypto-key 5a68456b526b4f757757464c47494773 esp
exec ipsec tunnel protect ipip11 sa-out 100011 sa-in 11 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.12.1 p2p
exec ipsec sa add 100012 spi 200012 crypto-alg aes-gcm-128 crypto-key 494550724f5366776558764a7a794a6c esp
exec ipsec sa add 12 spi 100012 crypto-alg aes-gcm-128 crypto-key 494550724f5366776558764a7a794a6c esp
exec ipsec tunnel protect ipip12 sa-out 100012 sa-in 12 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.13.1 p2p
exec ipsec sa add 100013 spi 200013 crypto-alg aes-gcm-128 crypto-key 526f79626b566443426a75674f5a4447 esp
exec ipsec sa add 13 spi 100013 crypto-alg aes-gcm-128 crypto-key 526f79626b566443426a75674f5a4447 esp
exec ipsec tunnel protect ipip13 sa-out 100013 sa-in 13 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.14.1 p2p
exec ipsec sa add 100014 spi 200014 crypto-alg aes-gcm-128 crypto-key 77656477417a6f7856554b4254744948 esp
exec ipsec sa add 14 spi 100014 crypto-alg aes-gcm-128 crypto-key 77656477417a6f7856554b4254744948 esp
exec ipsec tunnel protect ipip14 sa-out 100014 sa-in 14 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.15.1 p2p
exec ipsec sa add 100015 spi 200015 crypto-alg aes-gcm-128 crypto-key 4a6468795048436b744a4f7763786662 esp
exec ipsec sa add 15 spi 100015 crypto-alg aes-gcm-128 crypto-key 4a6468795048436b744a4f7763786662 esp
exec ipsec tunnel protect ipip15 sa-out 100015 sa-in 15 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.16.1 p2p
exec ipsec sa add 100016 spi 200016 crypto-alg aes-gcm-128 crypto-key 4750697565776d45784b787371586c54 esp
exec ipsec sa add 16 spi 100016 crypto-alg aes-gcm-128 crypto-key 4750697565776d45784b787371586c54 esp
exec ipsec tunnel protect ipip16 sa-out 100016 sa-in 16 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.17.1 p2p
exec ipsec sa add 100017 spi 200017 crypto-alg aes-gcm-128 crypto-key 5a4d6a4572534b7a755078594d6e5456 esp
exec ipsec sa add 17 spi 100017 crypto-alg aes-gcm-128 crypto-key 5a4d6a4572534b7a755078594d6e5456 esp
exec ipsec tunnel protect ipip17 sa-out 100017 sa-in 17 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.18.1 p2p
exec ipsec sa add 100018 spi 200018 crypto-alg aes-gcm-128 crypto-key 5742414f7a4656646b6a74487358476a esp
exec ipsec sa add 18 spi 100018 crypto-alg aes-gcm-128 crypto-key 5742414f7a4656646b6a74487358476a esp
exec ipsec tunnel protect ipip18 sa-out 100018 sa-in 18 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.19.1 p2p
exec ipsec sa add 100019 spi 200019 crypto-alg aes-gcm-128 crypto-key 7169704b796b536a6742505a7358556d esp
exec ipsec sa add 19 spi 100019 crypto-alg aes-gcm-128 crypto-key 7169704b796b536a6742505a7358556d esp
exec ipsec tunnel protect ipip19 sa-out 100019 sa-in 19 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.20.1 p2p
exec ipsec sa add 100020 spi 200020 crypto-alg aes-gcm-128 crypto-key 50436645787076776943445456755863 esp
exec ipsec sa add 20 spi 100020 crypto-alg aes-gcm-128 crypto-key 50436645787076776943445456755863 esp
exec ipsec tunnel protect ipip20 sa-out 100020 sa-in 20 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.21.1 p2p
exec ipsec sa add 100021 spi 200021 crypto-alg aes-gcm-128 crypto-key 445947614c5a655057534f4d516d716a esp
exec ipsec sa add 21 spi 100021 crypto-alg aes-gcm-128 crypto-key 445947614c5a655057534f4d516d716a esp
exec ipsec tunnel protect ipip21 sa-out 100021 sa-in 21 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.22.1 p2p
exec ipsec sa add 100022 spi 200022 crypto-alg aes-gcm-128 crypto-key 5761706d465963616c65655a61567348 esp
exec ipsec sa add 22 spi 100022 crypto-alg aes-gcm-128 crypto-key 5761706d465963616c65655a61567348 esp
exec ipsec tunnel protect ipip22 sa-out 100022 sa-in 22 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.23.1 p2p
exec ipsec sa add 100023 spi 200023 crypto-alg aes-gcm-128 crypto-key 4c674442754a584973496c784c456969 esp
exec ipsec sa add 23 spi 100023 crypto-alg aes-gcm-128 crypto-key 4c674442754a584973496c784c456969 esp
exec ipsec tunnel protect ipip23 sa-out 100023 sa-in 23 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.24.1 p2p
exec ipsec sa add 100024 spi 200024 crypto-alg aes-gcm-128 crypto-key 57594545565965594e64414663765471 esp
exec ipsec sa add 24 spi 100024 crypto-alg aes-gcm-128 crypto-key 57594545565965594e64414663765471 esp
exec ipsec tunnel protect ipip24 sa-out 100024 sa-in 24 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.25.1 p2p
exec ipsec sa add 100025 spi 200025 crypto-alg aes-gcm-128 crypto-key 50475178714b5266467854555743754a esp
exec ipsec sa add 25 spi 100025 crypto-alg aes-gcm-128 crypto-key 50475178714b5266467854555743754a esp
exec ipsec tunnel protect ipip25 sa-out 100025 sa-in 25 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.26.1 p2p
exec ipsec sa add 100026 spi 200026 crypto-alg aes-gcm-128 crypto-key 7a62746b4d62694267654c5345636c50 esp
exec ipsec sa add 26 spi 100026 crypto-alg aes-gcm-128 crypto-key 7a62746b4d62694267654c5345636c50 esp
exec ipsec tunnel protect ipip26 sa-out 100026 sa-in 26 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.27.1 p2p
exec ipsec sa add 100027 spi 200027 crypto-alg aes-gcm-128 crypto-key 6f5354445765686b56586f7a6374626b esp
exec ipsec sa add 27 spi 100027 crypto-alg aes-gcm-128 crypto-key 6f5354445765686b56586f7a6374626b esp
exec ipsec tunnel protect ipip27 sa-out 100027 sa-in 27 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.28.1 p2p
exec ipsec sa add 100028 spi 200028 crypto-alg aes-gcm-128 crypto-key 59655965556970736347544f53796b6f esp
exec ipsec sa add 28 spi 100028 crypto-alg aes-gcm-128 crypto-key 59655965556970736347544f53796b6f esp
exec ipsec tunnel protect ipip28 sa-out 100028 sa-in 28 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.29.1 p2p
exec ipsec sa add 100029 spi 200029 crypto-alg aes-gcm-128 crypto-key 684b70655055736671477a51746a4b48 esp
exec ipsec sa add 29 spi 100029 crypto-alg aes-gcm-128 crypto-key 684b70655055736671477a51746a4b48 esp
exec ipsec tunnel protect ipip29 sa-out 100029 sa-in 29 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.30.1 p2p
exec ipsec sa add 100030 spi 200030 crypto-alg aes-gcm-128 crypto-key 695a566570504c647a5151445367504d esp
exec ipsec sa add 30 spi 100030 crypto-alg aes-gcm-128 crypto-key 695a566570504c647a5151445367504d esp
exec ipsec tunnel protect ipip30 sa-out 100030 sa-in 30 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.31.1 p2p
exec ipsec sa add 100031 spi 200031 crypto-alg aes-gcm-128 crypto-key 5870784474426b476c754f4e6c6d5644 esp
exec ipsec sa add 31 spi 100031 crypto-alg aes-gcm-128 crypto-key 5870784474426b476c754f4e6c6d5644 esp
exec ipsec tunnel protect ipip31 sa-out 100031 sa-in 31 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.32.1 p2p
exec ipsec sa add 100032 spi 200032 crypto-alg aes-gcm-128 crypto-key 6579464c6b45737347506c5151587a77 esp
exec ipsec sa add 32 spi 100032 crypto-alg aes-gcm-128 crypto-key 6579464c6b45737347506c5151587a77 esp
exec ipsec tunnel protect ipip32 sa-out 100032 sa-in 32 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.33.1 p2p
exec ipsec sa add 100033 spi 200033 crypto-alg aes-gcm-128 crypto-key 57477666714245675a614f7872726a76 esp
exec ipsec sa add 33 spi 100033 crypto-alg aes-gcm-128 crypto-key 57477666714245675a614f7872726a76 esp
exec ipsec tunnel protect ipip33 sa-out 100033 sa-in 33 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.34.1 p2p
exec ipsec sa add 100034 spi 200034 crypto-alg aes-gcm-128 crypto-key 6c774471627a6964696d7476574a594f esp
exec ipsec sa add 34 spi 100034 crypto-alg aes-gcm-128 crypto-key 6c774471627a6964696d7476574a594f esp
exec ipsec tunnel protect ipip34 sa-out 100034 sa-in 34 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.35.1 p2p
exec ipsec sa add 100035 spi 200035 crypto-alg aes-gcm-128 crypto-key 557659754a536d636c57495a4972747a esp
exec ipsec sa add 35 spi 100035 crypto-alg aes-gcm-128 crypto-key 557659754a536d636c57495a4972747a esp
exec ipsec tunnel protect ipip35 sa-out 100035 sa-in 35 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.36.1 p2p
exec ipsec sa add 100036 spi 200036 crypto-alg aes-gcm-128 crypto-key 466a6e47564d53486c55667950784561 esp
exec ipsec sa add 36 spi 100036 crypto-alg aes-gcm-128 crypto-key 466a6e47564d53486c55667950784561 esp
exec ipsec tunnel protect ipip36 sa-out 100036 sa-in 36 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.37.1 p2p
exec ipsec sa add 100037 spi 200037 crypto-alg aes-gcm-128 crypto-key 78457a4b4e6676566648484d5952696c esp
exec ipsec sa add 37 spi 100037 crypto-alg aes-gcm-128 crypto-key 78457a4b4e6676566648484d5952696c esp
exec ipsec tunnel protect ipip37 sa-out 100037 sa-in 37 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.38.1 p2p
exec ipsec sa add 100038 spi 200038 crypto-alg aes-gcm-128 crypto-key 425a6276457a48464b6e7177564c6473 esp
exec ipsec sa add 38 spi 100038 crypto-alg aes-gcm-128 crypto-key 425a6276457a48464b6e7177564c6473 esp
exec ipsec tunnel protect ipip38 sa-out 100038 sa-in 38 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.39.1 p2p
exec ipsec sa add 100039 spi 200039 crypto-alg aes-gcm-128 crypto-key 4654414a637a6b714d614c766c4c6948 esp
exec ipsec sa add 39 spi 100039 crypto-alg aes-gcm-128 crypto-key 4654414a637a6b714d614c766c4c6948 esp
exec ipsec tunnel protect ipip39 sa-out 100039 sa-in 39 add
exec ip route add 100.0.0.1/8 via 200.0.0.101 TenGigabitEthernet8/0/0
exec set interface unnumbered ipip0 use TenGigabitEthernet8/0/0
exec set interface state ipip0 up
exec ip route add 10.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use TenGigabitEthernet8/0/0
exec set interface state ipip1 up
exec ip route add 10.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use TenGigabitEthernet8/0/0
exec set interface state ipip2 up
exec ip route add 10.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use TenGigabitEthernet8/0/0
exec set interface state ipip3 up
exec ip route add 10.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use TenGigabitEthernet8/0/0
exec set interface state ipip4 up
exec ip route add 10.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use TenGigabitEthernet8/0/0
exec set interface state ipip5 up
exec ip route add 10.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use TenGigabitEthernet8/0/0
exec set interface state ipip6 up
exec ip route add 10.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use TenGigabitEthernet8/0/0
exec set interface state ipip7 up
exec ip route add 10.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use TenGigabitEthernet8/0/0
exec set interface state ipip8 up
exec ip route add 10.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use TenGigabitEthernet8/0/0
exec set interface state ipip9 up
exec ip route add 10.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use TenGigabitEthernet8/0/0
exec set interface state ipip10 up
exec ip route add 10.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use TenGigabitEthernet8/0/0
exec set interface state ipip11 up
exec ip route add 10.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use TenGigabitEthernet8/0/0
exec set interface state ipip12 up
exec ip route add 10.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use TenGigabitEthernet8/0/0
exec set interface state ipip13 up
exec ip route add 10.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use TenGigabitEthernet8/0/0
exec set interface state ipip14 up
exec ip route add 10.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use TenGigabitEthernet8/0/0
exec set interface state ipip15 up
exec ip route add 10.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use TenGigabitEthernet8/0/0
exec set interface state ipip16 up
exec ip route add 10.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use TenGigabitEthernet8/0/0
exec set interface state ipip17 up
exec ip route add 10.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use TenGigabitEthernet8/0/0
exec set interface state ipip18 up
exec ip route add 10.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use TenGigabitEthernet8/0/0
exec set interface state ipip19 up
exec ip route add 10.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use TenGigabitEthernet8/0/0
exec set interface state ipip20 up
exec ip route add 10.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use TenGigabitEthernet8/0/0
exec set interface state ipip21 up
exec ip route add 10.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use TenGigabitEthernet8/0/0
exec set interface state ipip22 up
exec ip route add 10.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use TenGigabitEthernet8/0/0
exec set interface state ipip23 up
exec ip route add 10.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use TenGigabitEthernet8/0/0
exec set interface state ipip24 up
exec ip route add 10.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use TenGigabitEthernet8/0/0
exec set interface state ipip25 up
exec ip route add 10.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use TenGigabitEthernet8/0/0
exec set interface state ipip26 up
exec ip route add 10.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use TenGigabitEthernet8/0/0
exec set interface state ipip27 up
exec ip route add 10.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use TenGigabitEthernet8/0/0
exec set interface state ipip28 up
exec ip route add 10.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use TenGigabitEthernet8/0/0
exec set interface state ipip29 up
exec ip route add 10.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use TenGigabitEthernet8/0/0
exec set interface state ipip30 up
exec ip route add 10.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use TenGigabitEthernet8/0/0
exec set interface state ipip31 up
exec ip route add 10.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use TenGigabitEthernet8/0/0
exec set interface state ipip32 up
exec ip route add 10.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use TenGigabitEthernet8/0/0
exec set interface state ipip33 up
exec ip route add 10.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use TenGigabitEthernet8/0/0
exec set interface state ipip34 up
exec ip route add 10.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use TenGigabitEthernet8/0/0
exec set interface state ipip35 up
exec ip route add 10.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use TenGigabitEthernet8/0/0
exec set interface state ipip36 up
exec ip route add 10.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use TenGigabitEthernet8/0/0
exec set interface state ipip37 up
exec ip route add 10.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use TenGigabitEthernet8/0/0
exec set interface state ipip38 up
exec ip route add 10.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use TenGigabitEthernet8/0/0
exec set interface state ipip39 up
exec ip route add 10.0.0.39/32 via ipip39

 imix-1t1c-ethip4ipsec40tnlsw- 
ip4base-int-aes128gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec set interface ip address TenGigabitEthernet8/0/0 200.0.0.102/24.0
exec create ipip tunnel src 200.0.0.102 dst 100.0.0.1 p2p
exec ipsec sa add 100000 spi 200000 crypto-alg aes-gcm-128 crypto-key 694b664f4647764f4245777451595669 esp
exec ipsec sa add 0 spi 100000 crypto-alg aes-gcm-128 crypto-key 694b664f4647764f4245777451595669 esp
exec ipsec tunnel protect ipip0 sa-out 100000 sa-in 0 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.1.1 p2p
exec ipsec sa add 100001 spi 200001 crypto-alg aes-gcm-128 crypto-key 564243574a7241514b6a7656484a4c50 esp
exec ipsec sa add 1 spi 100001 crypto-alg aes-gcm-128 crypto-key 564243574a7241514b6a7656484a4c50 esp
exec ipsec tunnel protect ipip1 sa-out 100001 sa-in 1 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.2.1 p2p
exec ipsec sa add 100002 spi 200002 crypto-alg aes-gcm-128 crypto-key 54504a4756764d565267646f48596878 esp
exec ipsec sa add 2 spi 100002 crypto-alg aes-gcm-128 crypto-key 54504a4756764d565267646f48596878 esp
exec ipsec tunnel protect ipip2 sa-out 100002 sa-in 2 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.3.1 p2p
exec ipsec sa add 100003 spi 200003 crypto-alg aes-gcm-128 crypto-key 46496f42737244795178576958566172 esp
exec ipsec sa add 3 spi 100003 crypto-alg aes-gcm-128 crypto-key 46496f42737244795178576958566172 esp
exec ipsec tunnel protect ipip3 sa-out 100003 sa-in 3 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.4.1 p2p
exec ipsec sa add 100004 spi 200004 crypto-alg aes-gcm-128 crypto-key 734f5741576561564f6c734779667347 esp
exec ipsec sa add 4 spi 100004 crypto-alg aes-gcm-128 crypto-key 734f5741576561564f6c734779667347 esp
exec ipsec tunnel protect ipip4 sa-out 100004 sa-in 4 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.5.1 p2p
exec ipsec sa add 100005 spi 200005 crypto-alg aes-gcm-128 crypto-key 615a58776c53724e6b47594b794e724e esp
exec ipsec sa add 5 spi 100005 crypto-alg aes-gcm-128 crypto-key 615a58776c53724e6b47594b794e724e esp
exec ipsec tunnel protect ipip5 sa-out 100005 sa-in 5 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.6.1 p2p
exec ipsec sa add 100006 spi 200006 crypto-alg aes-gcm-128 crypto-key 614b48586c766278426c546e68424656 esp
exec ipsec sa add 6 spi 100006 crypto-alg aes-gcm-128 crypto-key 614b48586c766278426c546e68424656 esp
exec ipsec tunnel protect ipip6 sa-out 100006 sa-in 6 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.7.1 p2p
exec ipsec sa add 100007 spi 200007 crypto-alg aes-gcm-128 crypto-key 6e564c554b744f4e76756a6565475773 esp
exec ipsec sa add 7 spi 100007 crypto-alg aes-gcm-128 crypto-key 6e564c554b744f4e76756a6565475773 esp
exec ipsec tunnel protect ipip7 sa-out 100007 sa-in 7 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.8.1 p2p
exec ipsec sa add 100008 spi 200008 crypto-alg aes-gcm-128 crypto-key 435751455a7176585375717955524542 esp
exec ipsec sa add 8 spi 100008 crypto-alg aes-gcm-128 crypto-key 435751455a7176585375717955524542 esp
exec ipsec tunnel protect ipip8 sa-out 100008 sa-in 8 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.9.1 p2p
exec ipsec sa add 100009 spi 200009 crypto-alg aes-gcm-128 crypto-key 6f745249796f5556565278437a6e664e esp
exec ipsec sa add 9 spi 100009 crypto-alg aes-gcm-128 crypto-key 6f745249796f5556565278437a6e664e esp
exec ipsec tunnel protect ipip9 sa-out 100009 sa-in 9 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.10.1 p2p
exec ipsec sa add 100010 spi 200010 crypto-alg aes-gcm-128 crypto-key 62516858584742506674626171555051 esp
exec ipsec sa add 10 spi 100010 crypto-alg aes-gcm-128 crypto-key 62516858584742506674626171555051 esp
exec ipsec tunnel protect ipip10 sa-out 100010 sa-in 10 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.11.1 p2p
exec ipsec sa add 100011 spi 200011 crypto-alg aes-gcm-128 crypto-key 765a53694745555371726f4877764641 esp
exec ipsec sa add 11 spi 100011 crypto-alg aes-gcm-128 crypto-key 765a53694745555371726f4877764641 esp
exec ipsec tunnel protect ipip11 sa-out 100011 sa-in 11 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.12.1 p2p
exec ipsec sa add 100012 spi 200012 crypto-alg aes-gcm-128 crypto-key 7448505763734e536c774458706b6b45 esp
exec ipsec sa add 12 spi 100012 crypto-alg aes-gcm-128 crypto-key 7448505763734e536c774458706b6b45 esp
exec ipsec tunnel protect ipip12 sa-out 100012 sa-in 12 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.13.1 p2p
exec ipsec sa add 100013 spi 200013 crypto-alg aes-gcm-128 crypto-key 7646676865696f72636e47416877624c esp
exec ipsec sa add 13 spi 100013 crypto-alg aes-gcm-128 crypto-key 7646676865696f72636e47416877624c esp
exec ipsec tunnel protect ipip13 sa-out 100013 sa-in 13 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.14.1 p2p
exec ipsec sa add 100014 spi 200014 crypto-alg aes-gcm-128 crypto-key 496f5149726442735057764266465945 esp
exec ipsec sa add 14 spi 100014 crypto-alg aes-gcm-128 crypto-key 496f5149726442735057764266465945 esp
exec ipsec tunnel protect ipip14 sa-out 100014 sa-in 14 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.15.1 p2p
exec ipsec sa add 100015 spi 200015 crypto-alg aes-gcm-128 crypto-key 4f55795343704e636b5067464b547063 esp
exec ipsec sa add 15 spi 100015 crypto-alg aes-gcm-128 crypto-key 4f55795343704e636b5067464b547063 esp
exec ipsec tunnel protect ipip15 sa-out 100015 sa-in 15 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.16.1 p2p
exec ipsec sa add 100016 spi 200016 crypto-alg aes-gcm-128 crypto-key 62646572647557517477706561527144 esp
exec ipsec sa add 16 spi 100016 crypto-alg aes-gcm-128 crypto-key 62646572647557517477706561527144 esp
exec ipsec tunnel protect ipip16 sa-out 100016 sa-in 16 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.17.1 p2p
exec ipsec sa add 100017 spi 200017 crypto-alg aes-gcm-128 crypto-key 754844686e796c4167595a6455756a62 esp
exec ipsec sa add 17 spi 100017 crypto-alg aes-gcm-128 crypto-key 754844686e796c4167595a6455756a62 esp
exec ipsec tunnel protect ipip17 sa-out 100017 sa-in 17 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.18.1 p2p
exec ipsec sa add 100018 spi 200018 crypto-alg aes-gcm-128 crypto-key 4550416450524a6a5444546972686c4d esp
exec ipsec sa add 18 spi 100018 crypto-alg aes-gcm-128 crypto-key 4550416450524a6a5444546972686c4d esp
exec ipsec tunnel protect ipip18 sa-out 100018 sa-in 18 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.19.1 p2p
exec ipsec sa add 100019 spi 200019 crypto-alg aes-gcm-128 crypto-key 74565471515768504d72504e6e67685a esp
exec ipsec sa add 19 spi 100019 crypto-alg aes-gcm-128 crypto-key 74565471515768504d72504e6e67685a esp
exec ipsec tunnel protect ipip19 sa-out 100019 sa-in 19 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.20.1 p2p
exec ipsec sa add 100020 spi 200020 crypto-alg aes-gcm-128 crypto-key 596159454d51726a48445974466b6b6f esp
exec ipsec sa add 20 spi 100020 crypto-alg aes-gcm-128 crypto-key 596159454d51726a48445974466b6b6f esp
exec ipsec tunnel protect ipip20 sa-out 100020 sa-in 20 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.21.1 p2p
exec ipsec sa add 100021 spi 200021 crypto-alg aes-gcm-128 crypto-key 787554576c7452726a55465074734d44 esp
exec ipsec sa add 21 spi 100021 crypto-alg aes-gcm-128 crypto-key 787554576c7452726a55465074734d44 esp
exec ipsec tunnel protect ipip21 sa-out 100021 sa-in 21 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.22.1 p2p
exec ipsec sa add 100022 spi 200022 crypto-alg aes-gcm-128 crypto-key 766370655a7a447757576f454368506d esp
exec ipsec sa add 22 spi 100022 crypto-alg aes-gcm-128 crypto-key 766370655a7a447757576f454368506d esp
exec ipsec tunnel protect ipip22 sa-out 100022 sa-in 22 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.23.1 p2p
exec ipsec sa add 100023 spi 200023 crypto-alg aes-gcm-128 crypto-key 506150774962686a706e5a4c58646365 esp
exec ipsec sa add 23 spi 100023 crypto-alg aes-gcm-128 crypto-key 506150774962686a706e5a4c58646365 esp
exec ipsec tunnel protect ipip23 sa-out 100023 sa-in 23 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.24.1 p2p
exec ipsec sa add 100024 spi 200024 crypto-alg aes-gcm-128 crypto-key 7844666c4a6579715978536377797045 esp
exec ipsec sa add 24 spi 100024 crypto-alg aes-gcm-128 crypto-key 7844666c4a6579715978536377797045 esp
exec ipsec tunnel protect ipip24 sa-out 100024 sa-in 24 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.25.1 p2p
exec ipsec sa add 100025 spi 200025 crypto-alg aes-gcm-128 crypto-key 704b4177625a43755161737150416f6c esp
exec ipsec sa add 25 spi 100025 crypto-alg aes-gcm-128 crypto-key 704b4177625a43755161737150416f6c esp
exec ipsec tunnel protect ipip25 sa-out 100025 sa-in 25 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.26.1 p2p
exec ipsec sa add 100026 spi 200026 crypto-alg aes-gcm-128 crypto-key 6a4b686f4972647a714e674d4f667354 esp
exec ipsec sa add 26 spi 100026 crypto-alg aes-gcm-128 crypto-key 6a4b686f4972647a714e674d4f667354 esp
exec ipsec tunnel protect ipip26 sa-out 100026 sa-in 26 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.27.1 p2p
exec ipsec sa add 100027 spi 200027 crypto-alg aes-gcm-128 crypto-key 52524466575a56616a76786c58564b4c esp
exec ipsec sa add 27 spi 100027 crypto-alg aes-gcm-128 crypto-key 52524466575a56616a76786c58564b4c esp
exec ipsec tunnel protect ipip27 sa-out 100027 sa-in 27 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.28.1 p2p
exec ipsec sa add 100028 spi 200028 crypto-alg aes-gcm-128 crypto-key 4c6f566547647a74565842454a6d6e7a esp
exec ipsec sa add 28 spi 100028 crypto-alg aes-gcm-128 crypto-key 4c6f566547647a74565842454a6d6e7a esp
exec ipsec tunnel protect ipip28 sa-out 100028 sa-in 28 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.29.1 p2p
exec ipsec sa add 100029 spi 200029 crypto-alg aes-gcm-128 crypto-key 58736f695763444b4464687a784c524d esp
exec ipsec sa add 29 spi 100029 crypto-alg aes-gcm-128 crypto-key 58736f695763444b4464687a784c524d esp
exec ipsec tunnel protect ipip29 sa-out 100029 sa-in 29 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.30.1 p2p
exec ipsec sa add 100030 spi 200030 crypto-alg aes-gcm-128 crypto-key 43684c44556677624b5742694f63615a esp
exec ipsec sa add 30 spi 100030 crypto-alg aes-gcm-128 crypto-key 43684c44556677624b5742694f63615a esp
exec ipsec tunnel protect ipip30 sa-out 100030 sa-in 30 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.31.1 p2p
exec ipsec sa add 100031 spi 200031 crypto-alg aes-gcm-128 crypto-key 734d515568715a446c62546c714b686a esp
exec ipsec sa add 31 spi 100031 crypto-alg aes-gcm-128 crypto-key 734d515568715a446c62546c714b686a esp
exec ipsec tunnel protect ipip31 sa-out 100031 sa-in 31 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.32.1 p2p
exec ipsec sa add 100032 spi 200032 crypto-alg aes-gcm-128 crypto-key 76414b5a62507371784c5648464a4778 esp
exec ipsec sa add 32 spi 100032 crypto-alg aes-gcm-128 crypto-key 76414b5a62507371784c5648464a4778 esp
exec ipsec tunnel protect ipip32 sa-out 100032 sa-in 32 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.33.1 p2p
exec ipsec sa add 100033 spi 200033 crypto-alg aes-gcm-128 crypto-key 534b4671674158496f74766561755647 esp
exec ipsec sa add 33 spi 100033 crypto-alg aes-gcm-128 crypto-key 534b4671674158496f74766561755647 esp
exec ipsec tunnel protect ipip33 sa-out 100033 sa-in 33 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.34.1 p2p
exec ipsec sa add 100034 spi 200034 crypto-alg aes-gcm-128 crypto-key 77564f4b4f716c73466b67464c4e4851 esp
exec ipsec sa add 34 spi 100034 crypto-alg aes-gcm-128 crypto-key 77564f4b4f716c73466b67464c4e4851 esp
exec ipsec tunnel protect ipip34 sa-out 100034 sa-in 34 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.35.1 p2p
exec ipsec sa add 100035 spi 200035 crypto-alg aes-gcm-128 crypto-key 7669555066677571636461797464787a esp
exec ipsec sa add 35 spi 100035 crypto-alg aes-gcm-128 crypto-key 7669555066677571636461797464787a esp
exec ipsec tunnel protect ipip35 sa-out 100035 sa-in 35 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.36.1 p2p
exec ipsec sa add 100036 spi 200036 crypto-alg aes-gcm-128 crypto-key 4b48414f48544d636f7a4d584e43514d esp
exec ipsec sa add 36 spi 100036 crypto-alg aes-gcm-128 crypto-key 4b48414f48544d636f7a4d584e43514d esp
exec ipsec tunnel protect ipip36 sa-out 100036 sa-in 36 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.37.1 p2p
exec ipsec sa add 100037 spi 200037 crypto-alg aes-gcm-128 crypto-key 5757594f4a646c694e6e716c42627951 esp
exec ipsec sa add 37 spi 100037 crypto-alg aes-gcm-128 crypto-key 5757594f4a646c694e6e716c42627951 esp
exec ipsec tunnel protect ipip37 sa-out 100037 sa-in 37 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.38.1 p2p
exec ipsec sa add 100038 spi 200038 crypto-alg aes-gcm-128 crypto-key 4a5970476d704459514c4a69704b4667 esp
exec ipsec sa add 38 spi 100038 crypto-alg aes-gcm-128 crypto-key 4a5970476d704459514c4a69704b4667 esp
exec ipsec tunnel protect ipip38 sa-out 100038 sa-in 38 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.39.1 p2p
exec ipsec sa add 100039 spi 200039 crypto-alg aes-gcm-128 crypto-key 46557253586b46486e6f6d7162436d55 esp
exec ipsec sa add 39 spi 100039 crypto-alg aes-gcm-128 crypto-key 46557253586b46486e6f6d7162436d55 esp
exec ipsec tunnel protect ipip39 sa-out 100039 sa-in 39 add
exec ip route add 100.0.0.1/8 via 200.0.0.101 TenGigabitEthernet8/0/0
exec set interface unnumbered ipip0 use TenGigabitEthernet8/0/0
exec set interface state ipip0 up
exec ip route add 10.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use TenGigabitEthernet8/0/0
exec set interface state ipip1 up
exec ip route add 10.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use TenGigabitEthernet8/0/0
exec set interface state ipip2 up
exec ip route add 10.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use TenGigabitEthernet8/0/0
exec set interface state ipip3 up
exec ip route add 10.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use TenGigabitEthernet8/0/0
exec set interface state ipip4 up
exec ip route add 10.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use TenGigabitEthernet8/0/0
exec set interface state ipip5 up
exec ip route add 10.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use TenGigabitEthernet8/0/0
exec set interface state ipip6 up
exec ip route add 10.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use TenGigabitEthernet8/0/0
exec set interface state ipip7 up
exec ip route add 10.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use TenGigabitEthernet8/0/0
exec set interface state ipip8 up
exec ip route add 10.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use TenGigabitEthernet8/0/0
exec set interface state ipip9 up
exec ip route add 10.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use TenGigabitEthernet8/0/0
exec set interface state ipip10 up
exec ip route add 10.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use TenGigabitEthernet8/0/0
exec set interface state ipip11 up
exec ip route add 10.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use TenGigabitEthernet8/0/0
exec set interface state ipip12 up
exec ip route add 10.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use TenGigabitEthernet8/0/0
exec set interface state ipip13 up
exec ip route add 10.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use TenGigabitEthernet8/0/0
exec set interface state ipip14 up
exec ip route add 10.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use TenGigabitEthernet8/0/0
exec set interface state ipip15 up
exec ip route add 10.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use TenGigabitEthernet8/0/0
exec set interface state ipip16 up
exec ip route add 10.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use TenGigabitEthernet8/0/0
exec set interface state ipip17 up
exec ip route add 10.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use TenGigabitEthernet8/0/0
exec set interface state ipip18 up
exec ip route add 10.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use TenGigabitEthernet8/0/0
exec set interface state ipip19 up
exec ip route add 10.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use TenGigabitEthernet8/0/0
exec set interface state ipip20 up
exec ip route add 10.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use TenGigabitEthernet8/0/0
exec set interface state ipip21 up
exec ip route add 10.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use TenGigabitEthernet8/0/0
exec set interface state ipip22 up
exec ip route add 10.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use TenGigabitEthernet8/0/0
exec set interface state ipip23 up
exec ip route add 10.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use TenGigabitEthernet8/0/0
exec set interface state ipip24 up
exec ip route add 10.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use TenGigabitEthernet8/0/0
exec set interface state ipip25 up
exec ip route add 10.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use TenGigabitEthernet8/0/0
exec set interface state ipip26 up
exec ip route add 10.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use TenGigabitEthernet8/0/0
exec set interface state ipip27 up
exec ip route add 10.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use TenGigabitEthernet8/0/0
exec set interface state ipip28 up
exec ip route add 10.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use TenGigabitEthernet8/0/0
exec set interface state ipip29 up
exec ip route add 10.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use TenGigabitEthernet8/0/0
exec set interface state ipip30 up
exec ip route add 10.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use TenGigabitEthernet8/0/0
exec set interface state ipip31 up
exec ip route add 10.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use TenGigabitEthernet8/0/0
exec set interface state ipip32 up
exec ip route add 10.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use TenGigabitEthernet8/0/0
exec set interface state ipip33 up
exec ip route add 10.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use TenGigabitEthernet8/0/0
exec set interface state ipip34 up
exec ip route add 10.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use TenGigabitEthernet8/0/0
exec set interface state ipip35 up
exec ip route add 10.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use TenGigabitEthernet8/0/0
exec set interface state ipip36 up
exec ip route add 10.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use TenGigabitEthernet8/0/0
exec set interface state ipip37 up
exec ip route add 10.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use TenGigabitEthernet8/0/0
exec set interface state ipip38 up
exec ip route add 10.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use TenGigabitEthernet8/0/0
exec set interface state ipip39 up
exec ip route add 10.0.0.39/32 via ipip39

 imix-2t2c-ethip4ipsec40tnlsw- 
ip4base-int-aes128gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec set interface ip address TenGigabitEthernet8/0/0 200.0.0.102/24.0
exec create ipip tunnel src 200.0.0.102 dst 100.0.0.1 p2p
exec ipsec sa add 100000 spi 200000 crypto-alg aes-gcm-128 crypto-key 4e4254775a6b75744c6245504f764972 esp
exec ipsec sa add 0 spi 100000 crypto-alg aes-gcm-128 crypto-key 4e4254775a6b75744c6245504f764972 esp
exec ipsec tunnel protect ipip0 sa-out 100000 sa-in 0 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.1.1 p2p
exec ipsec sa add 100001 spi 200001 crypto-alg aes-gcm-128 crypto-key 4c74686a71544c624f474a594c49426e esp
exec ipsec sa add 1 spi 100001 crypto-alg aes-gcm-128 crypto-key 4c74686a71544c624f474a594c49426e esp
exec ipsec tunnel protect ipip1 sa-out 100001 sa-in 1 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.2.1 p2p
exec ipsec sa add 100002 spi 200002 crypto-alg aes-gcm-128 crypto-key 58584978554d5264424354776f4e4c73 esp
exec ipsec sa add 2 spi 100002 crypto-alg aes-gcm-128 crypto-key 58584978554d5264424354776f4e4c73 esp
exec ipsec tunnel protect ipip2 sa-out 100002 sa-in 2 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.3.1 p2p
exec ipsec sa add 100003 spi 200003 crypto-alg aes-gcm-128 crypto-key 6476494c7857684645574554476d5752 esp
exec ipsec sa add 3 spi 100003 crypto-alg aes-gcm-128 crypto-key 6476494c7857684645574554476d5752 esp
exec ipsec tunnel protect ipip3 sa-out 100003 sa-in 3 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.4.1 p2p
exec ipsec sa add 100004 spi 200004 crypto-alg aes-gcm-128 crypto-key 77664379716b6d684a5264654171444a esp
exec ipsec sa add 4 spi 100004 crypto-alg aes-gcm-128 crypto-key 77664379716b6d684a5264654171444a esp
exec ipsec tunnel protect ipip4 sa-out 100004 sa-in 4 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.5.1 p2p
exec ipsec sa add 100005 spi 200005 crypto-alg aes-gcm-128 crypto-key 6c4b6d4643414642676d676d6b457953 esp
exec ipsec sa add 5 spi 100005 crypto-alg aes-gcm-128 crypto-key 6c4b6d4643414642676d676d6b457953 esp
exec ipsec tunnel protect ipip5 sa-out 100005 sa-in 5 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.6.1 p2p
exec ipsec sa add 100006 spi 200006 crypto-alg aes-gcm-128 crypto-key 7a7945534b566b647958544f49755154 esp
exec ipsec sa add 6 spi 100006 crypto-alg aes-gcm-128 crypto-key 7a7945534b566b647958544f49755154 esp
exec ipsec tunnel protect ipip6 sa-out 100006 sa-in 6 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.7.1 p2p
exec ipsec sa add 100007 spi 200007 crypto-alg aes-gcm-128 crypto-key 58516a7067514148595465555978494c esp
exec ipsec sa add 7 spi 100007 crypto-alg aes-gcm-128 crypto-key 58516a7067514148595465555978494c esp
exec ipsec tunnel protect ipip7 sa-out 100007 sa-in 7 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.8.1 p2p
exec ipsec sa add 100008 spi 200008 crypto-alg aes-gcm-128 crypto-key 4e6272415846434e4b614b614a636a42 esp
exec ipsec sa add 8 spi 100008 crypto-alg aes-gcm-128 crypto-key 4e6272415846434e4b614b614a636a42 esp
exec ipsec tunnel protect ipip8 sa-out 100008 sa-in 8 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.9.1 p2p
exec ipsec sa add 100009 spi 200009 crypto-alg aes-gcm-128 crypto-key 77784a464e4865556d434a4276637346 esp
exec ipsec sa add 9 spi 100009 crypto-alg aes-gcm-128 crypto-key 77784a464e4865556d434a4276637346 esp
exec ipsec tunnel protect ipip9 sa-out 100009 sa-in 9 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.10.1 p2p
exec ipsec sa add 100010 spi 200010 crypto-alg aes-gcm-128 crypto-key 766363476270454b4269556251727274 esp
exec ipsec sa add 10 spi 100010 crypto-alg aes-gcm-128 crypto-key 766363476270454b4269556251727274 esp
exec ipsec tunnel protect ipip10 sa-out 100010 sa-in 10 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.11.1 p2p
exec ipsec sa add 100011 spi 200011 crypto-alg aes-gcm-128 crypto-key 6c5a4c567049435178674f56486a6d63 esp
exec ipsec sa add 11 spi 100011 crypto-alg aes-gcm-128 crypto-key 6c5a4c567049435178674f56486a6d63 esp
exec ipsec tunnel protect ipip11 sa-out 100011 sa-in 11 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.12.1 p2p
exec ipsec sa add 100012 spi 200012 crypto-alg aes-gcm-128 crypto-key 5664637562545942774b736a6f576559 esp
exec ipsec sa add 12 spi 100012 crypto-alg aes-gcm-128 crypto-key 5664637562545942774b736a6f576559 esp
exec ipsec tunnel protect ipip12 sa-out 100012 sa-in 12 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.13.1 p2p
exec ipsec sa add 100013 spi 200013 crypto-alg aes-gcm-128 crypto-key 57445a4d627876744462796567534c6a esp
exec ipsec sa add 13 spi 100013 crypto-alg aes-gcm-128 crypto-key 57445a4d627876744462796567534c6a esp
exec ipsec tunnel protect ipip13 sa-out 100013 sa-in 13 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.14.1 p2p
exec ipsec sa add 100014 spi 200014 crypto-alg aes-gcm-128 crypto-key 4d716b4c734276676a734c7a7a647475 esp
exec ipsec sa add 14 spi 100014 crypto-alg aes-gcm-128 crypto-key 4d716b4c734276676a734c7a7a647475 esp
exec ipsec tunnel protect ipip14 sa-out 100014 sa-in 14 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.15.1 p2p
exec ipsec sa add 100015 spi 200015 crypto-alg aes-gcm-128 crypto-key 617a676f6b4a4e697945756e49554e66 esp
exec ipsec sa add 15 spi 100015 crypto-alg aes-gcm-128 crypto-key 617a676f6b4a4e697945756e49554e66 esp
exec ipsec tunnel protect ipip15 sa-out 100015 sa-in 15 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.16.1 p2p
exec ipsec sa add 100016 spi 200016 crypto-alg aes-gcm-128 crypto-key 4269556e596b76757243756579756a79 esp
exec ipsec sa add 16 spi 100016 crypto-alg aes-gcm-128 crypto-key 4269556e596b76757243756579756a79 esp
exec ipsec tunnel protect ipip16 sa-out 100016 sa-in 16 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.17.1 p2p
exec ipsec sa add 100017 spi 200017 crypto-alg aes-gcm-128 crypto-key 6d4551796a6f61726b55726f5a726854 esp
exec ipsec sa add 17 spi 100017 crypto-alg aes-gcm-128 crypto-key 6d4551796a6f61726b55726f5a726854 esp
exec ipsec tunnel protect ipip17 sa-out 100017 sa-in 17 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.18.1 p2p
exec ipsec sa add 100018 spi 200018 crypto-alg aes-gcm-128 crypto-key 6a4b5153664b6c78427671685745694a esp
exec ipsec sa add 18 spi 100018 crypto-alg aes-gcm-128 crypto-key 6a4b5153664b6c78427671685745694a esp
exec ipsec tunnel protect ipip18 sa-out 100018 sa-in 18 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.19.1 p2p
exec ipsec sa add 100019 spi 200019 crypto-alg aes-gcm-128 crypto-key 4b4c4f556f4d6f7a7958644673466869 esp
exec ipsec sa add 19 spi 100019 crypto-alg aes-gcm-128 crypto-key 4b4c4f556f4d6f7a7958644673466869 esp
exec ipsec tunnel protect ipip19 sa-out 100019 sa-in 19 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.20.1 p2p
exec ipsec sa add 100020 spi 200020 crypto-alg aes-gcm-128 crypto-key 4f6775467345464f766a496655455257 esp
exec ipsec sa add 20 spi 100020 crypto-alg aes-gcm-128 crypto-key 4f6775467345464f766a496655455257 esp
exec ipsec tunnel protect ipip20 sa-out 100020 sa-in 20 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.21.1 p2p
exec ipsec sa add 100021 spi 200021 crypto-alg aes-gcm-128 crypto-key 464b6875634c6b534c5961506a4c7441 esp
exec ipsec sa add 21 spi 100021 crypto-alg aes-gcm-128 crypto-key 464b6875634c6b534c5961506a4c7441 esp
exec ipsec tunnel protect ipip21 sa-out 100021 sa-in 21 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.22.1 p2p
exec ipsec sa add 100022 spi 200022 crypto-alg aes-gcm-128 crypto-key 4f554f776c6463564f47496369494f55 esp
exec ipsec sa add 22 spi 100022 crypto-alg aes-gcm-128 crypto-key 4f554f776c6463564f47496369494f55 esp
exec ipsec tunnel protect ipip22 sa-out 100022 sa-in 22 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.23.1 p2p
exec ipsec sa add 100023 spi 200023 crypto-alg aes-gcm-128 crypto-key 487347586f535242684d6a454b516e76 esp
exec ipsec sa add 23 spi 100023 crypto-alg aes-gcm-128 crypto-key 487347586f535242684d6a454b516e76 esp
exec ipsec tunnel protect ipip23 sa-out 100023 sa-in 23 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.24.1 p2p
exec ipsec sa add 100024 spi 200024 crypto-alg aes-gcm-128 crypto-key 5a5a4378695764447452727443697457 esp
exec ipsec sa add 24 spi 100024 crypto-alg aes-gcm-128 crypto-key 5a5a4378695764447452727443697457 esp
exec ipsec tunnel protect ipip24 sa-out 100024 sa-in 24 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.25.1 p2p
exec ipsec sa add 100025 spi 200025 crypto-alg aes-gcm-128 crypto-key 76674e716d474f6b6b4f686b4363636d esp
exec ipsec sa add 25 spi 100025 crypto-alg aes-gcm-128 crypto-key 76674e716d474f6b6b4f686b4363636d esp
exec ipsec tunnel protect ipip25 sa-out 100025 sa-in 25 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.26.1 p2p
exec ipsec sa add 100026 spi 200026 crypto-alg aes-gcm-128 crypto-key 577743707950525a654d464552704b4b esp
exec ipsec sa add 26 spi 100026 crypto-alg aes-gcm-128 crypto-key 577743707950525a654d464552704b4b esp
exec ipsec tunnel protect ipip26 sa-out 100026 sa-in 26 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.27.1 p2p
exec ipsec sa add 100027 spi 200027 crypto-alg aes-gcm-128 crypto-key 4c58624c69516f65505657576e4b5174 esp
exec ipsec sa add 27 spi 100027 crypto-alg aes-gcm-128 crypto-key 4c58624c69516f65505657576e4b5174 esp
exec ipsec tunnel protect ipip27 sa-out 100027 sa-in 27 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.28.1 p2p
exec ipsec sa add 100028 spi 200028 crypto-alg aes-gcm-128 crypto-key 4158734a79666c73527448794a546879 esp
exec ipsec sa add 28 spi 100028 crypto-alg aes-gcm-128 crypto-key 4158734a79666c73527448794a546879 esp
exec ipsec tunnel protect ipip28 sa-out 100028 sa-in 28 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.29.1 p2p
exec ipsec sa add 100029 spi 200029 crypto-alg aes-gcm-128 crypto-key 634e484e544e78505166645947576d54 esp
exec ipsec sa add 29 spi 100029 crypto-alg aes-gcm-128 crypto-key 634e484e544e78505166645947576d54 esp
exec ipsec tunnel protect ipip29 sa-out 100029 sa-in 29 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.30.1 p2p
exec ipsec sa add 100030 spi 200030 crypto-alg aes-gcm-128 crypto-key 4b726458454e4a5779716d736c6e746a esp
exec ipsec sa add 30 spi 100030 crypto-alg aes-gcm-128 crypto-key 4b726458454e4a5779716d736c6e746a esp
exec ipsec tunnel protect ipip30 sa-out 100030 sa-in 30 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.31.1 p2p
exec ipsec sa add 100031 spi 200031 crypto-alg aes-gcm-128 crypto-key 6b6f4d526e46524748595a4b55475862 esp
exec ipsec sa add 31 spi 100031 crypto-alg aes-gcm-128 crypto-key 6b6f4d526e46524748595a4b55475862 esp
exec ipsec tunnel protect ipip31 sa-out 100031 sa-in 31 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.32.1 p2p
exec ipsec sa add 100032 spi 200032 crypto-alg aes-gcm-128 crypto-key 42674d674655566c54664c6972466563 esp
exec ipsec sa add 32 spi 100032 crypto-alg aes-gcm-128 crypto-key 42674d674655566c54664c6972466563 esp
exec ipsec tunnel protect ipip32 sa-out 100032 sa-in 32 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.33.1 p2p
exec ipsec sa add 100033 spi 200033 crypto-alg aes-gcm-128 crypto-key 72575a594749537657516559574f4a79 esp
exec ipsec sa add 33 spi 100033 crypto-alg aes-gcm-128 crypto-key 72575a594749537657516559574f4a79 esp
exec ipsec tunnel protect ipip33 sa-out 100033 sa-in 33 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.34.1 p2p
exec ipsec sa add 100034 spi 200034 crypto-alg aes-gcm-128 crypto-key 6d75705872564863787a62724c516f72 esp
exec ipsec sa add 34 spi 100034 crypto-alg aes-gcm-128 crypto-key 6d75705872564863787a62724c516f72 esp
exec ipsec tunnel protect ipip34 sa-out 100034 sa-in 34 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.35.1 p2p
exec ipsec sa add 100035 spi 200035 crypto-alg aes-gcm-128 crypto-key 4c6a544f6c584d435a5363494668524b esp
exec ipsec sa add 35 spi 100035 crypto-alg aes-gcm-128 crypto-key 4c6a544f6c584d435a5363494668524b esp
exec ipsec tunnel protect ipip35 sa-out 100035 sa-in 35 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.36.1 p2p
exec ipsec sa add 100036 spi 200036 crypto-alg aes-gcm-128 crypto-key 6b7846787a7273496a5764544570464c esp
exec ipsec sa add 36 spi 100036 crypto-alg aes-gcm-128 crypto-key 6b7846787a7273496a5764544570464c esp
exec ipsec tunnel protect ipip36 sa-out 100036 sa-in 36 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.37.1 p2p
exec ipsec sa add 100037 spi 200037 crypto-alg aes-gcm-128 crypto-key 706b7448476d4148507966616e6f614a esp
exec ipsec sa add 37 spi 100037 crypto-alg aes-gcm-128 crypto-key 706b7448476d4148507966616e6f614a esp
exec ipsec tunnel protect ipip37 sa-out 100037 sa-in 37 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.38.1 p2p
exec ipsec sa add 100038 spi 200038 crypto-alg aes-gcm-128 crypto-key 596a6e477a47466d7452556a54446741 esp
exec ipsec sa add 38 spi 100038 crypto-alg aes-gcm-128 crypto-key 596a6e477a47466d7452556a54446741 esp
exec ipsec tunnel protect ipip38 sa-out 100038 sa-in 38 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.39.1 p2p
exec ipsec sa add 100039 spi 200039 crypto-alg aes-gcm-128 crypto-key 64615073496b73767372537742746d56 esp
exec ipsec sa add 39 spi 100039 crypto-alg aes-gcm-128 crypto-key 64615073496b73767372537742746d56 esp
exec ipsec tunnel protect ipip39 sa-out 100039 sa-in 39 add
exec ip route add 100.0.0.1/8 via 200.0.0.101 TenGigabitEthernet8/0/0
exec set interface unnumbered ipip0 use TenGigabitEthernet8/0/0
exec set interface state ipip0 up
exec ip route add 10.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use TenGigabitEthernet8/0/0
exec set interface state ipip1 up
exec ip route add 10.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use TenGigabitEthernet8/0/0
exec set interface state ipip2 up
exec ip route add 10.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use TenGigabitEthernet8/0/0
exec set interface state ipip3 up
exec ip route add 10.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use TenGigabitEthernet8/0/0
exec set interface state ipip4 up
exec ip route add 10.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use TenGigabitEthernet8/0/0
exec set interface state ipip5 up
exec ip route add 10.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use TenGigabitEthernet8/0/0
exec set interface state ipip6 up
exec ip route add 10.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use TenGigabitEthernet8/0/0
exec set interface state ipip7 up
exec ip route add 10.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use TenGigabitEthernet8/0/0
exec set interface state ipip8 up
exec ip route add 10.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use TenGigabitEthernet8/0/0
exec set interface state ipip9 up
exec ip route add 10.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use TenGigabitEthernet8/0/0
exec set interface state ipip10 up
exec ip route add 10.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use TenGigabitEthernet8/0/0
exec set interface state ipip11 up
exec ip route add 10.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use TenGigabitEthernet8/0/0
exec set interface state ipip12 up
exec ip route add 10.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use TenGigabitEthernet8/0/0
exec set interface state ipip13 up
exec ip route add 10.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use TenGigabitEthernet8/0/0
exec set interface state ipip14 up
exec ip route add 10.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use TenGigabitEthernet8/0/0
exec set interface state ipip15 up
exec ip route add 10.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use TenGigabitEthernet8/0/0
exec set interface state ipip16 up
exec ip route add 10.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use TenGigabitEthernet8/0/0
exec set interface state ipip17 up
exec ip route add 10.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use TenGigabitEthernet8/0/0
exec set interface state ipip18 up
exec ip route add 10.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use TenGigabitEthernet8/0/0
exec set interface state ipip19 up
exec ip route add 10.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use TenGigabitEthernet8/0/0
exec set interface state ipip20 up
exec ip route add 10.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use TenGigabitEthernet8/0/0
exec set interface state ipip21 up
exec ip route add 10.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use TenGigabitEthernet8/0/0
exec set interface state ipip22 up
exec ip route add 10.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use TenGigabitEthernet8/0/0
exec set interface state ipip23 up
exec ip route add 10.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use TenGigabitEthernet8/0/0
exec set interface state ipip24 up
exec ip route add 10.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use TenGigabitEthernet8/0/0
exec set interface state ipip25 up
exec ip route add 10.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use TenGigabitEthernet8/0/0
exec set interface state ipip26 up
exec ip route add 10.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use TenGigabitEthernet8/0/0
exec set interface state ipip27 up
exec ip route add 10.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use TenGigabitEthernet8/0/0
exec set interface state ipip28 up
exec ip route add 10.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use TenGigabitEthernet8/0/0
exec set interface state ipip29 up
exec ip route add 10.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use TenGigabitEthernet8/0/0
exec set interface state ipip30 up
exec ip route add 10.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use TenGigabitEthernet8/0/0
exec set interface state ipip31 up
exec ip route add 10.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use TenGigabitEthernet8/0/0
exec set interface state ipip32 up
exec ip route add 10.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use TenGigabitEthernet8/0/0
exec set interface state ipip33 up
exec ip route add 10.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use TenGigabitEthernet8/0/0
exec set interface state ipip34 up
exec ip route add 10.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use TenGigabitEthernet8/0/0
exec set interface state ipip35 up
exec ip route add 10.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use TenGigabitEthernet8/0/0
exec set interface state ipip36 up
exec ip route add 10.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use TenGigabitEthernet8/0/0
exec set interface state ipip37 up
exec ip route add 10.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use TenGigabitEthernet8/0/0
exec set interface state ipip38 up
exec ip route add 10.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use TenGigabitEthernet8/0/0
exec set interface state ipip39 up
exec ip route add 10.0.0.39/32 via ipip39

 imix-4t4c-ethip4ipsec40tnlsw- 
ip4base-int-aes128gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec set interface ip address TenGigabitEthernet8/0/0 200.0.0.102/24.0
exec create ipip tunnel src 200.0.0.102 dst 100.0.0.1 p2p
exec ipsec sa add 100000 spi 200000 crypto-alg aes-gcm-128 crypto-key 48577761685744777a4747515968625a esp
exec ipsec sa add 0 spi 100000 crypto-alg aes-gcm-128 crypto-key 48577761685744777a4747515968625a esp
exec ipsec tunnel protect ipip0 sa-out 100000 sa-in 0 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.1.1 p2p
exec ipsec sa add 100001 spi 200001 crypto-alg aes-gcm-128 crypto-key 78435a6c435276666d7a464a45744455 esp
exec ipsec sa add 1 spi 100001 crypto-alg aes-gcm-128 crypto-key 78435a6c435276666d7a464a45744455 esp
exec ipsec tunnel protect ipip1 sa-out 100001 sa-in 1 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.2.1 p2p
exec ipsec sa add 100002 spi 200002 crypto-alg aes-gcm-128 crypto-key 736d526e5478576b644f516243724775 esp
exec ipsec sa add 2 spi 100002 crypto-alg aes-gcm-128 crypto-key 736d526e5478576b644f516243724775 esp
exec ipsec tunnel protect ipip2 sa-out 100002 sa-in 2 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.3.1 p2p
exec ipsec sa add 100003 spi 200003 crypto-alg aes-gcm-128 crypto-key 4963446a454d6c594d6f544771414f61 esp
exec ipsec sa add 3 spi 100003 crypto-alg aes-gcm-128 crypto-key 4963446a454d6c594d6f544771414f61 esp
exec ipsec tunnel protect ipip3 sa-out 100003 sa-in 3 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.4.1 p2p
exec ipsec sa add 100004 spi 200004 crypto-alg aes-gcm-128 crypto-key 654d587a5262464a7774545778797456 esp
exec ipsec sa add 4 spi 100004 crypto-alg aes-gcm-128 crypto-key 654d587a5262464a7774545778797456 esp
exec ipsec tunnel protect ipip4 sa-out 100004 sa-in 4 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.5.1 p2p
exec ipsec sa add 100005 spi 200005 crypto-alg aes-gcm-128 crypto-key 65696c534442564b6a79454c4a4a5371 esp
exec ipsec sa add 5 spi 100005 crypto-alg aes-gcm-128 crypto-key 65696c534442564b6a79454c4a4a5371 esp
exec ipsec tunnel protect ipip5 sa-out 100005 sa-in 5 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.6.1 p2p
exec ipsec sa add 100006 spi 200006 crypto-alg aes-gcm-128 crypto-key 527a56745968656a69796b547151576b esp
exec ipsec sa add 6 spi 100006 crypto-alg aes-gcm-128 crypto-key 527a56745968656a69796b547151576b esp
exec ipsec tunnel protect ipip6 sa-out 100006 sa-in 6 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.7.1 p2p
exec ipsec sa add 100007 spi 200007 crypto-alg aes-gcm-128 crypto-key 5a43734f546c62576b61676d57754743 esp
exec ipsec sa add 7 spi 100007 crypto-alg aes-gcm-128 crypto-key 5a43734f546c62576b61676d57754743 esp
exec ipsec tunnel protect ipip7 sa-out 100007 sa-in 7 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.8.1 p2p
exec ipsec sa add 100008 spi 200008 crypto-alg aes-gcm-128 crypto-key 4845776e754651664844426743674250 esp
exec ipsec sa add 8 spi 100008 crypto-alg aes-gcm-128 crypto-key 4845776e754651664844426743674250 esp
exec ipsec tunnel protect ipip8 sa-out 100008 sa-in 8 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.9.1 p2p
exec ipsec sa add 100009 spi 200009 crypto-alg aes-gcm-128 crypto-key 507763456f4a49476b64784a6e7a4c6c esp
exec ipsec sa add 9 spi 100009 crypto-alg aes-gcm-128 crypto-key 507763456f4a49476b64784a6e7a4c6c esp
exec ipsec tunnel protect ipip9 sa-out 100009 sa-in 9 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.10.1 p2p
exec ipsec sa add 100010 spi 200010 crypto-alg aes-gcm-128 crypto-key 50597a78414b57526863684e47766550 esp
exec ipsec sa add 10 spi 100010 crypto-alg aes-gcm-128 crypto-key 50597a78414b57526863684e47766550 esp
exec ipsec tunnel protect ipip10 sa-out 100010 sa-in 10 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.11.1 p2p
exec ipsec sa add 100011 spi 200011 crypto-alg aes-gcm-128 crypto-key 64775878464d506c56756944665a416d esp
exec ipsec sa add 11 spi 100011 crypto-alg aes-gcm-128 crypto-key 64775878464d506c56756944665a416d esp
exec ipsec tunnel protect ipip11 sa-out 100011 sa-in 11 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.12.1 p2p
exec ipsec sa add 100012 spi 200012 crypto-alg aes-gcm-128 crypto-key 4a54694c4f4b594b5855465448467876 esp
exec ipsec sa add 12 spi 100012 crypto-alg aes-gcm-128 crypto-key 4a54694c4f4b594b5855465448467876 esp
exec ipsec tunnel protect ipip12 sa-out 100012 sa-in 12 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.13.1 p2p
exec ipsec sa add 100013 spi 200013 crypto-alg aes-gcm-128 crypto-key 527a7752424d4b6d617a5266756c7863 esp
exec ipsec sa add 13 spi 100013 crypto-alg aes-gcm-128 crypto-key 527a7752424d4b6d617a5266756c7863 esp
exec ipsec tunnel protect ipip13 sa-out 100013 sa-in 13 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.14.1 p2p
exec ipsec sa add 100014 spi 200014 crypto-alg aes-gcm-128 crypto-key 79485a7376706a44674d7a4545544f49 esp
exec ipsec sa add 14 spi 100014 crypto-alg aes-gcm-128 crypto-key 79485a7376706a44674d7a4545544f49 esp
exec ipsec tunnel protect ipip14 sa-out 100014 sa-in 14 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.15.1 p2p
exec ipsec sa add 100015 spi 200015 crypto-alg aes-gcm-128 crypto-key 5a4244584f634b49644e4f5571516763 esp
exec ipsec sa add 15 spi 100015 crypto-alg aes-gcm-128 crypto-key 5a4244584f634b49644e4f5571516763 esp
exec ipsec tunnel protect ipip15 sa-out 100015 sa-in 15 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.16.1 p2p
exec ipsec sa add 100016 spi 200016 crypto-alg aes-gcm-128 crypto-key 78724979444f7a5865614e4c784a5671 esp
exec ipsec sa add 16 spi 100016 crypto-alg aes-gcm-128 crypto-key 78724979444f7a5865614e4c784a5671 esp
exec ipsec tunnel protect ipip16 sa-out 100016 sa-in 16 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.17.1 p2p
exec ipsec sa add 100017 spi 200017 crypto-alg aes-gcm-128 crypto-key 736848496e73626e796c4f616c55624f esp
exec ipsec sa add 17 spi 100017 crypto-alg aes-gcm-128 crypto-key 736848496e73626e796c4f616c55624f esp
exec ipsec tunnel protect ipip17 sa-out 100017 sa-in 17 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.18.1 p2p
exec ipsec sa add 100018 spi 200018 crypto-alg aes-gcm-128 crypto-key 786e796868796e5a58417a666f454365 esp
exec ipsec sa add 18 spi 100018 crypto-alg aes-gcm-128 crypto-key 786e796868796e5a58417a666f454365 esp
exec ipsec tunnel protect ipip18 sa-out 100018 sa-in 18 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.19.1 p2p
exec ipsec sa add 100019 spi 200019 crypto-alg aes-gcm-128 crypto-key 71524c65556c6e6b6d4b666d6c6e4767 esp
exec ipsec sa add 19 spi 100019 crypto-alg aes-gcm-128 crypto-key 71524c65556c6e6b6d4b666d6c6e4767 esp
exec ipsec tunnel protect ipip19 sa-out 100019 sa-in 19 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.20.1 p2p
exec ipsec sa add 100020 spi 200020 crypto-alg aes-gcm-128 crypto-key 7a4171664d7550477246557a4f55636f esp
exec ipsec sa add 20 spi 100020 crypto-alg aes-gcm-128 crypto-key 7a4171664d7550477246557a4f55636f esp
exec ipsec tunnel protect ipip20 sa-out 100020 sa-in 20 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.21.1 p2p
exec ipsec sa add 100021 spi 200021 crypto-alg aes-gcm-128 crypto-key 4e656e68424569644a4d6b7041427576 esp
exec ipsec sa add 21 spi 100021 crypto-alg aes-gcm-128 crypto-key 4e656e68424569644a4d6b7041427576 esp
exec ipsec tunnel protect ipip21 sa-out 100021 sa-in 21 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.22.1 p2p
exec ipsec sa add 100022 spi 200022 crypto-alg aes-gcm-128 crypto-key 4e49655347484d454941486d66717564 esp
exec ipsec sa add 22 spi 100022 crypto-alg aes-gcm-128 crypto-key 4e49655347484d454941486d66717564 esp
exec ipsec tunnel protect ipip22 sa-out 100022 sa-in 22 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.23.1 p2p
exec ipsec sa add 100023 spi 200023 crypto-alg aes-gcm-128 crypto-key 795a625454484744525a66716e426e63 esp
exec ipsec sa add 23 spi 100023 crypto-alg aes-gcm-128 crypto-key 795a625454484744525a66716e426e63 esp
exec ipsec tunnel protect ipip23 sa-out 100023 sa-in 23 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.24.1 p2p
exec ipsec sa add 100024 spi 200024 crypto-alg aes-gcm-128 crypto-key 57644c47726b6454676e6b73657a4964 esp
exec ipsec sa add 24 spi 100024 crypto-alg aes-gcm-128 crypto-key 57644c47726b6454676e6b73657a4964 esp
exec ipsec tunnel protect ipip24 sa-out 100024 sa-in 24 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.25.1 p2p
exec ipsec sa add 100025 spi 200025 crypto-alg aes-gcm-128 crypto-key 464b6c7343474f4848635879424c7748 esp
exec ipsec sa add 25 spi 100025 crypto-alg aes-gcm-128 crypto-key 464b6c7343474f4848635879424c7748 esp
exec ipsec tunnel protect ipip25 sa-out 100025 sa-in 25 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.26.1 p2p
exec ipsec sa add 100026 spi 200026 crypto-alg aes-gcm-128 crypto-key 4b6d7a6958416d495949704f79774e72 esp
exec ipsec sa add 26 spi 100026 crypto-alg aes-gcm-128 crypto-key 4b6d7a6958416d495949704f79774e72 esp
exec ipsec tunnel protect ipip26 sa-out 100026 sa-in 26 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.27.1 p2p
exec ipsec sa add 100027 spi 200027 crypto-alg aes-gcm-128 crypto-key 796c52774d526851777975717a456369 esp
exec ipsec sa add 27 spi 100027 crypto-alg aes-gcm-128 crypto-key 796c52774d526851777975717a456369 esp
exec ipsec tunnel protect ipip27 sa-out 100027 sa-in 27 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.28.1 p2p
exec ipsec sa add 100028 spi 200028 crypto-alg aes-gcm-128 crypto-key 5961744c534641676956564e47427a6f esp
exec ipsec sa add 28 spi 100028 crypto-alg aes-gcm-128 crypto-key 5961744c534641676956564e47427a6f esp
exec ipsec tunnel protect ipip28 sa-out 100028 sa-in 28 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.29.1 p2p
exec ipsec sa add 100029 spi 200029 crypto-alg aes-gcm-128 crypto-key 6670756675776c48686a424748714242 esp
exec ipsec sa add 29 spi 100029 crypto-alg aes-gcm-128 crypto-key 6670756675776c48686a424748714242 esp
exec ipsec tunnel protect ipip29 sa-out 100029 sa-in 29 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.30.1 p2p
exec ipsec sa add 100030 spi 200030 crypto-alg aes-gcm-128 crypto-key 426266786351726f74474255664b7269 esp
exec ipsec sa add 30 spi 100030 crypto-alg aes-gcm-128 crypto-key 426266786351726f74474255664b7269 esp
exec ipsec tunnel protect ipip30 sa-out 100030 sa-in 30 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.31.1 p2p
exec ipsec sa add 100031 spi 200031 crypto-alg aes-gcm-128 crypto-key 64695269784971786e794b46636c6649 esp
exec ipsec sa add 31 spi 100031 crypto-alg aes-gcm-128 crypto-key 64695269784971786e794b46636c6649 esp
exec ipsec tunnel protect ipip31 sa-out 100031 sa-in 31 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.32.1 p2p
exec ipsec sa add 100032 spi 200032 crypto-alg aes-gcm-128 crypto-key 5a6f67626e664156694d614c46525361 esp
exec ipsec sa add 32 spi 100032 crypto-alg aes-gcm-128 crypto-key 5a6f67626e664156694d614c46525361 esp
exec ipsec tunnel protect ipip32 sa-out 100032 sa-in 32 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.33.1 p2p
exec ipsec sa add 100033 spi 200033 crypto-alg aes-gcm-128 crypto-key 4e446b466f716b76756b6d6c51546457 esp
exec ipsec sa add 33 spi 100033 crypto-alg aes-gcm-128 crypto-key 4e446b466f716b76756b6d6c51546457 esp
exec ipsec tunnel protect ipip33 sa-out 100033 sa-in 33 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.34.1 p2p
exec ipsec sa add 100034 spi 200034 crypto-alg aes-gcm-128 crypto-key 56797a616f5a4d594b444a634c78626f esp
exec ipsec sa add 34 spi 100034 crypto-alg aes-gcm-128 crypto-key 56797a616f5a4d594b444a634c78626f esp
exec ipsec tunnel protect ipip34 sa-out 100034 sa-in 34 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.35.1 p2p
exec ipsec sa add 100035 spi 200035 crypto-alg aes-gcm-128 crypto-key 496363596566425545437066634e4451 esp
exec ipsec sa add 35 spi 100035 crypto-alg aes-gcm-128 crypto-key 496363596566425545437066634e4451 esp
exec ipsec tunnel protect ipip35 sa-out 100035 sa-in 35 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.36.1 p2p
exec ipsec sa add 100036 spi 200036 crypto-alg aes-gcm-128 crypto-key 754742516e6c707943644d4d65474564 esp
exec ipsec sa add 36 spi 100036 crypto-alg aes-gcm-128 crypto-key 754742516e6c707943644d4d65474564 esp
exec ipsec tunnel protect ipip36 sa-out 100036 sa-in 36 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.37.1 p2p
exec ipsec sa add 100037 spi 200037 crypto-alg aes-gcm-128 crypto-key 52434e59476f7a716c6d6563614f5565 esp
exec ipsec sa add 37 spi 100037 crypto-alg aes-gcm-128 crypto-key 52434e59476f7a716c6d6563614f5565 esp
exec ipsec tunnel protect ipip37 sa-out 100037 sa-in 37 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.38.1 p2p
exec ipsec sa add 100038 spi 200038 crypto-alg aes-gcm-128 crypto-key 5065476a58446d4269624c427a677a75 esp
exec ipsec sa add 38 spi 100038 crypto-alg aes-gcm-128 crypto-key 5065476a58446d4269624c427a677a75 esp
exec ipsec tunnel protect ipip38 sa-out 100038 sa-in 38 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.39.1 p2p
exec ipsec sa add 100039 spi 200039 crypto-alg aes-gcm-128 crypto-key 4b524e7872535a64494b626b5a776153 esp
exec ipsec sa add 39 spi 100039 crypto-alg aes-gcm-128 crypto-key 4b524e7872535a64494b626b5a776153 esp
exec ipsec tunnel protect ipip39 sa-out 100039 sa-in 39 add
exec ip route add 100.0.0.1/8 via 200.0.0.101 TenGigabitEthernet8/0/0
exec set interface unnumbered ipip0 use TenGigabitEthernet8/0/0
exec set interface state ipip0 up
exec ip route add 10.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use TenGigabitEthernet8/0/0
exec set interface state ipip1 up
exec ip route add 10.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use TenGigabitEthernet8/0/0
exec set interface state ipip2 up
exec ip route add 10.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use TenGigabitEthernet8/0/0
exec set interface state ipip3 up
exec ip route add 10.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use TenGigabitEthernet8/0/0
exec set interface state ipip4 up
exec ip route add 10.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use TenGigabitEthernet8/0/0
exec set interface state ipip5 up
exec ip route add 10.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use TenGigabitEthernet8/0/0
exec set interface state ipip6 up
exec ip route add 10.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use TenGigabitEthernet8/0/0
exec set interface state ipip7 up
exec ip route add 10.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use TenGigabitEthernet8/0/0
exec set interface state ipip8 up
exec ip route add 10.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use TenGigabitEthernet8/0/0
exec set interface state ipip9 up
exec ip route add 10.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use TenGigabitEthernet8/0/0
exec set interface state ipip10 up
exec ip route add 10.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use TenGigabitEthernet8/0/0
exec set interface state ipip11 up
exec ip route add 10.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use TenGigabitEthernet8/0/0
exec set interface state ipip12 up
exec ip route add 10.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use TenGigabitEthernet8/0/0
exec set interface state ipip13 up
exec ip route add 10.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use TenGigabitEthernet8/0/0
exec set interface state ipip14 up
exec ip route add 10.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use TenGigabitEthernet8/0/0
exec set interface state ipip15 up
exec ip route add 10.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use TenGigabitEthernet8/0/0
exec set interface state ipip16 up
exec ip route add 10.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use TenGigabitEthernet8/0/0
exec set interface state ipip17 up
exec ip route add 10.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use TenGigabitEthernet8/0/0
exec set interface state ipip18 up
exec ip route add 10.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use TenGigabitEthernet8/0/0
exec set interface state ipip19 up
exec ip route add 10.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use TenGigabitEthernet8/0/0
exec set interface state ipip20 up
exec ip route add 10.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use TenGigabitEthernet8/0/0
exec set interface state ipip21 up
exec ip route add 10.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use TenGigabitEthernet8/0/0
exec set interface state ipip22 up
exec ip route add 10.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use TenGigabitEthernet8/0/0
exec set interface state ipip23 up
exec ip route add 10.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use TenGigabitEthernet8/0/0
exec set interface state ipip24 up
exec ip route add 10.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use TenGigabitEthernet8/0/0
exec set interface state ipip25 up
exec ip route add 10.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use TenGigabitEthernet8/0/0
exec set interface state ipip26 up
exec ip route add 10.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use TenGigabitEthernet8/0/0
exec set interface state ipip27 up
exec ip route add 10.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use TenGigabitEthernet8/0/0
exec set interface state ipip28 up
exec ip route add 10.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use TenGigabitEthernet8/0/0
exec set interface state ipip29 up
exec ip route add 10.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use TenGigabitEthernet8/0/0
exec set interface state ipip30 up
exec ip route add 10.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use TenGigabitEthernet8/0/0
exec set interface state ipip31 up
exec ip route add 10.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use TenGigabitEthernet8/0/0
exec set interface state ipip32 up
exec ip route add 10.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use TenGigabitEthernet8/0/0
exec set interface state ipip33 up
exec ip route add 10.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use TenGigabitEthernet8/0/0
exec set interface state ipip34 up
exec ip route add 10.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use TenGigabitEthernet8/0/0
exec set interface state ipip35 up
exec ip route add 10.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use TenGigabitEthernet8/0/0
exec set interface state ipip36 up
exec ip route add 10.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use TenGigabitEthernet8/0/0
exec set interface state ipip37 up
exec ip route add 10.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use TenGigabitEthernet8/0/0
exec set interface state ipip38 up
exec ip route add 10.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use TenGigabitEthernet8/0/0
exec set interface state ipip39 up
exec ip route add 10.0.0.39/32 via ipip39

10ge2p1x553-ethip4ipsec40tnlsw-ip4base-int-aes256gcm-ndrpdr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular opology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG verification: TG finds and reports throughput NDR (Non Drop Rate) with zero packet loss tolerance and throughput PDR (Partial Drop Rate) with non-zero packet loss tolerance (LT) expressed in percentage of packets transmitted. NDR and PDR are discovered for different Ethernet L2 frame sizes using MLRsearch library.

Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to umber of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG ode interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 64b-1t1c-ethip4ipsec40tnlsw- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec set interface ip address TenGigabitEthernet8/0/0 200.0.0.102/24.0
exec create ipip tunnel src 200.0.0.102 dst 100.0.0.1 p2p
exec ipsec sa add 100000 spi 200000 crypto-alg aes-gcm-256 crypto-key 594c78774c685a664e416c6449497073614779415a64634a576f4c4e59496350 esp
exec ipsec sa add 0 spi 100000 crypto-alg aes-gcm-256 crypto-key 594c78774c685a664e416c6449497073614779415a64634a576f4c4e59496350 esp
exec ipsec tunnel protect ipip0 sa-out 100000 sa-in 0 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.1.1 p2p
exec ipsec sa add 100001 spi 200001 crypto-alg aes-gcm-256 crypto-key 684f56585958585a6e6b7748416a58594f4f756f79676273684c694545566561 esp
exec ipsec sa add 1 spi 100001 crypto-alg aes-gcm-256 crypto-key 684f56585958585a6e6b7748416a58594f4f756f79676273684c694545566561 esp
exec ipsec tunnel protect ipip1 sa-out 100001 sa-in 1 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.2.1 p2p
exec ipsec sa add 100002 spi 200002 crypto-alg aes-gcm-256 crypto-key 44794b614469715756495264444b746b48786b6a567967796b58485246714959 esp
exec ipsec sa add 2 spi 100002 crypto-alg aes-gcm-256 crypto-key 44794b614469715756495264444b746b48786b6a567967796b58485246714959 esp
exec ipsec tunnel protect ipip2 sa-out 100002 sa-in 2 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.3.1 p2p
exec ipsec sa add 100003 spi 200003 crypto-alg aes-gcm-256 crypto-key 4a766547624c6b6673546d6c496567724e6b73795476786b695a4f647661754e esp
exec ipsec sa add 3 spi 100003 crypto-alg aes-gcm-256 crypto-key 4a766547624c6b6673546d6c496567724e6b73795476786b695a4f647661754e esp
exec ipsec tunnel protect ipip3 sa-out 100003 sa-in 3 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.4.1 p2p
exec ipsec sa add 100004 spi 200004 crypto-alg aes-gcm-256 crypto-key 4a43595142764b7a4b666f5064625474424f4641735855506d59416254767571 esp
exec ipsec sa add 4 spi 100004 crypto-alg aes-gcm-256 crypto-key 4a43595142764b7a4b666f5064625474424f4641735855506d59416254767571 esp
exec ipsec tunnel protect ipip4 sa-out 100004 sa-in 4 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.5.1 p2p
exec ipsec sa add 100005 spi 200005 crypto-alg aes-gcm-256 crypto-key 42765a735a4756416e61737862704159524d567347794b6663584261774d474c esp
exec ipsec sa add 5 spi 100005 crypto-alg aes-gcm-256 crypto-key 42765a735a4756416e61737862704159524d567347794b6663584261774d474c esp
exec ipsec tunnel protect ipip5 sa-out 100005 sa-in 5 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.6.1 p2p
exec ipsec sa add 100006 spi 200006 crypto-alg aes-gcm-256 crypto-key 437372557364764151556a6c58586f7053576e5467726644504a6778446c6268 esp
exec ipsec sa add 6 spi 100006 crypto-alg aes-gcm-256 crypto-key 437372557364764151556a6c58586f7053576e5467726644504a6778446c6268 esp
exec ipsec tunnel protect ipip6 sa-out 100006 sa-in 6 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.7.1 p2p
exec ipsec sa add 100007 spi 200007 crypto-alg aes-gcm-256 crypto-key 6350615274664669486d66566c76424851457859446570466b756b444b4c496d esp
exec ipsec sa add 7 spi 100007 crypto-alg aes-gcm-256 crypto-key 6350615274664669486d66566c76424851457859446570466b756b444b4c496d esp
exec ipsec tunnel protect ipip7 sa-out 100007 sa-in 7 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.8.1 p2p
exec ipsec sa add 100008 spi 200008 crypto-alg aes-gcm-256 crypto-key 4675744f5549557476554d556550614a45586d536173517779704e584f54434b esp
exec ipsec sa add 8 spi 100008 crypto-alg aes-gcm-256 crypto-key 4675744f5549557476554d556550614a45586d536173517779704e584f54434b esp
exec ipsec tunnel protect ipip8 sa-out 100008 sa-in 8 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.9.1 p2p
exec ipsec sa add 100009 spi 200009 crypto-alg aes-gcm-256 crypto-key 416d66574e706c5a7854474e4453556c6f7a67504d6f4356454166594c667774 esp
exec ipsec sa add 9 spi 100009 crypto-alg aes-gcm-256 crypto-key 416d66574e706c5a7854474e4453556c6f7a67504d6f4356454166594c667774 esp
exec ipsec tunnel protect ipip9 sa-out 100009 sa-in 9 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.10.1 p2p
exec ipsec sa add 100010 spi 200010 crypto-alg aes-gcm-256 crypto-key 514b72534b4273576e555071624663654f704b654e476e775166526f4d514445 esp
exec ipsec sa add 10 spi 100010 crypto-alg aes-gcm-256 crypto-key 514b72534b4273576e555071624663654f704b654e476e775166526f4d514445 esp
exec ipsec tunnel protect ipip10 sa-out 100010 sa-in 10 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.11.1 p2p
exec ipsec sa add 100011 spi 200011 crypto-alg aes-gcm-256 crypto-key 78674563636e776475536c564175574e734e695467756168516e4f546f4d6146 esp
exec ipsec sa add 11 spi 100011 crypto-alg aes-gcm-256 crypto-key 78674563636e776475536c564175574e734e695467756168516e4f546f4d6146 esp
exec ipsec tunnel protect ipip11 sa-out 100011 sa-in 11 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.12.1 p2p
exec ipsec sa add 100012 spi 200012 crypto-alg aes-gcm-256 crypto-key 61624f685578477156554756474a43654d4f7869565955596a7a506962625255 esp
exec ipsec sa add 12 spi 100012 crypto-alg aes-gcm-256 crypto-key 61624f685578477156554756474a43654d4f7869565955596a7a506962625255 esp
exec ipsec tunnel protect ipip12 sa-out 100012 sa-in 12 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.13.1 p2p
exec ipsec sa add 100013 spi 200013 crypto-alg aes-gcm-256 crypto-key 5377414e686665705546596966795a537763696679717a77564b4f4c4e445956 esp
exec ipsec sa add 13 spi 100013 crypto-alg aes-gcm-256 crypto-key 5377414e686665705546596966795a537763696679717a77564b4f4c4e445956 esp
exec ipsec tunnel protect ipip13 sa-out 100013 sa-in 13 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.14.1 p2p
exec ipsec sa add 100014 spi 200014 crypto-alg aes-gcm-256 crypto-key 57697a5a48554d66647054764c7156417a48617a7a73724d4c674d7654674e6a esp
exec ipsec sa add 14 spi 100014 crypto-alg aes-gcm-256 crypto-key 57697a5a48554d66647054764c7156417a48617a7a73724d4c674d7654674e6a esp
exec ipsec tunnel protect ipip14 sa-out 100014 sa-in 14 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.15.1 p2p
exec ipsec sa add 100015 spi 200015 crypto-alg aes-gcm-256 crypto-key 5a434f536c42787168654c72635871454e5541776b736647616c464f50466367 esp
exec ipsec sa add 15 spi 100015 crypto-alg aes-gcm-256 crypto-key 5a434f536c42787168654c72635871454e5541776b736647616c464f50466367 esp
exec ipsec tunnel protect ipip15 sa-out 100015 sa-in 15 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.16.1 p2p
exec ipsec sa add 100016 spi 200016 crypto-alg aes-gcm-256 crypto-key 474572517742786542744d4b467759705257475a45626b4961564f4254584470 esp
exec ipsec sa add 16 spi 100016 crypto-alg aes-gcm-256 crypto-key 474572517742786542744d4b467759705257475a45626b4961564f4254584470 esp
exec ipsec tunnel protect ipip16 sa-out 100016 sa-in 16 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.17.1 p2p
exec ipsec sa add 100017 spi 200017 crypto-alg aes-gcm-256 crypto-key 7247616d666966437052556a4f4c4b6473527541504753706a544d7242526661 esp
exec ipsec sa add 17 spi 100017 crypto-alg aes-gcm-256 crypto-key 7247616d666966437052556a4f4c4b6473527541504753706a544d7242526661 esp
exec ipsec tunnel protect ipip17 sa-out 100017 sa-in 17 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.18.1 p2p
exec ipsec sa add 100018 spi 200018 crypto-alg aes-gcm-256 crypto-key 556956506e46724d4577655176596a486d4e6d51566270524164467174424b66 esp
exec ipsec sa add 18 spi 100018 crypto-alg aes-gcm-256 crypto-key 556956506e46724d4577655176596a486d4e6d51566270524164467174424b66 esp
exec ipsec tunnel protect ipip18 sa-out 100018 sa-in 18 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.19.1 p2p
exec ipsec sa add 100019 spi 200019 crypto-alg aes-gcm-256 crypto-key 676d4a685a63734c6d6971514c736d6f496257464e71785958494e494a505079 esp
exec ipsec sa add 19 spi 100019 crypto-alg aes-gcm-256 crypto-key 676d4a685a63734c6d6971514c736d6f496257464e71785958494e494a505079 esp
exec ipsec tunnel protect ipip19 sa-out 100019 sa-in 19 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.20.1 p2p
exec ipsec sa add 100020 spi 200020 crypto-alg aes-gcm-256 crypto-key 6776494f456d734a4b6f707579576966656e5149575065457444564178616b66 esp
exec ipsec sa add 20 spi 100020 crypto-alg aes-gcm-256 crypto-key 6776494f456d734a4b6f707579576966656e5149575065457444564178616b66 esp
exec ipsec tunnel protect ipip20 sa-out 100020 sa-in 20 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.21.1 p2p
exec ipsec sa add 100021 spi 200021 crypto-alg aes-gcm-256 crypto-key 6867464874534c6f48685a676953424c4752476e6d7a44434b765471705a5256 esp
exec ipsec sa add 21 spi 100021 crypto-alg aes-gcm-256 crypto-key 6867464874534c6f48685a676953424c4752476e6d7a44434b765471705a5256 esp
exec ipsec tunnel protect ipip21 sa-out 100021 sa-in 21 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.22.1 p2p
exec ipsec sa add 100022 spi 200022 crypto-alg aes-gcm-256 crypto-key 6c685542616e6249724a4a4a4c4542587179517874586b7348704e666a645570 esp
exec ipsec sa add 22 spi 100022 crypto-alg aes-gcm-256 crypto-key 6c685542616e6249724a4a4a4c4542587179517874586b7348704e666a645570 esp
exec ipsec tunnel protect ipip22 sa-out 100022 sa-in 22 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.23.1 p2p
exec ipsec sa add 100023 spi 200023 crypto-alg aes-gcm-256 crypto-key 677a426861454c7a4b7a56576768634f584b536f746272574741536850534c41 esp
exec ipsec sa add 23 spi 100023 crypto-alg aes-gcm-256 crypto-key 677a426861454c7a4b7a56576768634f584b536f746272574741536850534c41 esp
exec ipsec tunnel protect ipip23 sa-out 100023 sa-in 23 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.24.1 p2p
exec ipsec sa add 100024 spi 200024 crypto-alg aes-gcm-256 crypto-key 484477487552695a625361666d5752716d6e6d56504a616c435079766c7a7952 esp
exec ipsec sa add 24 spi 100024 crypto-alg aes-gcm-256 crypto-key 484477487552695a625361666d5752716d6e6d56504a616c435079766c7a7952 esp
exec ipsec tunnel protect ipip24 sa-out 100024 sa-in 24 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.25.1 p2p
exec ipsec sa add 100025 spi 200025 crypto-alg aes-gcm-256 crypto-key 6662416254505a595a444747734a64786755656f445167796963674350495073 esp
exec ipsec sa add 25 spi 100025 crypto-alg aes-gcm-256 crypto-key 6662416254505a595a444747734a64786755656f445167796963674350495073 esp
exec ipsec tunnel protect ipip25 sa-out 100025 sa-in 25 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.26.1 p2p
exec ipsec sa add 100026 spi 200026 crypto-alg aes-gcm-256 crypto-key 7a7a70434a6e4b6e625a4e796a78577542416745417a596e675a4756576c6b76 esp
exec ipsec sa add 26 spi 100026 crypto-alg aes-gcm-256 crypto-key 7a7a70434a6e4b6e625a4e796a78577542416745417a596e675a4756576c6b76 esp
exec ipsec tunnel protect ipip26 sa-out 100026 sa-in 26 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.27.1 p2p
exec ipsec sa add 100027 spi 200027 crypto-alg aes-gcm-256 crypto-key 4570717a594a447648765a435650456a69587a6245426e69416166736c427478 esp
exec ipsec sa add 27 spi 100027 crypto-alg aes-gcm-256 crypto-key 4570717a594a447648765a435650456a69587a6245426e69416166736c427478 esp
exec ipsec tunnel protect ipip27 sa-out 100027 sa-in 27 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.28.1 p2p
exec ipsec sa add 100028 spi 200028 crypto-alg aes-gcm-256 crypto-key 7845434669616165444f7a7556544b6a4168486f4f7266764a497a7457687353 esp
exec ipsec sa add 28 spi 100028 crypto-alg aes-gcm-256 crypto-key 7845434669616165444f7a7556544b6a4168486f4f7266764a497a7457687353 esp
exec ipsec tunnel protect ipip28 sa-out 100028 sa-in 28 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.29.1 p2p
exec ipsec sa add 100029 spi 200029 crypto-alg aes-gcm-256 crypto-key 7776577273724b6742515250756256586d6e49554d4f666a4973587068755547 esp
exec ipsec sa add 29 spi 100029 crypto-alg aes-gcm-256 crypto-key 7776577273724b6742515250756256586d6e49554d4f666a4973587068755547 esp
exec ipsec tunnel protect ipip29 sa-out 100029 sa-in 29 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.30.1 p2p
exec ipsec sa add 100030 spi 200030 crypto-alg aes-gcm-256 crypto-key 566d537371445a6575434948565241646364674a6741776f6447546f4e454261 esp
exec ipsec sa add 30 spi 100030 crypto-alg aes-gcm-256 crypto-key 566d537371445a6575434948565241646364674a6741776f6447546f4e454261 esp
exec ipsec tunnel protect ipip30 sa-out 100030 sa-in 30 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.31.1 p2p
exec ipsec sa add 100031 spi 200031 crypto-alg aes-gcm-256 crypto-key 76646d7565776d65624a79426668416d73664368486275624e43767859547046 esp
exec ipsec sa add 31 spi 100031 crypto-alg aes-gcm-256 crypto-key 76646d7565776d65624a79426668416d73664368486275624e43767859547046 esp
exec ipsec tunnel protect ipip31 sa-out 100031 sa-in 31 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.32.1 p2p
exec ipsec sa add 100032 spi 200032 crypto-alg aes-gcm-256 crypto-key 744c614b684e53594945566f4450644e7645525656694f684943564b47425567 esp
exec ipsec sa add 32 spi 100032 crypto-alg aes-gcm-256 crypto-key 744c614b684e53594945566f4450644e7645525656694f684943564b47425567 esp
exec ipsec tunnel protect ipip32 sa-out 100032 sa-in 32 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.33.1 p2p
exec ipsec sa add 100033 spi 200033 crypto-alg aes-gcm-256 crypto-key 6355694e49456a6370495a45796779757a6944484a62676f526d784666794577 esp
exec ipsec sa add 33 spi 100033 crypto-alg aes-gcm-256 crypto-key 6355694e49456a6370495a45796779757a6944484a62676f526d784666794577 esp
exec ipsec tunnel protect ipip33 sa-out 100033 sa-in 33 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.34.1 p2p
exec ipsec sa add 100034 spi 200034 crypto-alg aes-gcm-256 crypto-key 6474674e517a5142644b6641636c53756b4d47756f6f63726e536b746c6f4776 esp
exec ipsec sa add 34 spi 100034 crypto-alg aes-gcm-256 crypto-key 6474674e517a5142644b6641636c53756b4d47756f6f63726e536b746c6f4776 esp
exec ipsec tunnel protect ipip34 sa-out 100034 sa-in 34 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.35.1 p2p
exec ipsec sa add 100035 spi 200035 crypto-alg aes-gcm-256 crypto-key 4564796851515a796679624a546377494a5346597a6a7479574c63726b514d5a esp
exec ipsec sa add 35 spi 100035 crypto-alg aes-gcm-256 crypto-key 4564796851515a796679624a546377494a5346597a6a7479574c63726b514d5a esp
exec ipsec tunnel protect ipip35 sa-out 100035 sa-in 35 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.36.1 p2p
exec ipsec sa add 100036 spi 200036 crypto-alg aes-gcm-256 crypto-key 4a735879486964786a6d6d4e51564d53784f7551536c474f47675a6b4967726f esp
exec ipsec sa add 36 spi 100036 crypto-alg aes-gcm-256 crypto-key 4a735879486964786a6d6d4e51564d53784f7551536c474f47675a6b4967726f esp
exec ipsec tunnel protect ipip36 sa-out 100036 sa-in 36 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.37.1 p2p
exec ipsec sa add 100037 spi 200037 crypto-alg aes-gcm-256 crypto-key 796568694770636e7575616d686a5275566b6c4f425357776a4e4f79526f4f6f esp
exec ipsec sa add 37 spi 100037 crypto-alg aes-gcm-256 crypto-key 796568694770636e7575616d686a5275566b6c4f425357776a4e4f79526f4f6f esp
exec ipsec tunnel protect ipip37 sa-out 100037 sa-in 37 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.38.1 p2p
exec ipsec sa add 100038 spi 200038 crypto-alg aes-gcm-256 crypto-key 61474a7268787262794142504e4c44577047587371534f6551714679664b5149 esp
exec ipsec sa add 38 spi 100038 crypto-alg aes-gcm-256 crypto-key 61474a7268787262794142504e4c44577047587371534f6551714679664b5149 esp
exec ipsec tunnel protect ipip38 sa-out 100038 sa-in 38 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.39.1 p2p
exec ipsec sa add 100039 spi 200039 crypto-alg aes-gcm-256 crypto-key 7054544e767570746851546c4f7675494657426b55614f667254615069456a4b esp
exec ipsec sa add 39 spi 100039 crypto-alg aes-gcm-256 crypto-key 7054544e767570746851546c4f7675494657426b55614f667254615069456a4b esp
exec ipsec tunnel protect ipip39 sa-out 100039 sa-in 39 add
exec ip route add 100.0.0.1/8 via 200.0.0.101 TenGigabitEthernet8/0/0
exec set interface unnumbered ipip0 use TenGigabitEthernet8/0/0
exec set interface state ipip0 up
exec ip route add 10.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use TenGigabitEthernet8/0/0
exec set interface state ipip1 up
exec ip route add 10.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use TenGigabitEthernet8/0/0
exec set interface state ipip2 up
exec ip route add 10.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use TenGigabitEthernet8/0/0
exec set interface state ipip3 up
exec ip route add 10.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use TenGigabitEthernet8/0/0
exec set interface state ipip4 up
exec ip route add 10.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use TenGigabitEthernet8/0/0
exec set interface state ipip5 up
exec ip route add 10.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use TenGigabitEthernet8/0/0
exec set interface state ipip6 up
exec ip route add 10.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use TenGigabitEthernet8/0/0
exec set interface state ipip7 up
exec ip route add 10.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use TenGigabitEthernet8/0/0
exec set interface state ipip8 up
exec ip route add 10.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use TenGigabitEthernet8/0/0
exec set interface state ipip9 up
exec ip route add 10.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use TenGigabitEthernet8/0/0
exec set interface state ipip10 up
exec ip route add 10.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use TenGigabitEthernet8/0/0
exec set interface state ipip11 up
exec ip route add 10.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use TenGigabitEthernet8/0/0
exec set interface state ipip12 up
exec ip route add 10.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use TenGigabitEthernet8/0/0
exec set interface state ipip13 up
exec ip route add 10.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use TenGigabitEthernet8/0/0
exec set interface state ipip14 up
exec ip route add 10.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use TenGigabitEthernet8/0/0
exec set interface state ipip15 up
exec ip route add 10.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use TenGigabitEthernet8/0/0
exec set interface state ipip16 up
exec ip route add 10.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use TenGigabitEthernet8/0/0
exec set interface state ipip17 up
exec ip route add 10.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use TenGigabitEthernet8/0/0
exec set interface state ipip18 up
exec ip route add 10.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use TenGigabitEthernet8/0/0
exec set interface state ipip19 up
exec ip route add 10.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use TenGigabitEthernet8/0/0
exec set interface state ipip20 up
exec ip route add 10.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use TenGigabitEthernet8/0/0
exec set interface state ipip21 up
exec ip route add 10.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use TenGigabitEthernet8/0/0
exec set interface state ipip22 up
exec ip route add 10.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use TenGigabitEthernet8/0/0
exec set interface state ipip23 up
exec ip route add 10.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use TenGigabitEthernet8/0/0
exec set interface state ipip24 up
exec ip route add 10.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use TenGigabitEthernet8/0/0
exec set interface state ipip25 up
exec ip route add 10.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use TenGigabitEthernet8/0/0
exec set interface state ipip26 up
exec ip route add 10.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use TenGigabitEthernet8/0/0
exec set interface state ipip27 up
exec ip route add 10.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use TenGigabitEthernet8/0/0
exec set interface state ipip28 up
exec ip route add 10.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use TenGigabitEthernet8/0/0
exec set interface state ipip29 up
exec ip route add 10.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use TenGigabitEthernet8/0/0
exec set interface state ipip30 up
exec ip route add 10.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use TenGigabitEthernet8/0/0
exec set interface state ipip31 up
exec ip route add 10.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use TenGigabitEthernet8/0/0
exec set interface state ipip32 up
exec ip route add 10.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use TenGigabitEthernet8/0/0
exec set interface state ipip33 up
exec ip route add 10.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use TenGigabitEthernet8/0/0
exec set interface state ipip34 up
exec ip route add 10.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use TenGigabitEthernet8/0/0
exec set interface state ipip35 up
exec ip route add 10.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use TenGigabitEthernet8/0/0
exec set interface state ipip36 up
exec ip route add 10.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use TenGigabitEthernet8/0/0
exec set interface state ipip37 up
exec ip route add 10.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use TenGigabitEthernet8/0/0
exec set interface state ipip38 up
exec ip route add 10.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use TenGigabitEthernet8/0/0
exec set interface state ipip39 up
exec ip route add 10.0.0.39/32 via ipip39

 64b-2t2c-ethip4ipsec40tnlsw- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec set interface ip address TenGigabitEthernet8/0/0 200.0.0.102/24.0
exec create ipip tunnel src 200.0.0.102 dst 100.0.0.1 p2p
exec ipsec sa add 100000 spi 200000 crypto-alg aes-gcm-256 crypto-key 694c4772456677694e466667584a6573474542694d62594d4b7256596f476345 esp
exec ipsec sa add 0 spi 100000 crypto-alg aes-gcm-256 crypto-key 694c4772456677694e466667584a6573474542694d62594d4b7256596f476345 esp
exec ipsec tunnel protect ipip0 sa-out 100000 sa-in 0 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.1.1 p2p
exec ipsec sa add 100001 spi 200001 crypto-alg aes-gcm-256 crypto-key 566442446d4851676c414356506867484f566a695863467a6e776d704c566a74 esp
exec ipsec sa add 1 spi 100001 crypto-alg aes-gcm-256 crypto-key 566442446d4851676c414356506867484f566a695863467a6e776d704c566a74 esp
exec ipsec tunnel protect ipip1 sa-out 100001 sa-in 1 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.2.1 p2p
exec ipsec sa add 100002 spi 200002 crypto-alg aes-gcm-256 crypto-key 517544485455424a634c4d6e58694443426c6b597a796b5673524f4277665651 esp
exec ipsec sa add 2 spi 100002 crypto-alg aes-gcm-256 crypto-key 517544485455424a634c4d6e58694443426c6b597a796b5673524f4277665651 esp
exec ipsec tunnel protect ipip2 sa-out 100002 sa-in 2 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.3.1 p2p
exec ipsec sa add 100003 spi 200003 crypto-alg aes-gcm-256 crypto-key 4e6b4554596c63775579646e76575569614d6b6877554d6164626d685754474e esp
exec ipsec sa add 3 spi 100003 crypto-alg aes-gcm-256 crypto-key 4e6b4554596c63775579646e76575569614d6b6877554d6164626d685754474e esp
exec ipsec tunnel protect ipip3 sa-out 100003 sa-in 3 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.4.1 p2p
exec ipsec sa add 100004 spi 200004 crypto-alg aes-gcm-256 crypto-key 715a674e6f6d4b774870436d4651586e416f48536361566358695369626c4743 esp
exec ipsec sa add 4 spi 100004 crypto-alg aes-gcm-256 crypto-key 715a674e6f6d4b774870436d4651586e416f48536361566358695369626c4743 esp
exec ipsec tunnel protect ipip4 sa-out 100004 sa-in 4 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.5.1 p2p
exec ipsec sa add 100005 spi 200005 crypto-alg aes-gcm-256 crypto-key 42696d57644f44774b6f4e4a454a4e4a51547442416e5662596d474445677345 esp
exec ipsec sa add 5 spi 100005 crypto-alg aes-gcm-256 crypto-key 42696d57644f44774b6f4e4a454a4e4a51547442416e5662596d474445677345 esp
exec ipsec tunnel protect ipip5 sa-out 100005 sa-in 5 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.6.1 p2p
exec ipsec sa add 100006 spi 200006 crypto-alg aes-gcm-256 crypto-key 737063614c4a7a6844585855726a566c6e754863686b52506465516b79655750 esp
exec ipsec sa add 6 spi 100006 crypto-alg aes-gcm-256 crypto-key 737063614c4a7a6844585855726a566c6e754863686b52506465516b79655750 esp
exec ipsec tunnel protect ipip6 sa-out 100006 sa-in 6 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.7.1 p2p
exec ipsec sa add 100007 spi 200007 crypto-alg aes-gcm-256 crypto-key 744c474564547a734e44596566576c687a6674444170776a444e7a496772504b esp
exec ipsec sa add 7 spi 100007 crypto-alg aes-gcm-256 crypto-key 744c474564547a734e44596566576c687a6674444170776a444e7a496772504b esp
exec ipsec tunnel protect ipip7 sa-out 100007 sa-in 7 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.8.1 p2p
exec ipsec sa add 100008 spi 200008 crypto-alg aes-gcm-256 crypto-key 417575797a4652774e5761587455595052556e59645a64526552414a634f6a52 esp
exec ipsec sa add 8 spi 100008 crypto-alg aes-gcm-256 crypto-key 417575797a4652774e5761587455595052556e59645a64526552414a634f6a52 esp
exec ipsec tunnel protect ipip8 sa-out 100008 sa-in 8 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.9.1 p2p
exec ipsec sa add 100009 spi 200009 crypto-alg aes-gcm-256 crypto-key 734d7474496875747041724a704c4e677748624f514a6b68716b4e444d63677a esp
exec ipsec sa add 9 spi 100009 crypto-alg aes-gcm-256 crypto-key 734d7474496875747041724a704c4e677748624f514a6b68716b4e444d63677a esp
exec ipsec tunnel protect ipip9 sa-out 100009 sa-in 9 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.10.1 p2p
exec ipsec sa add 100010 spi 200010 crypto-alg aes-gcm-256 crypto-key 677976506f6c6a796f7346517656665443664546464b7064516d4d566b776e59 esp
exec ipsec sa add 10 spi 100010 crypto-alg aes-gcm-256 crypto-key 677976506f6c6a796f7346517656665443664546464b7064516d4d566b776e59 esp
exec ipsec tunnel protect ipip10 sa-out 100010 sa-in 10 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.11.1 p2p
exec ipsec sa add 100011 spi 200011 crypto-alg aes-gcm-256 crypto-key 4d7a616e5a6c724b6243636241504e54596e6748656c627645754c4877744e74 esp
exec ipsec sa add 11 spi 100011 crypto-alg aes-gcm-256 crypto-key 4d7a616e5a6c724b6243636241504e54596e6748656c627645754c4877744e74 esp
exec ipsec tunnel protect ipip11 sa-out 100011 sa-in 11 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.12.1 p2p
exec ipsec sa add 100012 spi 200012 crypto-alg aes-gcm-256 crypto-key 576947676d50707a43445057654b54735a6c666e4e5949734145627755486b6e esp
exec ipsec sa add 12 spi 100012 crypto-alg aes-gcm-256 crypto-key 576947676d50707a43445057654b54735a6c666e4e5949734145627755486b6e esp
exec ipsec tunnel protect ipip12 sa-out 100012 sa-in 12 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.13.1 p2p
exec ipsec sa add 100013 spi 200013 crypto-alg aes-gcm-256 crypto-key 6b7167437a4476484d6a73756d766f4e75474e437968677666414b67524e534e esp
exec ipsec sa add 13 spi 100013 crypto-alg aes-gcm-256 crypto-key 6b7167437a4476484d6a73756d766f4e75474e437968677666414b67524e534e esp
exec ipsec tunnel protect ipip13 sa-out 100013 sa-in 13 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.14.1 p2p
exec ipsec sa add 100014 spi 200014 crypto-alg aes-gcm-256 crypto-key 694b746c53796d707978746c505a706477427a70524445477346494641665a69 esp
exec ipsec sa add 14 spi 100014 crypto-alg aes-gcm-256 crypto-key 694b746c53796d707978746c505a706477427a70524445477346494641665a69 esp
exec ipsec tunnel protect ipip14 sa-out 100014 sa-in 14 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.15.1 p2p
exec ipsec sa add 100015 spi 200015 crypto-alg aes-gcm-256 crypto-key 4e456a6c6d616e6351674c61674148727371757273696b425a66627058675673 esp
exec ipsec sa add 15 spi 100015 crypto-alg aes-gcm-256 crypto-key 4e456a6c6d616e6351674c61674148727371757273696b425a66627058675673 esp
exec ipsec tunnel protect ipip15 sa-out 100015 sa-in 15 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.16.1 p2p
exec ipsec sa add 100016 spi 200016 crypto-alg aes-gcm-256 crypto-key 765a5955556c75577345507676676641654b7557664576505a4d644e4a41756c esp
exec ipsec sa add 16 spi 100016 crypto-alg aes-gcm-256 crypto-key 765a5955556c75577345507676676641654b7557664576505a4d644e4a41756c esp
exec ipsec tunnel protect ipip16 sa-out 100016 sa-in 16 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.17.1 p2p
exec ipsec sa add 100017 spi 200017 crypto-alg aes-gcm-256 crypto-key 766858677965744e59546941446658526852696f4a52725a4c6f49716f6f6574 esp
exec ipsec sa add 17 spi 100017 crypto-alg aes-gcm-256 crypto-key 766858677965744e59546941446658526852696f4a52725a4c6f49716f6f6574 esp
exec ipsec tunnel protect ipip17 sa-out 100017 sa-in 17 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.18.1 p2p
exec ipsec sa add 100018 spi 200018 crypto-alg aes-gcm-256 crypto-key 78784b71417459497568475a7a694b706b64587a7a46564c727059724c505a76 esp
exec ipsec sa add 18 spi 100018 crypto-alg aes-gcm-256 crypto-key 78784b71417459497568475a7a694b706b64587a7a46564c727059724c505a76 esp
exec ipsec tunnel protect ipip18 sa-out 100018 sa-in 18 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.19.1 p2p
exec ipsec sa add 100019 spi 200019 crypto-alg aes-gcm-256 crypto-key 564b516263645a766c757874467951795949766d43416a516f68647a71544344 esp
exec ipsec sa add 19 spi 100019 crypto-alg aes-gcm-256 crypto-key 564b516263645a766c757874467951795949766d43416a516f68647a71544344 esp
exec ipsec tunnel protect ipip19 sa-out 100019 sa-in 19 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.20.1 p2p
exec ipsec sa add 100020 spi 200020 crypto-alg aes-gcm-256 crypto-key 6c456b524379586f6e4a7269726d4a586c426357414c78734f7a7648574c4b69 esp
exec ipsec sa add 20 spi 100020 crypto-alg aes-gcm-256 crypto-key 6c456b524379586f6e4a7269726d4a586c426357414c78734f7a7648574c4b69 esp
exec ipsec tunnel protect ipip20 sa-out 100020 sa-in 20 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.21.1 p2p
exec ipsec sa add 100021 spi 200021 crypto-alg aes-gcm-256 crypto-key 6d7243654d6c7a51744a6c66767653646477666278566b576274477557774d75 esp
exec ipsec sa add 21 spi 100021 crypto-alg aes-gcm-256 crypto-key 6d7243654d6c7a51744a6c66767653646477666278566b576274477557774d75 esp
exec ipsec tunnel protect ipip21 sa-out 100021 sa-in 21 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.22.1 p2p
exec ipsec sa add 100022 spi 200022 crypto-alg aes-gcm-256 crypto-key 7950426f6b4142686253754e7966456359496b536d44766748796a4244795957 esp
exec ipsec sa add 22 spi 100022 crypto-alg aes-gcm-256 crypto-key 7950426f6b4142686253754e7966456359496b536d44766748796a4244795957 esp
exec ipsec tunnel protect ipip22 sa-out 100022 sa-in 22 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.23.1 p2p
exec ipsec sa add 100023 spi 200023 crypto-alg aes-gcm-256 crypto-key 73774e624346777774465958624852657971704c57797267634a6a6443707462 esp
exec ipsec sa add 23 spi 100023 crypto-alg aes-gcm-256 crypto-key 73774e624346777774465958624852657971704c57797267634a6a6443707462 esp
exec ipsec tunnel protect ipip23 sa-out 100023 sa-in 23 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.24.1 p2p
exec ipsec sa add 100024 spi 200024 crypto-alg aes-gcm-256 crypto-key 5858626841464965445650466c45486d625a4347466f5a4b4571504a614c5575 esp
exec ipsec sa add 24 spi 100024 crypto-alg aes-gcm-256 crypto-key 5858626841464965445650466c45486d625a4347466f5a4b4571504a614c5575 esp
exec ipsec tunnel protect ipip24 sa-out 100024 sa-in 24 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.25.1 p2p
exec ipsec sa add 100025 spi 200025 crypto-alg aes-gcm-256 crypto-key 576a694b63484b777176746559526650775065565179504f564342784f415252 esp
exec ipsec sa add 25 spi 100025 crypto-alg aes-gcm-256 crypto-key 576a694b63484b777176746559526650775065565179504f564342784f415252 esp
exec ipsec tunnel protect ipip25 sa-out 100025 sa-in 25 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.26.1 p2p
exec ipsec sa add 100026 spi 200026 crypto-alg aes-gcm-256 crypto-key 4e52426a7a496579477141765a546b6a45566579526f5a72795948796a626e5a esp
exec ipsec sa add 26 spi 100026 crypto-alg aes-gcm-256 crypto-key 4e52426a7a496579477141765a546b6a45566579526f5a72795948796a626e5a esp
exec ipsec tunnel protect ipip26 sa-out 100026 sa-in 26 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.27.1 p2p
exec ipsec sa add 100027 spi 200027 crypto-alg aes-gcm-256 crypto-key 6f4e557866616a4d67787053416258486143767078634e4341504e446650664d esp
exec ipsec sa add 27 spi 100027 crypto-alg aes-gcm-256 crypto-key 6f4e557866616a4d67787053416258486143767078634e4341504e446650664d esp
exec ipsec tunnel protect ipip27 sa-out 100027 sa-in 27 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.28.1 p2p
exec ipsec sa add 100028 spi 200028 crypto-alg aes-gcm-256 crypto-key 49705759507757496b43454b7a637549716f466f43486b78756252617068716a esp
exec ipsec sa add 28 spi 100028 crypto-alg aes-gcm-256 crypto-key 49705759507757496b43454b7a637549716f466f43486b78756252617068716a esp
exec ipsec tunnel protect ipip28 sa-out 100028 sa-in 28 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.29.1 p2p
exec ipsec sa add 100029 spi 200029 crypto-alg aes-gcm-256 crypto-key 5a74456f645951796f6b50785051447946515172694b785268574e5559694257 esp
exec ipsec sa add 29 spi 100029 crypto-alg aes-gcm-256 crypto-key 5a74456f645951796f6b50785051447946515172694b785268574e5559694257 esp
exec ipsec tunnel protect ipip29 sa-out 100029 sa-in 29 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.30.1 p2p
exec ipsec sa add 100030 spi 200030 crypto-alg aes-gcm-256 crypto-key 506c4c79556864446f4e6a675a5242616863655667676a4b6179416374676775 esp
exec ipsec sa add 30 spi 100030 crypto-alg aes-gcm-256 crypto-key 506c4c79556864446f4e6a675a5242616863655667676a4b6179416374676775 esp
exec ipsec tunnel protect ipip30 sa-out 100030 sa-in 30 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.31.1 p2p
exec ipsec sa add 100031 spi 200031 crypto-alg aes-gcm-256 crypto-key 736957626f655741506f45506750755142667363695454647a4b6949616f474d esp
exec ipsec sa add 31 spi 100031 crypto-alg aes-gcm-256 crypto-key 736957626f655741506f45506750755142667363695454647a4b6949616f474d esp
exec ipsec tunnel protect ipip31 sa-out 100031 sa-in 31 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.32.1 p2p
exec ipsec sa add 100032 spi 200032 crypto-alg aes-gcm-256 crypto-key 6772626b4c6844594e48514c5944755a4a454952766a667279746f5963674976 esp
exec ipsec sa add 32 spi 100032 crypto-alg aes-gcm-256 crypto-key 6772626b4c6844594e48514c5944755a4a454952766a667279746f5963674976 esp
exec ipsec tunnel protect ipip32 sa-out 100032 sa-in 32 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.33.1 p2p
exec ipsec sa add 100033 spi 200033 crypto-alg aes-gcm-256 crypto-key 4d7345656f636b7874767654445266716f796c4455656e794770426974674965 esp
exec ipsec sa add 33 spi 100033 crypto-alg aes-gcm-256 crypto-key 4d7345656f636b7874767654445266716f796c4455656e794770426974674965 esp
exec ipsec tunnel protect ipip33 sa-out 100033 sa-in 33 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.34.1 p2p
exec ipsec sa add 100034 spi 200034 crypto-alg aes-gcm-256 crypto-key 62504147674751694c7057465851526f55585156525864774764547771676f70 esp
exec ipsec sa add 34 spi 100034 crypto-alg aes-gcm-256 crypto-key 62504147674751694c7057465851526f55585156525864774764547771676f70 esp
exec ipsec tunnel protect ipip34 sa-out 100034 sa-in 34 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.35.1 p2p
exec ipsec sa add 100035 spi 200035 crypto-alg aes-gcm-256 crypto-key 527568776842426a796d4e43424b736d544e6745634977724866766a7558754f esp
exec ipsec sa add 35 spi 100035 crypto-alg aes-gcm-256 crypto-key 527568776842426a796d4e43424b736d544e6745634977724866766a7558754f esp
exec ipsec tunnel protect ipip35 sa-out 100035 sa-in 35 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.36.1 p2p
exec ipsec sa add 100036 spi 200036 crypto-alg aes-gcm-256 crypto-key 56436a726e656f687a4b507975504368726775586b496872675444674b794f76 esp
exec ipsec sa add 36 spi 100036 crypto-alg aes-gcm-256 crypto-key 56436a726e656f687a4b507975504368726775586b496872675444674b794f76 esp
exec ipsec tunnel protect ipip36 sa-out 100036 sa-in 36 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.37.1 p2p
exec ipsec sa add 100037 spi 200037 crypto-alg aes-gcm-256 crypto-key 6661596a7957517470484d50724c62774c775862416e6e59784f476f54787358 esp
exec ipsec sa add 37 spi 100037 crypto-alg aes-gcm-256 crypto-key 6661596a7957517470484d50724c62774c775862416e6e59784f476f54787358 esp
exec ipsec tunnel protect ipip37 sa-out 100037 sa-in 37 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.38.1 p2p
exec ipsec sa add 100038 spi 200038 crypto-alg aes-gcm-256 crypto-key 464e6f41524c766c4a4d49734e646f5a54576141496f575644786649764b7646 esp
exec ipsec sa add 38 spi 100038 crypto-alg aes-gcm-256 crypto-key 464e6f41524c766c4a4d49734e646f5a54576141496f575644786649764b7646 esp
exec ipsec tunnel protect ipip38 sa-out 100038 sa-in 38 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.39.1 p2p
exec ipsec sa add 100039 spi 200039 crypto-alg aes-gcm-256 crypto-key 726e64526251626748505875737946484d59666f7642756f486f52646346456d esp
exec ipsec sa add 39 spi 100039 crypto-alg aes-gcm-256 crypto-key 726e64526251626748505875737946484d59666f7642756f486f52646346456d esp
exec ipsec tunnel protect ipip39 sa-out 100039 sa-in 39 add
exec ip route add 100.0.0.1/8 via 200.0.0.101 TenGigabitEthernet8/0/0
exec set interface unnumbered ipip0 use TenGigabitEthernet8/0/0
exec set interface state ipip0 up
exec ip route add 10.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use TenGigabitEthernet8/0/0
exec set interface state ipip1 up
exec ip route add 10.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use TenGigabitEthernet8/0/0
exec set interface state ipip2 up
exec ip route add 10.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use TenGigabitEthernet8/0/0
exec set interface state ipip3 up
exec ip route add 10.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use TenGigabitEthernet8/0/0
exec set interface state ipip4 up
exec ip route add 10.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use TenGigabitEthernet8/0/0
exec set interface state ipip5 up
exec ip route add 10.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use TenGigabitEthernet8/0/0
exec set interface state ipip6 up
exec ip route add 10.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use TenGigabitEthernet8/0/0
exec set interface state ipip7 up
exec ip route add 10.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use TenGigabitEthernet8/0/0
exec set interface state ipip8 up
exec ip route add 10.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use TenGigabitEthernet8/0/0
exec set interface state ipip9 up
exec ip route add 10.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use TenGigabitEthernet8/0/0
exec set interface state ipip10 up
exec ip route add 10.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use TenGigabitEthernet8/0/0
exec set interface state ipip11 up
exec ip route add 10.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use TenGigabitEthernet8/0/0
exec set interface state ipip12 up
exec ip route add 10.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use TenGigabitEthernet8/0/0
exec set interface state ipip13 up
exec ip route add 10.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use TenGigabitEthernet8/0/0
exec set interface state ipip14 up
exec ip route add 10.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use TenGigabitEthernet8/0/0
exec set interface state ipip15 up
exec ip route add 10.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use TenGigabitEthernet8/0/0
exec set interface state ipip16 up
exec ip route add 10.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use TenGigabitEthernet8/0/0
exec set interface state ipip17 up
exec ip route add 10.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use TenGigabitEthernet8/0/0
exec set interface state ipip18 up
exec ip route add 10.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use TenGigabitEthernet8/0/0
exec set interface state ipip19 up
exec ip route add 10.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use TenGigabitEthernet8/0/0
exec set interface state ipip20 up
exec ip route add 10.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use TenGigabitEthernet8/0/0
exec set interface state ipip21 up
exec ip route add 10.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use TenGigabitEthernet8/0/0
exec set interface state ipip22 up
exec ip route add 10.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use TenGigabitEthernet8/0/0
exec set interface state ipip23 up
exec ip route add 10.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use TenGigabitEthernet8/0/0
exec set interface state ipip24 up
exec ip route add 10.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use TenGigabitEthernet8/0/0
exec set interface state ipip25 up
exec ip route add 10.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use TenGigabitEthernet8/0/0
exec set interface state ipip26 up
exec ip route add 10.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use TenGigabitEthernet8/0/0
exec set interface state ipip27 up
exec ip route add 10.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use TenGigabitEthernet8/0/0
exec set interface state ipip28 up
exec ip route add 10.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use TenGigabitEthernet8/0/0
exec set interface state ipip29 up
exec ip route add 10.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use TenGigabitEthernet8/0/0
exec set interface state ipip30 up
exec ip route add 10.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use TenGigabitEthernet8/0/0
exec set interface state ipip31 up
exec ip route add 10.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use TenGigabitEthernet8/0/0
exec set interface state ipip32 up
exec ip route add 10.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use TenGigabitEthernet8/0/0
exec set interface state ipip33 up
exec ip route add 10.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use TenGigabitEthernet8/0/0
exec set interface state ipip34 up
exec ip route add 10.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use TenGigabitEthernet8/0/0
exec set interface state ipip35 up
exec ip route add 10.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use TenGigabitEthernet8/0/0
exec set interface state ipip36 up
exec ip route add 10.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use TenGigabitEthernet8/0/0
exec set interface state ipip37 up
exec ip route add 10.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use TenGigabitEthernet8/0/0
exec set interface state ipip38 up
exec ip route add 10.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use TenGigabitEthernet8/0/0
exec set interface state ipip39 up
exec ip route add 10.0.0.39/32 via ipip39

 64b-4t4c-ethip4ipsec40tnlsw- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec set interface ip address TenGigabitEthernet8/0/0 200.0.0.102/24.0
exec create ipip tunnel src 200.0.0.102 dst 100.0.0.1 p2p
exec ipsec sa add 100000 spi 200000 crypto-alg aes-gcm-256 crypto-key 4a594d4d51566b706a6d436f6841435859486f6d466a65684374564968444e4e esp
exec ipsec sa add 0 spi 100000 crypto-alg aes-gcm-256 crypto-key 4a594d4d51566b706a6d436f6841435859486f6d466a65684374564968444e4e esp
exec ipsec tunnel protect ipip0 sa-out 100000 sa-in 0 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.1.1 p2p
exec ipsec sa add 100001 spi 200001 crypto-alg aes-gcm-256 crypto-key 514b586f726b6859575171726b43734371655079576e63775847634453636673 esp
exec ipsec sa add 1 spi 100001 crypto-alg aes-gcm-256 crypto-key 514b586f726b6859575171726b43734371655079576e63775847634453636673 esp
exec ipsec tunnel protect ipip1 sa-out 100001 sa-in 1 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.2.1 p2p
exec ipsec sa add 100002 spi 200002 crypto-alg aes-gcm-256 crypto-key 7847695252516f566b766571764d6e6267635a457657535652504772456c6743 esp
exec ipsec sa add 2 spi 100002 crypto-alg aes-gcm-256 crypto-key 7847695252516f566b766571764d6e6267635a457657535652504772456c6743 esp
exec ipsec tunnel protect ipip2 sa-out 100002 sa-in 2 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.3.1 p2p
exec ipsec sa add 100003 spi 200003 crypto-alg aes-gcm-256 crypto-key 4f50544e487946464e487061677458517a454d62556e44656a776a7975545a53 esp
exec ipsec sa add 3 spi 100003 crypto-alg aes-gcm-256 crypto-key 4f50544e487946464e487061677458517a454d62556e44656a776a7975545a53 esp
exec ipsec tunnel protect ipip3 sa-out 100003 sa-in 3 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.4.1 p2p
exec ipsec sa add 100004 spi 200004 crypto-alg aes-gcm-256 crypto-key 6348484c73676e4246626d696b5a7172494b6b554741704a514b615263537872 esp
exec ipsec sa add 4 spi 100004 crypto-alg aes-gcm-256 crypto-key 6348484c73676e4246626d696b5a7172494b6b554741704a514b615263537872 esp
exec ipsec tunnel protect ipip4 sa-out 100004 sa-in 4 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.5.1 p2p
exec ipsec sa add 100005 spi 200005 crypto-alg aes-gcm-256 crypto-key 73734a67514e484e487664737472794959504144634746734659574e516b6244 esp
exec ipsec sa add 5 spi 100005 crypto-alg aes-gcm-256 crypto-key 73734a67514e484e487664737472794959504144634746734659574e516b6244 esp
exec ipsec tunnel protect ipip5 sa-out 100005 sa-in 5 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.6.1 p2p
exec ipsec sa add 100006 spi 200006 crypto-alg aes-gcm-256 crypto-key 45795a4d71474752484a4f6e544563557670444e69497748765865636c4c5757 esp
exec ipsec sa add 6 spi 100006 crypto-alg aes-gcm-256 crypto-key 45795a4d71474752484a4f6e544563557670444e69497748765865636c4c5757 esp
exec ipsec tunnel protect ipip6 sa-out 100006 sa-in 6 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.7.1 p2p
exec ipsec sa add 100007 spi 200007 crypto-alg aes-gcm-256 crypto-key 5648746c784b545479624d5a48536c556b616446585a67737655514852694443 esp
exec ipsec sa add 7 spi 100007 crypto-alg aes-gcm-256 crypto-key 5648746c784b545479624d5a48536c556b616446585a67737655514852694443 esp
exec ipsec tunnel protect ipip7 sa-out 100007 sa-in 7 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.8.1 p2p
exec ipsec sa add 100008 spi 200008 crypto-alg aes-gcm-256 crypto-key 41784b65575057434c484974766d504f53744b426a63576e49637645706e567a esp
exec ipsec sa add 8 spi 100008 crypto-alg aes-gcm-256 crypto-key 41784b65575057434c484974766d504f53744b426a63576e49637645706e567a esp
exec ipsec tunnel protect ipip8 sa-out 100008 sa-in 8 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.9.1 p2p
exec ipsec sa add 100009 spi 200009 crypto-alg aes-gcm-256 crypto-key 425a6e696158796a45714b4e646d4669424e49566e6e7453427267756b55764c esp
exec ipsec sa add 9 spi 100009 crypto-alg aes-gcm-256 crypto-key 425a6e696158796a45714b4e646d4669424e49566e6e7453427267756b55764c esp
exec ipsec tunnel protect ipip9 sa-out 100009 sa-in 9 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.10.1 p2p
exec ipsec sa add 100010 spi 200010 crypto-alg aes-gcm-256 crypto-key 6a524a7943627647794b75754b657373456369725a4d79566f6d77504b415576 esp
exec ipsec sa add 10 spi 100010 crypto-alg aes-gcm-256 crypto-key 6a524a7943627647794b75754b657373456369725a4d79566f6d77504b415576 esp
exec ipsec tunnel protect ipip10 sa-out 100010 sa-in 10 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.11.1 p2p
exec ipsec sa add 100011 spi 200011 crypto-alg aes-gcm-256 crypto-key 4569616479775a6e4d544d434c67595242734a416e5064466e5955464267766d esp
exec ipsec sa add 11 spi 100011 crypto-alg aes-gcm-256 crypto-key 4569616479775a6e4d544d434c67595242734a416e5064466e5955464267766d esp
exec ipsec tunnel protect ipip11 sa-out 100011 sa-in 11 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.12.1 p2p
exec ipsec sa add 100012 spi 200012 crypto-alg aes-gcm-256 crypto-key 5571517a594179495143754e5451444254787a4f685262797966436b50415074 esp
exec ipsec sa add 12 spi 100012 crypto-alg aes-gcm-256 crypto-key 5571517a594179495143754e5451444254787a4f685262797966436b50415074 esp
exec ipsec tunnel protect ipip12 sa-out 100012 sa-in 12 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.13.1 p2p
exec ipsec sa add 100013 spi 200013 crypto-alg aes-gcm-256 crypto-key 504c684a50797a736f7a444d546f504c4770685675666654724f52536b7a697a esp
exec ipsec sa add 13 spi 100013 crypto-alg aes-gcm-256 crypto-key 504c684a50797a736f7a444d546f504c4770685675666654724f52536b7a697a esp
exec ipsec tunnel protect ipip13 sa-out 100013 sa-in 13 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.14.1 p2p
exec ipsec sa add 100014 spi 200014 crypto-alg aes-gcm-256 crypto-key 6f764d6c424563515a53747572576a4d45776e41446e4c55486c496d72596a58 esp
exec ipsec sa add 14 spi 100014 crypto-alg aes-gcm-256 crypto-key 6f764d6c424563515a53747572576a4d45776e41446e4c55486c496d72596a58 esp
exec ipsec tunnel protect ipip14 sa-out 100014 sa-in 14 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.15.1 p2p
exec ipsec sa add 100015 spi 200015 crypto-alg aes-gcm-256 crypto-key 4755594d4d4d574b4e7a6f7053795174674c527a6d5a5a787a55665156737569 esp
exec ipsec sa add 15 spi 100015 crypto-alg aes-gcm-256 crypto-key 4755594d4d4d574b4e7a6f7053795174674c527a6d5a5a787a55665156737569 esp
exec ipsec tunnel protect ipip15 sa-out 100015 sa-in 15 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.16.1 p2p
exec ipsec sa add 100016 spi 200016 crypto-alg aes-gcm-256 crypto-key 796f636d4c54465a556656526f737549644b475366686f445a47515668546658 esp
exec ipsec sa add 16 spi 100016 crypto-alg aes-gcm-256 crypto-key 796f636d4c54465a556656526f737549644b475366686f445a47515668546658 esp
exec ipsec tunnel protect ipip16 sa-out 100016 sa-in 16 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.17.1 p2p
exec ipsec sa add 100017 spi 200017 crypto-alg aes-gcm-256 crypto-key 69755548534561565a456e6b4f485463777a65554f59586f79796851596e5a4e esp
exec ipsec sa add 17 spi 100017 crypto-alg aes-gcm-256 crypto-key 69755548534561565a456e6b4f485463777a65554f59586f79796851596e5a4e esp
exec ipsec tunnel protect ipip17 sa-out 100017 sa-in 17 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.18.1 p2p
exec ipsec sa add 100018 spi 200018 crypto-alg aes-gcm-256 crypto-key 555676536347477562585a4e7278486b4d4969466b6d624f5a73647a68506c6b esp
exec ipsec sa add 18 spi 100018 crypto-alg aes-gcm-256 crypto-key 555676536347477562585a4e7278486b4d4969466b6d624f5a73647a68506c6b esp
exec ipsec tunnel protect ipip18 sa-out 100018 sa-in 18 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.19.1 p2p
exec ipsec sa add 100019 spi 200019 crypto-alg aes-gcm-256 crypto-key 72624d546e4252425a56697a6f7a5a4e64424a4147424a61554e574d6f585545 esp
exec ipsec sa add 19 spi 100019 crypto-alg aes-gcm-256 crypto-key 72624d546e4252425a56697a6f7a5a4e64424a4147424a61554e574d6f585545 esp
exec ipsec tunnel protect ipip19 sa-out 100019 sa-in 19 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.20.1 p2p
exec ipsec sa add 100020 spi 200020 crypto-alg aes-gcm-256 crypto-key 67444a43664a7568716757564d516376426c54454e774679746c416f49446f4d esp
exec ipsec sa add 20 spi 100020 crypto-alg aes-gcm-256 crypto-key 67444a43664a7568716757564d516376426c54454e774679746c416f49446f4d esp
exec ipsec tunnel protect ipip20 sa-out 100020 sa-in 20 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.21.1 p2p
exec ipsec sa add 100021 spi 200021 crypto-alg aes-gcm-256 crypto-key 4d6b697a6f7555664c4c64535a434a6a4b72784d5376596d466f674f76686b50 esp
exec ipsec sa add 21 spi 100021 crypto-alg aes-gcm-256 crypto-key 4d6b697a6f7555664c4c64535a434a6a4b72784d5376596d466f674f76686b50 esp
exec ipsec tunnel protect ipip21 sa-out 100021 sa-in 21 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.22.1 p2p
exec ipsec sa add 100022 spi 200022 crypto-alg aes-gcm-256 crypto-key 6c6e5870554f504d66556c6c687847554673734c424a447a47425063446b6e45 esp
exec ipsec sa add 22 spi 100022 crypto-alg aes-gcm-256 crypto-key 6c6e5870554f504d66556c6c687847554673734c424a447a47425063446b6e45 esp
exec ipsec tunnel protect ipip22 sa-out 100022 sa-in 22 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.23.1 p2p
exec ipsec sa add 100023 spi 200023 crypto-alg aes-gcm-256 crypto-key 48687241647a6f4d617765644741445973565051795a496a6b534f4774586854 esp
exec ipsec sa add 23 spi 100023 crypto-alg aes-gcm-256 crypto-key 48687241647a6f4d617765644741445973565051795a496a6b534f4774586854 esp
exec ipsec tunnel protect ipip23 sa-out 100023 sa-in 23 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.24.1 p2p
exec ipsec sa add 100024 spi 200024 crypto-alg aes-gcm-256 crypto-key 636b56517570686d4c614f706f736c68594c6a526e4942525a5375684c424643 esp
exec ipsec sa add 24 spi 100024 crypto-alg aes-gcm-256 crypto-key 636b56517570686d4c614f706f736c68594c6a526e4942525a5375684c424643 esp
exec ipsec tunnel protect ipip24 sa-out 100024 sa-in 24 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.25.1 p2p
exec ipsec sa add 100025 spi 200025 crypto-alg aes-gcm-256 crypto-key 6d4a79725a6c4b694e614166454d5759414f7a527a704b6a6e714d5949454a4b esp
exec ipsec sa add 25 spi 100025 crypto-alg aes-gcm-256 crypto-key 6d4a79725a6c4b694e614166454d5759414f7a527a704b6a6e714d5949454a4b esp
exec ipsec tunnel protect ipip25 sa-out 100025 sa-in 25 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.26.1 p2p
exec ipsec sa add 100026 spi 200026 crypto-alg aes-gcm-256 crypto-key 4f614d7a504b436f6d4d75596147466f796e50626876796b704b584871427046 esp
exec ipsec sa add 26 spi 100026 crypto-alg aes-gcm-256 crypto-key 4f614d7a504b436f6d4d75596147466f796e50626876796b704b584871427046 esp
exec ipsec tunnel protect ipip26 sa-out 100026 sa-in 26 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.27.1 p2p
exec ipsec sa add 100027 spi 200027 crypto-alg aes-gcm-256 crypto-key 6d4d4645747259594662546c49564b5254705569764d4761496e597853656954 esp
exec ipsec sa add 27 spi 100027 crypto-alg aes-gcm-256 crypto-key 6d4d4645747259594662546c49564b5254705569764d4761496e597853656954 esp
exec ipsec tunnel protect ipip27 sa-out 100027 sa-in 27 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.28.1 p2p
exec ipsec sa add 100028 spi 200028 crypto-alg aes-gcm-256 crypto-key 56576f6a46787a63745041714a764250625148586771504d6f6f764d67585647 esp
exec ipsec sa add 28 spi 100028 crypto-alg aes-gcm-256 crypto-key 56576f6a46787a63745041714a764250625148586771504d6f6f764d67585647 esp
exec ipsec tunnel protect ipip28 sa-out 100028 sa-in 28 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.29.1 p2p
exec ipsec sa add 100029 spi 200029 crypto-alg aes-gcm-256 crypto-key 6b51524a4b654a6d4253497a566e614c486d47754e6863734773756371504249 esp
exec ipsec sa add 29 spi 100029 crypto-alg aes-gcm-256 crypto-key 6b51524a4b654a6d4253497a566e614c486d47754e6863734773756371504249 esp
exec ipsec tunnel protect ipip29 sa-out 100029 sa-in 29 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.30.1 p2p
exec ipsec sa add 100030 spi 200030 crypto-alg aes-gcm-256 crypto-key 73504b44717070435a624f625174715975784d6561756e795678597650566651 esp
exec ipsec sa add 30 spi 100030 crypto-alg aes-gcm-256 crypto-key 73504b44717070435a624f625174715975784d6561756e795678597650566651 esp
exec ipsec tunnel protect ipip30 sa-out 100030 sa-in 30 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.31.1 p2p
exec ipsec sa add 100031 spi 200031 crypto-alg aes-gcm-256 crypto-key 747248574f4c72754e61736d796755667561697071434f7174587462656b6b41 esp
exec ipsec sa add 31 spi 100031 crypto-alg aes-gcm-256 crypto-key 747248574f4c72754e61736d796755667561697071434f7174587462656b6b41 esp
exec ipsec tunnel protect ipip31 sa-out 100031 sa-in 31 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.32.1 p2p
exec ipsec sa add 100032 spi 200032 crypto-alg aes-gcm-256 crypto-key 7841456e496a63756e727774576a764d796a4e4a6f6f697a64466e504c454e70 esp
exec ipsec sa add 32 spi 100032 crypto-alg aes-gcm-256 crypto-key 7841456e496a63756e727774576a764d796a4e4a6f6f697a64466e504c454e70 esp
exec ipsec tunnel protect ipip32 sa-out 100032 sa-in 32 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.33.1 p2p
exec ipsec sa add 100033 spi 200033 crypto-alg aes-gcm-256 crypto-key 72576c6e5a5351516659594b684a455070766c4c617350475875776e424a6449 esp
exec ipsec sa add 33 spi 100033 crypto-alg aes-gcm-256 crypto-key 72576c6e5a5351516659594b684a455070766c4c617350475875776e424a6449 esp
exec ipsec tunnel protect ipip33 sa-out 100033 sa-in 33 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.34.1 p2p
exec ipsec sa add 100034 spi 200034 crypto-alg aes-gcm-256 crypto-key 566b66577a6c664c685763714942686e43434f774772625956657a4f714b5247 esp
exec ipsec sa add 34 spi 100034 crypto-alg aes-gcm-256 crypto-key 566b66577a6c664c685763714942686e43434f774772625956657a4f714b5247 esp
exec ipsec tunnel protect ipip34 sa-out 100034 sa-in 34 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.35.1 p2p
exec ipsec sa add 100035 spi 200035 crypto-alg aes-gcm-256 crypto-key 57576b6868614b65674c6879497a744e444246674e744f52674a78727568426e esp
exec ipsec sa add 35 spi 100035 crypto-alg aes-gcm-256 crypto-key 57576b6868614b65674c6879497a744e444246674e744f52674a78727568426e esp
exec ipsec tunnel protect ipip35 sa-out 100035 sa-in 35 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.36.1 p2p
exec ipsec sa add 100036 spi 200036 crypto-alg aes-gcm-256 crypto-key 464a7a6b44634e656e594b65756c454f774866775052514f7a536d7463417574 esp
exec ipsec sa add 36 spi 100036 crypto-alg aes-gcm-256 crypto-key 464a7a6b44634e656e594b65756c454f774866775052514f7a536d7463417574 esp
exec ipsec tunnel protect ipip36 sa-out 100036 sa-in 36 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.37.1 p2p
exec ipsec sa add 100037 spi 200037 crypto-alg aes-gcm-256 crypto-key 6c7767546d7343754a4b6458746c4a64495769494a6b745a43794f6950507159 esp
exec ipsec sa add 37 spi 100037 crypto-alg aes-gcm-256 crypto-key 6c7767546d7343754a4b6458746c4a64495769494a6b745a43794f6950507159 esp
exec ipsec tunnel protect ipip37 sa-out 100037 sa-in 37 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.38.1 p2p
exec ipsec sa add 100038 spi 200038 crypto-alg aes-gcm-256 crypto-key 657079655a444261516b737163524a6d4249616277735074634e74736a46626f esp
exec ipsec sa add 38 spi 100038 crypto-alg aes-gcm-256 crypto-key 657079655a444261516b737163524a6d4249616277735074634e74736a46626f esp
exec ipsec tunnel protect ipip38 sa-out 100038 sa-in 38 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.39.1 p2p
exec ipsec sa add 100039 spi 200039 crypto-alg aes-gcm-256 crypto-key 766771704375454574426e665479585a546954427871434e456c7341496e4e71 esp
exec ipsec sa add 39 spi 100039 crypto-alg aes-gcm-256 crypto-key 766771704375454574426e665479585a546954427871434e456c7341496e4e71 esp
exec ipsec tunnel protect ipip39 sa-out 100039 sa-in 39 add
exec ip route add 100.0.0.1/8 via 200.0.0.101 TenGigabitEthernet8/0/0
exec set interface unnumbered ipip0 use TenGigabitEthernet8/0/0
exec set interface state ipip0 up
exec ip route add 10.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use TenGigabitEthernet8/0/0
exec set interface state ipip1 up
exec ip route add 10.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use TenGigabitEthernet8/0/0
exec set interface state ipip2 up
exec ip route add 10.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use TenGigabitEthernet8/0/0
exec set interface state ipip3 up
exec ip route add 10.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use TenGigabitEthernet8/0/0
exec set interface state ipip4 up
exec ip route add 10.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use TenGigabitEthernet8/0/0
exec set interface state ipip5 up
exec ip route add 10.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use TenGigabitEthernet8/0/0
exec set interface state ipip6 up
exec ip route add 10.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use TenGigabitEthernet8/0/0
exec set interface state ipip7 up
exec ip route add 10.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use TenGigabitEthernet8/0/0
exec set interface state ipip8 up
exec ip route add 10.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use TenGigabitEthernet8/0/0
exec set interface state ipip9 up
exec ip route add 10.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use TenGigabitEthernet8/0/0
exec set interface state ipip10 up
exec ip route add 10.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use TenGigabitEthernet8/0/0
exec set interface state ipip11 up
exec ip route add 10.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use TenGigabitEthernet8/0/0
exec set interface state ipip12 up
exec ip route add 10.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use TenGigabitEthernet8/0/0
exec set interface state ipip13 up
exec ip route add 10.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use TenGigabitEthernet8/0/0
exec set interface state ipip14 up
exec ip route add 10.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use TenGigabitEthernet8/0/0
exec set interface state ipip15 up
exec ip route add 10.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use TenGigabitEthernet8/0/0
exec set interface state ipip16 up
exec ip route add 10.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use TenGigabitEthernet8/0/0
exec set interface state ipip17 up
exec ip route add 10.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use TenGigabitEthernet8/0/0
exec set interface state ipip18 up
exec ip route add 10.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use TenGigabitEthernet8/0/0
exec set interface state ipip19 up
exec ip route add 10.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use TenGigabitEthernet8/0/0
exec set interface state ipip20 up
exec ip route add 10.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use TenGigabitEthernet8/0/0
exec set interface state ipip21 up
exec ip route add 10.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use TenGigabitEthernet8/0/0
exec set interface state ipip22 up
exec ip route add 10.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use TenGigabitEthernet8/0/0
exec set interface state ipip23 up
exec ip route add 10.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use TenGigabitEthernet8/0/0
exec set interface state ipip24 up
exec ip route add 10.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use TenGigabitEthernet8/0/0
exec set interface state ipip25 up
exec ip route add 10.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use TenGigabitEthernet8/0/0
exec set interface state ipip26 up
exec ip route add 10.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use TenGigabitEthernet8/0/0
exec set interface state ipip27 up
exec ip route add 10.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use TenGigabitEthernet8/0/0
exec set interface state ipip28 up
exec ip route add 10.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use TenGigabitEthernet8/0/0
exec set interface state ipip29 up
exec ip route add 10.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use TenGigabitEthernet8/0/0
exec set interface state ipip30 up
exec ip route add 10.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use TenGigabitEthernet8/0/0
exec set interface state ipip31 up
exec ip route add 10.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use TenGigabitEthernet8/0/0
exec set interface state ipip32 up
exec ip route add 10.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use TenGigabitEthernet8/0/0
exec set interface state ipip33 up
exec ip route add 10.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use TenGigabitEthernet8/0/0
exec set interface state ipip34 up
exec ip route add 10.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use TenGigabitEthernet8/0/0
exec set interface state ipip35 up
exec ip route add 10.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use TenGigabitEthernet8/0/0
exec set interface state ipip36 up
exec ip route add 10.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use TenGigabitEthernet8/0/0
exec set interface state ipip37 up
exec ip route add 10.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use TenGigabitEthernet8/0/0
exec set interface state ipip38 up
exec ip route add 10.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use TenGigabitEthernet8/0/0
exec set interface state ipip39 up
exec ip route add 10.0.0.39/32 via ipip39

 1518b-1t1c-ethip4ipsec40tnlsw- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec set interface ip address TenGigabitEthernet8/0/0 200.0.0.102/24.0
exec create ipip tunnel src 200.0.0.102 dst 100.0.0.1 p2p
exec ipsec sa add 100000 spi 200000 crypto-alg aes-gcm-256 crypto-key 724c437a6858717a5a6b5875616d6c576e426e4850474455504f724347685644 esp
exec ipsec sa add 0 spi 100000 crypto-alg aes-gcm-256 crypto-key 724c437a6858717a5a6b5875616d6c576e426e4850474455504f724347685644 esp
exec ipsec tunnel protect ipip0 sa-out 100000 sa-in 0 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.1.1 p2p
exec ipsec sa add 100001 spi 200001 crypto-alg aes-gcm-256 crypto-key 5772454c7575646862534d467843736b49554152676271656e6e58677a744f66 esp
exec ipsec sa add 1 spi 100001 crypto-alg aes-gcm-256 crypto-key 5772454c7575646862534d467843736b49554152676271656e6e58677a744f66 esp
exec ipsec tunnel protect ipip1 sa-out 100001 sa-in 1 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.2.1 p2p
exec ipsec sa add 100002 spi 200002 crypto-alg aes-gcm-256 crypto-key 57624159457a51744b585667534a5069416e4758696b477348726b73764b4770 esp
exec ipsec sa add 2 spi 100002 crypto-alg aes-gcm-256 crypto-key 57624159457a51744b585667534a5069416e4758696b477348726b73764b4770 esp
exec ipsec tunnel protect ipip2 sa-out 100002 sa-in 2 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.3.1 p2p
exec ipsec sa add 100003 spi 200003 crypto-alg aes-gcm-256 crypto-key 68417355526f626b4c415746634b5a53445650446d556459644d41687a6c6c74 esp
exec ipsec sa add 3 spi 100003 crypto-alg aes-gcm-256 crypto-key 68417355526f626b4c415746634b5a53445650446d556459644d41687a6c6c74 esp
exec ipsec tunnel protect ipip3 sa-out 100003 sa-in 3 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.4.1 p2p
exec ipsec sa add 100004 spi 200004 crypto-alg aes-gcm-256 crypto-key 42677373636c7642786c7a43534e567a63677464425a5252725379707777646e esp
exec ipsec sa add 4 spi 100004 crypto-alg aes-gcm-256 crypto-key 42677373636c7642786c7a43534e567a63677464425a5252725379707777646e esp
exec ipsec tunnel protect ipip4 sa-out 100004 sa-in 4 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.5.1 p2p
exec ipsec sa add 100005 spi 200005 crypto-alg aes-gcm-256 crypto-key 77557a7247446e6a726b555142765a636a5473736e445263664c6c4843574667 esp
exec ipsec sa add 5 spi 100005 crypto-alg aes-gcm-256 crypto-key 77557a7247446e6a726b555142765a636a5473736e445263664c6c4843574667 esp
exec ipsec tunnel protect ipip5 sa-out 100005 sa-in 5 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.6.1 p2p
exec ipsec sa add 100006 spi 200006 crypto-alg aes-gcm-256 crypto-key 67734a46415572474a4259744267515748614f54684552737647454879557146 esp
exec ipsec sa add 6 spi 100006 crypto-alg aes-gcm-256 crypto-key 67734a46415572474a4259744267515748614f54684552737647454879557146 esp
exec ipsec tunnel protect ipip6 sa-out 100006 sa-in 6 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.7.1 p2p
exec ipsec sa add 100007 spi 200007 crypto-alg aes-gcm-256 crypto-key 47765a427366494f525575556755636c504f4c736b49575873745858484f5462 esp
exec ipsec sa add 7 spi 100007 crypto-alg aes-gcm-256 crypto-key 47765a427366494f525575556755636c504f4c736b49575873745858484f5462 esp
exec ipsec tunnel protect ipip7 sa-out 100007 sa-in 7 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.8.1 p2p
exec ipsec sa add 100008 spi 200008 crypto-alg aes-gcm-256 crypto-key 6c6f624865736e777755676a595851577276754a6856757570434e4d58544658 esp
exec ipsec sa add 8 spi 100008 crypto-alg aes-gcm-256 crypto-key 6c6f624865736e777755676a595851577276754a6856757570434e4d58544658 esp
exec ipsec tunnel protect ipip8 sa-out 100008 sa-in 8 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.9.1 p2p
exec ipsec sa add 100009 spi 200009 crypto-alg aes-gcm-256 crypto-key 4c6b5954615973664150474d636347696f6b454e584e45614448665048495148 esp
exec ipsec sa add 9 spi 100009 crypto-alg aes-gcm-256 crypto-key 4c6b5954615973664150474d636347696f6b454e584e45614448665048495148 esp
exec ipsec tunnel protect ipip9 sa-out 100009 sa-in 9 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.10.1 p2p
exec ipsec sa add 100010 spi 200010 crypto-alg aes-gcm-256 crypto-key 5a4964625366576c614f704c43435566574c4b735954434d565a426b66746d55 esp
exec ipsec sa add 10 spi 100010 crypto-alg aes-gcm-256 crypto-key 5a4964625366576c614f704c43435566574c4b735954434d565a426b66746d55 esp
exec ipsec tunnel protect ipip10 sa-out 100010 sa-in 10 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.11.1 p2p
exec ipsec sa add 100011 spi 200011 crypto-alg aes-gcm-256 crypto-key 4c4f4c5249544177656f6b756e7a4d584f515a6c594c5551636f6772544b6857 esp
exec ipsec sa add 11 spi 100011 crypto-alg aes-gcm-256 crypto-key 4c4f4c5249544177656f6b756e7a4d584f515a6c594c5551636f6772544b6857 esp
exec ipsec tunnel protect ipip11 sa-out 100011 sa-in 11 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.12.1 p2p
exec ipsec sa add 100012 spi 200012 crypto-alg aes-gcm-256 crypto-key 6c7772657372454b74774f7642626f7766656f474a6978496757427454694948 esp
exec ipsec sa add 12 spi 100012 crypto-alg aes-gcm-256 crypto-key 6c7772657372454b74774f7642626f7766656f474a6978496757427454694948 esp
exec ipsec tunnel protect ipip12 sa-out 100012 sa-in 12 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.13.1 p2p
exec ipsec sa add 100013 spi 200013 crypto-alg aes-gcm-256 crypto-key 6776536e66774b4a716b725446734361736674574b4b415042634d49634a5555 esp
exec ipsec sa add 13 spi 100013 crypto-alg aes-gcm-256 crypto-key 6776536e66774b4a716b725446734361736674574b4b415042634d49634a5555 esp
exec ipsec tunnel protect ipip13 sa-out 100013 sa-in 13 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.14.1 p2p
exec ipsec sa add 100014 spi 200014 crypto-alg aes-gcm-256 crypto-key 4949664d414752546f666341737357564d6d4a594d4c587772574252576d4f6a esp
exec ipsec sa add 14 spi 100014 crypto-alg aes-gcm-256 crypto-key 4949664d414752546f666341737357564d6d4a594d4c587772574252576d4f6a esp
exec ipsec tunnel protect ipip14 sa-out 100014 sa-in 14 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.15.1 p2p
exec ipsec sa add 100015 spi 200015 crypto-alg aes-gcm-256 crypto-key 627178496d794d53775262676b63744c64444d62774b69626376594b78595745 esp
exec ipsec sa add 15 spi 100015 crypto-alg aes-gcm-256 crypto-key 627178496d794d53775262676b63744c64444d62774b69626376594b78595745 esp
exec ipsec tunnel protect ipip15 sa-out 100015 sa-in 15 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.16.1 p2p
exec ipsec sa add 100016 spi 200016 crypto-alg aes-gcm-256 crypto-key 494654586d7551414c4e574b626950446d656c67584e75695a77414376445a61 esp
exec ipsec sa add 16 spi 100016 crypto-alg aes-gcm-256 crypto-key 494654586d7551414c4e574b626950446d656c67584e75695a77414376445a61 esp
exec ipsec tunnel protect ipip16 sa-out 100016 sa-in 16 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.17.1 p2p
exec ipsec sa add 100017 spi 200017 crypto-alg aes-gcm-256 crypto-key 6954434e72706e494169446d62506d61716e756b57514c705555517272494346 esp
exec ipsec sa add 17 spi 100017 crypto-alg aes-gcm-256 crypto-key 6954434e72706e494169446d62506d61716e756b57514c705555517272494346 esp
exec ipsec tunnel protect ipip17 sa-out 100017 sa-in 17 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.18.1 p2p
exec ipsec sa add 100018 spi 200018 crypto-alg aes-gcm-256 crypto-key 6f6b476a41596b5a5a56595a6d656f424a4f69524f76644877756f48434a755a esp
exec ipsec sa add 18 spi 100018 crypto-alg aes-gcm-256 crypto-key 6f6b476a41596b5a5a56595a6d656f424a4f69524f76644877756f48434a755a esp
exec ipsec tunnel protect ipip18 sa-out 100018 sa-in 18 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.19.1 p2p
exec ipsec sa add 100019 spi 200019 crypto-alg aes-gcm-256 crypto-key 48737a48716b62636c416c71544d4a524c6a6c6f625252494643434c5673675a esp
exec ipsec sa add 19 spi 100019 crypto-alg aes-gcm-256 crypto-key 48737a48716b62636c416c71544d4a524c6a6c6f625252494643434c5673675a esp
exec ipsec tunnel protect ipip19 sa-out 100019 sa-in 19 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.20.1 p2p
exec ipsec sa add 100020 spi 200020 crypto-alg aes-gcm-256 crypto-key 50784e647a726c414354586e7a516642556761464a496a6b647a457843564750 esp
exec ipsec sa add 20 spi 100020 crypto-alg aes-gcm-256 crypto-key 50784e647a726c414354586e7a516642556761464a496a6b647a457843564750 esp
exec ipsec tunnel protect ipip20 sa-out 100020 sa-in 20 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.21.1 p2p
exec ipsec sa add 100021 spi 200021 crypto-alg aes-gcm-256 crypto-key 617a5347666b4c70574e654b6f68767a4a694945704f436561635a4c774e4147 esp
exec ipsec sa add 21 spi 100021 crypto-alg aes-gcm-256 crypto-key 617a5347666b4c70574e654b6f68767a4a694945704f436561635a4c774e4147 esp
exec ipsec tunnel protect ipip21 sa-out 100021 sa-in 21 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.22.1 p2p
exec ipsec sa add 100022 spi 200022 crypto-alg aes-gcm-256 crypto-key 5a51577a45447073595758495a49495378614945514f75614968487865544558 esp
exec ipsec sa add 22 spi 100022 crypto-alg aes-gcm-256 crypto-key 5a51577a45447073595758495a49495378614945514f75614968487865544558 esp
exec ipsec tunnel protect ipip22 sa-out 100022 sa-in 22 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.23.1 p2p
exec ipsec sa add 100023 spi 200023 crypto-alg aes-gcm-256 crypto-key 67586763747a7a6b664751414d496f47524f4a6c44645768454366694c44487a esp
exec ipsec sa add 23 spi 100023 crypto-alg aes-gcm-256 crypto-key 67586763747a7a6b664751414d496f47524f4a6c44645768454366694c44487a esp
exec ipsec tunnel protect ipip23 sa-out 100023 sa-in 23 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.24.1 p2p
exec ipsec sa add 100024 spi 200024 crypto-alg aes-gcm-256 crypto-key 546d4f6e5970737663424a6b4e5444597267627041716d474d545350534f6b54 esp
exec ipsec sa add 24 spi 100024 crypto-alg aes-gcm-256 crypto-key 546d4f6e5970737663424a6b4e5444597267627041716d474d545350534f6b54 esp
exec ipsec tunnel protect ipip24 sa-out 100024 sa-in 24 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.25.1 p2p
exec ipsec sa add 100025 spi 200025 crypto-alg aes-gcm-256 crypto-key 764157636366547251746b7458596c7849555a4c41575049656f50424e744677 esp
exec ipsec sa add 25 spi 100025 crypto-alg aes-gcm-256 crypto-key 764157636366547251746b7458596c7849555a4c41575049656f50424e744677 esp
exec ipsec tunnel protect ipip25 sa-out 100025 sa-in 25 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.26.1 p2p
exec ipsec sa add 100026 spi 200026 crypto-alg aes-gcm-256 crypto-key 795a6546657a656a6c4956736d5a496c4a626d426458544371557968716e7265 esp
exec ipsec sa add 26 spi 100026 crypto-alg aes-gcm-256 crypto-key 795a6546657a656a6c4956736d5a496c4a626d426458544371557968716e7265 esp
exec ipsec tunnel protect ipip26 sa-out 100026 sa-in 26 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.27.1 p2p
exec ipsec sa add 100027 spi 200027 crypto-alg aes-gcm-256 crypto-key 4f734d436c4f4149587442714d435a6a7477784a5a7a4f4e6d7462646c507147 esp
exec ipsec sa add 27 spi 100027 crypto-alg aes-gcm-256 crypto-key 4f734d436c4f4149587442714d435a6a7477784a5a7a4f4e6d7462646c507147 esp
exec ipsec tunnel protect ipip27 sa-out 100027 sa-in 27 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.28.1 p2p
exec ipsec sa add 100028 spi 200028 crypto-alg aes-gcm-256 crypto-key 655055634161654d764f5873736b53794d6378436a4743655257737247547445 esp
exec ipsec sa add 28 spi 100028 crypto-alg aes-gcm-256 crypto-key 655055634161654d764f5873736b53794d6378436a4743655257737247547445 esp
exec ipsec tunnel protect ipip28 sa-out 100028 sa-in 28 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.29.1 p2p
exec ipsec sa add 100029 spi 200029 crypto-alg aes-gcm-256 crypto-key 6d7a726f6d475577454c594c69454c45675659474a7562457764574546527a6c esp
exec ipsec sa add 29 spi 100029 crypto-alg aes-gcm-256 crypto-key 6d7a726f6d475577454c594c69454c45675659474a7562457764574546527a6c esp
exec ipsec tunnel protect ipip29 sa-out 100029 sa-in 29 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.30.1 p2p
exec ipsec sa add 100030 spi 200030 crypto-alg aes-gcm-256 crypto-key 62426c4768525866566b636a507652624b677a63636171734c456f7144635063 esp
exec ipsec sa add 30 spi 100030 crypto-alg aes-gcm-256 crypto-key 62426c4768525866566b636a507652624b677a63636171734c456f7144635063 esp
exec ipsec tunnel protect ipip30 sa-out 100030 sa-in 30 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.31.1 p2p
exec ipsec sa add 100031 spi 200031 crypto-alg aes-gcm-256 crypto-key 6a6850754a4662486e6266684249754f58745a6b47724b75554d6a7474585362 esp
exec ipsec sa add 31 spi 100031 crypto-alg aes-gcm-256 crypto-key 6a6850754a4662486e6266684249754f58745a6b47724b75554d6a7474585362 esp
exec ipsec tunnel protect ipip31 sa-out 100031 sa-in 31 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.32.1 p2p
exec ipsec sa add 100032 spi 200032 crypto-alg aes-gcm-256 crypto-key 684e52556d766a6c6d664f52414c555057435a4c44786d59714875507a495244 esp
exec ipsec sa add 32 spi 100032 crypto-alg aes-gcm-256 crypto-key 684e52556d766a6c6d664f52414c555057435a4c44786d59714875507a495244 esp
exec ipsec tunnel protect ipip32 sa-out 100032 sa-in 32 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.33.1 p2p
exec ipsec sa add 100033 spi 200033 crypto-alg aes-gcm-256 crypto-key 414365775757436d4b7872624144434b455870576950765a4963654b47474a57 esp
exec ipsec sa add 33 spi 100033 crypto-alg aes-gcm-256 crypto-key 414365775757436d4b7872624144434b455870576950765a4963654b47474a57 esp
exec ipsec tunnel protect ipip33 sa-out 100033 sa-in 33 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.34.1 p2p
exec ipsec sa add 100034 spi 200034 crypto-alg aes-gcm-256 crypto-key 6b62794e5a4c6b52595347684d7270554761547277784a46656f644343486a49 esp
exec ipsec sa add 34 spi 100034 crypto-alg aes-gcm-256 crypto-key 6b62794e5a4c6b52595347684d7270554761547277784a46656f644343486a49 esp
exec ipsec tunnel protect ipip34 sa-out 100034 sa-in 34 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.35.1 p2p
exec ipsec sa add 100035 spi 200035 crypto-alg aes-gcm-256 crypto-key 6d79724e4876716d5267737a4b756f4251554f43774e744e684e484156525671 esp
exec ipsec sa add 35 spi 100035 crypto-alg aes-gcm-256 crypto-key 6d79724e4876716d5267737a4b756f4251554f43774e744e684e484156525671 esp
exec ipsec tunnel protect ipip35 sa-out 100035 sa-in 35 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.36.1 p2p
exec ipsec sa add 100036 spi 200036 crypto-alg aes-gcm-256 crypto-key 626666564f755365774f596b54785044444f4c6379416d73736853425a6e476f esp
exec ipsec sa add 36 spi 100036 crypto-alg aes-gcm-256 crypto-key 626666564f755365774f596b54785044444f4c6379416d73736853425a6e476f esp
exec ipsec tunnel protect ipip36 sa-out 100036 sa-in 36 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.37.1 p2p
exec ipsec sa add 100037 spi 200037 crypto-alg aes-gcm-256 crypto-key 6a7149664f4e5975577968427373545067746157506e574d574c4e6f50515752 esp
exec ipsec sa add 37 spi 100037 crypto-alg aes-gcm-256 crypto-key 6a7149664f4e5975577968427373545067746157506e574d574c4e6f50515752 esp
exec ipsec tunnel protect ipip37 sa-out 100037 sa-in 37 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.38.1 p2p
exec ipsec sa add 100038 spi 200038 crypto-alg aes-gcm-256 crypto-key 4f4d51526c6a74585a566358457949526a65756963546e477570777562787347 esp
exec ipsec sa add 38 spi 100038 crypto-alg aes-gcm-256 crypto-key 4f4d51526c6a74585a566358457949526a65756963546e477570777562787347 esp
exec ipsec tunnel protect ipip38 sa-out 100038 sa-in 38 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.39.1 p2p
exec ipsec sa add 100039 spi 200039 crypto-alg aes-gcm-256 crypto-key 49726d794b5646704569707678696b78765a754d6d5663515165575575445374 esp
exec ipsec sa add 39 spi 100039 crypto-alg aes-gcm-256 crypto-key 49726d794b5646704569707678696b78765a754d6d5663515165575575445374 esp
exec ipsec tunnel protect ipip39 sa-out 100039 sa-in 39 add
exec ip route add 100.0.0.1/8 via 200.0.0.101 TenGigabitEthernet8/0/0
exec set interface unnumbered ipip0 use TenGigabitEthernet8/0/0
exec set interface state ipip0 up
exec ip route add 10.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use TenGigabitEthernet8/0/0
exec set interface state ipip1 up
exec ip route add 10.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use TenGigabitEthernet8/0/0
exec set interface state ipip2 up
exec ip route add 10.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use TenGigabitEthernet8/0/0
exec set interface state ipip3 up
exec ip route add 10.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use TenGigabitEthernet8/0/0
exec set interface state ipip4 up
exec ip route add 10.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use TenGigabitEthernet8/0/0
exec set interface state ipip5 up
exec ip route add 10.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use TenGigabitEthernet8/0/0
exec set interface state ipip6 up
exec ip route add 10.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use TenGigabitEthernet8/0/0
exec set interface state ipip7 up
exec ip route add 10.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use TenGigabitEthernet8/0/0
exec set interface state ipip8 up
exec ip route add 10.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use TenGigabitEthernet8/0/0
exec set interface state ipip9 up
exec ip route add 10.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use TenGigabitEthernet8/0/0
exec set interface state ipip10 up
exec ip route add 10.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use TenGigabitEthernet8/0/0
exec set interface state ipip11 up
exec ip route add 10.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use TenGigabitEthernet8/0/0
exec set interface state ipip12 up
exec ip route add 10.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use TenGigabitEthernet8/0/0
exec set interface state ipip13 up
exec ip route add 10.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use TenGigabitEthernet8/0/0
exec set interface state ipip14 up
exec ip route add 10.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use TenGigabitEthernet8/0/0
exec set interface state ipip15 up
exec ip route add 10.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use TenGigabitEthernet8/0/0
exec set interface state ipip16 up
exec ip route add 10.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use TenGigabitEthernet8/0/0
exec set interface state ipip17 up
exec ip route add 10.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use TenGigabitEthernet8/0/0
exec set interface state ipip18 up
exec ip route add 10.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use TenGigabitEthernet8/0/0
exec set interface state ipip19 up
exec ip route add 10.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use TenGigabitEthernet8/0/0
exec set interface state ipip20 up
exec ip route add 10.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use TenGigabitEthernet8/0/0
exec set interface state ipip21 up
exec ip route add 10.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use TenGigabitEthernet8/0/0
exec set interface state ipip22 up
exec ip route add 10.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use TenGigabitEthernet8/0/0
exec set interface state ipip23 up
exec ip route add 10.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use TenGigabitEthernet8/0/0
exec set interface state ipip24 up
exec ip route add 10.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use TenGigabitEthernet8/0/0
exec set interface state ipip25 up
exec ip route add 10.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use TenGigabitEthernet8/0/0
exec set interface state ipip26 up
exec ip route add 10.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use TenGigabitEthernet8/0/0
exec set interface state ipip27 up
exec ip route add 10.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use TenGigabitEthernet8/0/0
exec set interface state ipip28 up
exec ip route add 10.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use TenGigabitEthernet8/0/0
exec set interface state ipip29 up
exec ip route add 10.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use TenGigabitEthernet8/0/0
exec set interface state ipip30 up
exec ip route add 10.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use TenGigabitEthernet8/0/0
exec set interface state ipip31 up
exec ip route add 10.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use TenGigabitEthernet8/0/0
exec set interface state ipip32 up
exec ip route add 10.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use TenGigabitEthernet8/0/0
exec set interface state ipip33 up
exec ip route add 10.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use TenGigabitEthernet8/0/0
exec set interface state ipip34 up
exec ip route add 10.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use TenGigabitEthernet8/0/0
exec set interface state ipip35 up
exec ip route add 10.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use TenGigabitEthernet8/0/0
exec set interface state ipip36 up
exec ip route add 10.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use TenGigabitEthernet8/0/0
exec set interface state ipip37 up
exec ip route add 10.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use TenGigabitEthernet8/0/0
exec set interface state ipip38 up
exec ip route add 10.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use TenGigabitEthernet8/0/0
exec set interface state ipip39 up
exec ip route add 10.0.0.39/32 via ipip39

 1518b-2t2c-ethip4ipsec40tnlsw- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec set interface ip address TenGigabitEthernet8/0/0 200.0.0.102/24.0
exec create ipip tunnel src 200.0.0.102 dst 100.0.0.1 p2p
exec ipsec sa add 100000 spi 200000 crypto-alg aes-gcm-256 crypto-key 7948504b5879774552586c4a747a6d454e78505045564c5451694a566b524379 esp
exec ipsec sa add 0 spi 100000 crypto-alg aes-gcm-256 crypto-key 7948504b5879774552586c4a747a6d454e78505045564c5451694a566b524379 esp
exec ipsec tunnel protect ipip0 sa-out 100000 sa-in 0 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.1.1 p2p
exec ipsec sa add 100001 spi 200001 crypto-alg aes-gcm-256 crypto-key 5a494354554c50557954675763444e4e4d744361585350655759507552754f76 esp
exec ipsec sa add 1 spi 100001 crypto-alg aes-gcm-256 crypto-key 5a494354554c50557954675763444e4e4d744361585350655759507552754f76 esp
exec ipsec tunnel protect ipip1 sa-out 100001 sa-in 1 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.2.1 p2p
exec ipsec sa add 100002 spi 200002 crypto-alg aes-gcm-256 crypto-key 49566a43596f6e586a48435250796f58544a71574f64725478515458796b644e esp
exec ipsec sa add 2 spi 100002 crypto-alg aes-gcm-256 crypto-key 49566a43596f6e586a48435250796f58544a71574f64725478515458796b644e esp
exec ipsec tunnel protect ipip2 sa-out 100002 sa-in 2 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.3.1 p2p
exec ipsec sa add 100003 spi 200003 crypto-alg aes-gcm-256 crypto-key 6e614d4b7765775057726b57506a7373707161434a494c546a7a6541656c5062 esp
exec ipsec sa add 3 spi 100003 crypto-alg aes-gcm-256 crypto-key 6e614d4b7765775057726b57506a7373707161434a494c546a7a6541656c5062 esp
exec ipsec tunnel protect ipip3 sa-out 100003 sa-in 3 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.4.1 p2p
exec ipsec sa add 100004 spi 200004 crypto-alg aes-gcm-256 crypto-key 6555476448616d4577597375486b724155487a4c724658614f61594d4f4a5165 esp
exec ipsec sa add 4 spi 100004 crypto-alg aes-gcm-256 crypto-key 6555476448616d4577597375486b724155487a4c724658614f61594d4f4a5165 esp
exec ipsec tunnel protect ipip4 sa-out 100004 sa-in 4 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.5.1 p2p
exec ipsec sa add 100005 spi 200005 crypto-alg aes-gcm-256 crypto-key 7455596f484341496c446a667749524b664d6b596e76686341566548716f474a esp
exec ipsec sa add 5 spi 100005 crypto-alg aes-gcm-256 crypto-key 7455596f484341496c446a667749524b664d6b596e76686341566548716f474a esp
exec ipsec tunnel protect ipip5 sa-out 100005 sa-in 5 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.6.1 p2p
exec ipsec sa add 100006 spi 200006 crypto-alg aes-gcm-256 crypto-key 6e54716a4c6c5a4c7a665a75774b5a63635a53745758446f70507a6b70564562 esp
exec ipsec sa add 6 spi 100006 crypto-alg aes-gcm-256 crypto-key 6e54716a4c6c5a4c7a665a75774b5a63635a53745758446f70507a6b70564562 esp
exec ipsec tunnel protect ipip6 sa-out 100006 sa-in 6 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.7.1 p2p
exec ipsec sa add 100007 spi 200007 crypto-alg aes-gcm-256 crypto-key 584b67784375426177514250566946686a4b4a65674b6a48786379564e6e456c esp
exec ipsec sa add 7 spi 100007 crypto-alg aes-gcm-256 crypto-key 584b67784375426177514250566946686a4b4a65674b6a48786379564e6e456c esp
exec ipsec tunnel protect ipip7 sa-out 100007 sa-in 7 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.8.1 p2p
exec ipsec sa add 100008 spi 200008 crypto-alg aes-gcm-256 crypto-key 6e674c526c6c734d507a6c765953447257736554466661574341465669786a46 esp
exec ipsec sa add 8 spi 100008 crypto-alg aes-gcm-256 crypto-key 6e674c526c6c734d507a6c765953447257736554466661574341465669786a46 esp
exec ipsec tunnel protect ipip8 sa-out 100008 sa-in 8 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.9.1 p2p
exec ipsec sa add 100009 spi 200009 crypto-alg aes-gcm-256 crypto-key 4f66716667497452666c6476794179524b6f4d556453744e5869556859667a64 esp
exec ipsec sa add 9 spi 100009 crypto-alg aes-gcm-256 crypto-key 4f66716667497452666c6476794179524b6f4d556453744e5869556859667a64 esp
exec ipsec tunnel protect ipip9 sa-out 100009 sa-in 9 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.10.1 p2p
exec ipsec sa add 100010 spi 200010 crypto-alg aes-gcm-256 crypto-key 6358627469696271654f554b69747851685a4e4e4457636d5652796951644878 esp
exec ipsec sa add 10 spi 100010 crypto-alg aes-gcm-256 crypto-key 6358627469696271654f554b69747851685a4e4e4457636d5652796951644878 esp
exec ipsec tunnel protect ipip10 sa-out 100010 sa-in 10 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.11.1 p2p
exec ipsec sa add 100011 spi 200011 crypto-alg aes-gcm-256 crypto-key 664670426c434c584e466b4a74784b696e6174524647675157784a466a48657a esp
exec ipsec sa add 11 spi 100011 crypto-alg aes-gcm-256 crypto-key 664670426c434c584e466b4a74784b696e6174524647675157784a466a48657a esp
exec ipsec tunnel protect ipip11 sa-out 100011 sa-in 11 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.12.1 p2p
exec ipsec sa add 100012 spi 200012 crypto-alg aes-gcm-256 crypto-key 73746a6958564c6553486e664a4d476e435067736a4d794d4370786366796141 esp
exec ipsec sa add 12 spi 100012 crypto-alg aes-gcm-256 crypto-key 73746a6958564c6553486e664a4d476e435067736a4d794d4370786366796141 esp
exec ipsec tunnel protect ipip12 sa-out 100012 sa-in 12 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.13.1 p2p
exec ipsec sa add 100013 spi 200013 crypto-alg aes-gcm-256 crypto-key 6e704c6852714241466d554e564758676d77684f515a49576872746e45574f6f esp
exec ipsec sa add 13 spi 100013 crypto-alg aes-gcm-256 crypto-key 6e704c6852714241466d554e564758676d77684f515a49576872746e45574f6f esp
exec ipsec tunnel protect ipip13 sa-out 100013 sa-in 13 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.14.1 p2p
exec ipsec sa add 100014 spi 200014 crypto-alg aes-gcm-256 crypto-key 744b7576455064644a6777614e56624b6976776264454d4870685a757943426a esp
exec ipsec sa add 14 spi 100014 crypto-alg aes-gcm-256 crypto-key 744b7576455064644a6777614e56624b6976776264454d4870685a757943426a esp
exec ipsec tunnel protect ipip14 sa-out 100014 sa-in 14 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.15.1 p2p
exec ipsec sa add 100015 spi 200015 crypto-alg aes-gcm-256 crypto-key 4b6579646f64446f51456e4a625943516b716a4673797a755943504a6f784245 esp
exec ipsec sa add 15 spi 100015 crypto-alg aes-gcm-256 crypto-key 4b6579646f64446f51456e4a625943516b716a4673797a755943504a6f784245 esp
exec ipsec tunnel protect ipip15 sa-out 100015 sa-in 15 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.16.1 p2p
exec ipsec sa add 100016 spi 200016 crypto-alg aes-gcm-256 crypto-key 676d4c71505a514448547545474f7848624375416d586450704f526779656d49 esp
exec ipsec sa add 16 spi 100016 crypto-alg aes-gcm-256 crypto-key 676d4c71505a514448547545474f7848624375416d586450704f526779656d49 esp
exec ipsec tunnel protect ipip16 sa-out 100016 sa-in 16 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.17.1 p2p
exec ipsec sa add 100017 spi 200017 crypto-alg aes-gcm-256 crypto-key 754c5a67535049654f4f705a5365466555626f774f415a6a644362627669786f esp
exec ipsec sa add 17 spi 100017 crypto-alg aes-gcm-256 crypto-key 754c5a67535049654f4f705a5365466555626f774f415a6a644362627669786f esp
exec ipsec tunnel protect ipip17 sa-out 100017 sa-in 17 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.18.1 p2p
exec ipsec sa add 100018 spi 200018 crypto-alg aes-gcm-256 crypto-key 496f6a756e4c4971537368504d6a4e6e68596472546761794f4c43615a526375 esp
exec ipsec sa add 18 spi 100018 crypto-alg aes-gcm-256 crypto-key 496f6a756e4c4971537368504d6a4e6e68596472546761794f4c43615a526375 esp
exec ipsec tunnel protect ipip18 sa-out 100018 sa-in 18 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.19.1 p2p
exec ipsec sa add 100019 spi 200019 crypto-alg aes-gcm-256 crypto-key 524b444d5866656c676e5a6358684e6c457978717446514c75737957536b5551 esp
exec ipsec sa add 19 spi 100019 crypto-alg aes-gcm-256 crypto-key 524b444d5866656c676e5a6358684e6c457978717446514c75737957536b5551 esp
exec ipsec tunnel protect ipip19 sa-out 100019 sa-in 19 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.20.1 p2p
exec ipsec sa add 100020 spi 200020 crypto-alg aes-gcm-256 crypto-key 6c4e79736a5357794644774f6e48504f6c6c464c58764473494d6a496d724751 esp
exec ipsec sa add 20 spi 100020 crypto-alg aes-gcm-256 crypto-key 6c4e79736a5357794644774f6e48504f6c6c464c58764473494d6a496d724751 esp
exec ipsec tunnel protect ipip20 sa-out 100020 sa-in 20 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.21.1 p2p
exec ipsec sa add 100021 spi 200021 crypto-alg aes-gcm-256 crypto-key 6f7469524675657352574576496679696461664a585742666a66596a46486e59 esp
exec ipsec sa add 21 spi 100021 crypto-alg aes-gcm-256 crypto-key 6f7469524675657352574576496679696461664a585742666a66596a46486e59 esp
exec ipsec tunnel protect ipip21 sa-out 100021 sa-in 21 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.22.1 p2p
exec ipsec sa add 100022 spi 200022 crypto-alg aes-gcm-256 crypto-key 4952554c4f666b634b6f674f767654626b684f59627845754969436a6f70484f esp
exec ipsec sa add 22 spi 100022 crypto-alg aes-gcm-256 crypto-key 4952554c4f666b634b6f674f767654626b684f59627845754969436a6f70484f esp
exec ipsec tunnel protect ipip22 sa-out 100022 sa-in 22 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.23.1 p2p
exec ipsec sa add 100023 spi 200023 crypto-alg aes-gcm-256 crypto-key 64477345747a6c716374476d44584b56474e5a63654943436756724767796c5a esp
exec ipsec sa add 23 spi 100023 crypto-alg aes-gcm-256 crypto-key 64477345747a6c716374476d44584b56474e5a63654943436756724767796c5a esp
exec ipsec tunnel protect ipip23 sa-out 100023 sa-in 23 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.24.1 p2p
exec ipsec sa add 100024 spi 200024 crypto-alg aes-gcm-256 crypto-key 6b63497869716c4e476e6a4847614747695a6e617664454646644479686a4b42 esp
exec ipsec sa add 24 spi 100024 crypto-alg aes-gcm-256 crypto-key 6b63497869716c4e476e6a4847614747695a6e617664454646644479686a4b42 esp
exec ipsec tunnel protect ipip24 sa-out 100024 sa-in 24 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.25.1 p2p
exec ipsec sa add 100025 spi 200025 crypto-alg aes-gcm-256 crypto-key 65654d697a6a71747a71564765777665544b4678644356764c7470754b58524d esp
exec ipsec sa add 25 spi 100025 crypto-alg aes-gcm-256 crypto-key 65654d697a6a71747a71564765777665544b4678644356764c7470754b58524d esp
exec ipsec tunnel protect ipip25 sa-out 100025 sa-in 25 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.26.1 p2p
exec ipsec sa add 100026 spi 200026 crypto-alg aes-gcm-256 crypto-key 7568494f5777516e52714c71674f4e514242504e6f617274465a4c78784a6453 esp
exec ipsec sa add 26 spi 100026 crypto-alg aes-gcm-256 crypto-key 7568494f5777516e52714c71674f4e514242504e6f617274465a4c78784a6453 esp
exec ipsec tunnel protect ipip26 sa-out 100026 sa-in 26 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.27.1 p2p
exec ipsec sa add 100027 spi 200027 crypto-alg aes-gcm-256 crypto-key 53585347665379694d657041545a5a547369576b475574594c6579436b417274 esp
exec ipsec sa add 27 spi 100027 crypto-alg aes-gcm-256 crypto-key 53585347665379694d657041545a5a547369576b475574594c6579436b417274 esp
exec ipsec tunnel protect ipip27 sa-out 100027 sa-in 27 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.28.1 p2p
exec ipsec sa add 100028 spi 200028 crypto-alg aes-gcm-256 crypto-key 577571616a7142577763464a6d6e7448644758426861574d63416b7979767745 esp
exec ipsec sa add 28 spi 100028 crypto-alg aes-gcm-256 crypto-key 577571616a7142577763464a6d6e7448644758426861574d63416b7979767745 esp
exec ipsec tunnel protect ipip28 sa-out 100028 sa-in 28 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.29.1 p2p
exec ipsec sa add 100029 spi 200029 crypto-alg aes-gcm-256 crypto-key 7950764e7277576f54416d465a78526d636d4c5569466174754f7769466c5372 esp
exec ipsec sa add 29 spi 100029 crypto-alg aes-gcm-256 crypto-key 7950764e7277576f54416d465a78526d636d4c5569466174754f7769466c5372 esp
exec ipsec tunnel protect ipip29 sa-out 100029 sa-in 29 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.30.1 p2p
exec ipsec sa add 100030 spi 200030 crypto-alg aes-gcm-256 crypto-key 4e4145684f416d4b6f505168486c536f4844624f7251786370504e494d576b68 esp
exec ipsec sa add 30 spi 100030 crypto-alg aes-gcm-256 crypto-key 4e4145684f416d4b6f505168486c536f4844624f7251786370504e494d576b68 esp
exec ipsec tunnel protect ipip30 sa-out 100030 sa-in 30 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.31.1 p2p
exec ipsec sa add 100031 spi 200031 crypto-alg aes-gcm-256 crypto-key 6244636158414a5153464661725253775476466e51446e446d74697241774c58 esp
exec ipsec sa add 31 spi 100031 crypto-alg aes-gcm-256 crypto-key 6244636158414a5153464661725253775476466e51446e446d74697241774c58 esp
exec ipsec tunnel protect ipip31 sa-out 100031 sa-in 31 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.32.1 p2p
exec ipsec sa add 100032 spi 200032 crypto-alg aes-gcm-256 crypto-key 4e445a6f77764e596278497379527667554c4d5a76436d456c43744b49635742 esp
exec ipsec sa add 32 spi 100032 crypto-alg aes-gcm-256 crypto-key 4e445a6f77764e596278497379527667554c4d5a76436d456c43744b49635742 esp
exec ipsec tunnel protect ipip32 sa-out 100032 sa-in 32 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.33.1 p2p
exec ipsec sa add 100033 spi 200033 crypto-alg aes-gcm-256 crypto-key 7863686555497a514679554479565a424a485758636f70647074797a59744d6c esp
exec ipsec sa add 33 spi 100033 crypto-alg aes-gcm-256 crypto-key 7863686555497a514679554479565a424a485758636f70647074797a59744d6c esp
exec ipsec tunnel protect ipip33 sa-out 100033 sa-in 33 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.34.1 p2p
exec ipsec sa add 100034 spi 200034 crypto-alg aes-gcm-256 crypto-key 69444c734d496745597569736a625a4d7947636f55456e5278504e4a596f756b esp
exec ipsec sa add 34 spi 100034 crypto-alg aes-gcm-256 crypto-key 69444c734d496745597569736a625a4d7947636f55456e5278504e4a596f756b esp
exec ipsec tunnel protect ipip34 sa-out 100034 sa-in 34 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.35.1 p2p
exec ipsec sa add 100035 spi 200035 crypto-alg aes-gcm-256 crypto-key 757a46486e7465526c53415270496c6c7341676466717a44586543546d7a4850 esp
exec ipsec sa add 35 spi 100035 crypto-alg aes-gcm-256 crypto-key 757a46486e7465526c53415270496c6c7341676466717a44586543546d7a4850 esp
exec ipsec tunnel protect ipip35 sa-out 100035 sa-in 35 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.36.1 p2p
exec ipsec sa add 100036 spi 200036 crypto-alg aes-gcm-256 crypto-key 714c73456a6b64474f6649785377546c47584f6b6872595a4455637354786e62 esp
exec ipsec sa add 36 spi 100036 crypto-alg aes-gcm-256 crypto-key 714c73456a6b64474f6649785377546c47584f6b6872595a4455637354786e62 esp
exec ipsec tunnel protect ipip36 sa-out 100036 sa-in 36 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.37.1 p2p
exec ipsec sa add 100037 spi 200037 crypto-alg aes-gcm-256 crypto-key 625a546557656e6a707279784a78474b7a4579767377584c79794d7971746d48 esp
exec ipsec sa add 37 spi 100037 crypto-alg aes-gcm-256 crypto-key 625a546557656e6a707279784a78474b7a4579767377584c79794d7971746d48 esp
exec ipsec tunnel protect ipip37 sa-out 100037 sa-in 37 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.38.1 p2p
exec ipsec sa add 100038 spi 200038 crypto-alg aes-gcm-256 crypto-key 434f4a6477507546714563534f5679736c7972677a73697352746641557a7241 esp
exec ipsec sa add 38 spi 100038 crypto-alg aes-gcm-256 crypto-key 434f4a6477507546714563534f5679736c7972677a73697352746641557a7241 esp
exec ipsec tunnel protect ipip38 sa-out 100038 sa-in 38 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.39.1 p2p
exec ipsec sa add 100039 spi 200039 crypto-alg aes-gcm-256 crypto-key 49484567465a6f6441716256756e6d584d776d59576e7463786a527a6e6d5767 esp
exec ipsec sa add 39 spi 100039 crypto-alg aes-gcm-256 crypto-key 49484567465a6f6441716256756e6d584d776d59576e7463786a527a6e6d5767 esp
exec ipsec tunnel protect ipip39 sa-out 100039 sa-in 39 add
exec ip route add 100.0.0.1/8 via 200.0.0.101 TenGigabitEthernet8/0/0
exec set interface unnumbered ipip0 use TenGigabitEthernet8/0/0
exec set interface state ipip0 up
exec ip route add 10.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use TenGigabitEthernet8/0/0
exec set interface state ipip1 up
exec ip route add 10.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use TenGigabitEthernet8/0/0
exec set interface state ipip2 up
exec ip route add 10.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use TenGigabitEthernet8/0/0
exec set interface state ipip3 up
exec ip route add 10.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use TenGigabitEthernet8/0/0
exec set interface state ipip4 up
exec ip route add 10.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use TenGigabitEthernet8/0/0
exec set interface state ipip5 up
exec ip route add 10.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use TenGigabitEthernet8/0/0
exec set interface state ipip6 up
exec ip route add 10.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use TenGigabitEthernet8/0/0
exec set interface state ipip7 up
exec ip route add 10.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use TenGigabitEthernet8/0/0
exec set interface state ipip8 up
exec ip route add 10.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use TenGigabitEthernet8/0/0
exec set interface state ipip9 up
exec ip route add 10.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use TenGigabitEthernet8/0/0
exec set interface state ipip10 up
exec ip route add 10.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use TenGigabitEthernet8/0/0
exec set interface state ipip11 up
exec ip route add 10.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use TenGigabitEthernet8/0/0
exec set interface state ipip12 up
exec ip route add 10.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use TenGigabitEthernet8/0/0
exec set interface state ipip13 up
exec ip route add 10.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use TenGigabitEthernet8/0/0
exec set interface state ipip14 up
exec ip route add 10.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use TenGigabitEthernet8/0/0
exec set interface state ipip15 up
exec ip route add 10.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use TenGigabitEthernet8/0/0
exec set interface state ipip16 up
exec ip route add 10.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use TenGigabitEthernet8/0/0
exec set interface state ipip17 up
exec ip route add 10.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use TenGigabitEthernet8/0/0
exec set interface state ipip18 up
exec ip route add 10.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use TenGigabitEthernet8/0/0
exec set interface state ipip19 up
exec ip route add 10.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use TenGigabitEthernet8/0/0
exec set interface state ipip20 up
exec ip route add 10.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use TenGigabitEthernet8/0/0
exec set interface state ipip21 up
exec ip route add 10.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use TenGigabitEthernet8/0/0
exec set interface state ipip22 up
exec ip route add 10.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use TenGigabitEthernet8/0/0
exec set interface state ipip23 up
exec ip route add 10.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use TenGigabitEthernet8/0/0
exec set interface state ipip24 up
exec ip route add 10.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use TenGigabitEthernet8/0/0
exec set interface state ipip25 up
exec ip route add 10.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use TenGigabitEthernet8/0/0
exec set interface state ipip26 up
exec ip route add 10.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use TenGigabitEthernet8/0/0
exec set interface state ipip27 up
exec ip route add 10.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use TenGigabitEthernet8/0/0
exec set interface state ipip28 up
exec ip route add 10.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use TenGigabitEthernet8/0/0
exec set interface state ipip29 up
exec ip route add 10.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use TenGigabitEthernet8/0/0
exec set interface state ipip30 up
exec ip route add 10.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use TenGigabitEthernet8/0/0
exec set interface state ipip31 up
exec ip route add 10.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use TenGigabitEthernet8/0/0
exec set interface state ipip32 up
exec ip route add 10.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use TenGigabitEthernet8/0/0
exec set interface state ipip33 up
exec ip route add 10.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use TenGigabitEthernet8/0/0
exec set interface state ipip34 up
exec ip route add 10.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use TenGigabitEthernet8/0/0
exec set interface state ipip35 up
exec ip route add 10.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use TenGigabitEthernet8/0/0
exec set interface state ipip36 up
exec ip route add 10.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use TenGigabitEthernet8/0/0
exec set interface state ipip37 up
exec ip route add 10.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use TenGigabitEthernet8/0/0
exec set interface state ipip38 up
exec ip route add 10.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use TenGigabitEthernet8/0/0
exec set interface state ipip39 up
exec ip route add 10.0.0.39/32 via ipip39

 imix-1t1c-ethip4ipsec40tnlsw- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec set interface ip address TenGigabitEthernet8/0/0 200.0.0.102/24.0
exec create ipip tunnel src 200.0.0.102 dst 100.0.0.1 p2p
exec ipsec sa add 100000 spi 200000 crypto-alg aes-gcm-256 crypto-key 6a41486e43525846647577474d44466a766a705a6750494954544f6c55656c47 esp
exec ipsec sa add 0 spi 100000 crypto-alg aes-gcm-256 crypto-key 6a41486e43525846647577474d44466a766a705a6750494954544f6c55656c47 esp
exec ipsec tunnel protect ipip0 sa-out 100000 sa-in 0 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.1.1 p2p
exec ipsec sa add 100001 spi 200001 crypto-alg aes-gcm-256 crypto-key 5a47467744526c6379636c584b794966627659554e64695172634a6f65516876 esp
exec ipsec sa add 1 spi 100001 crypto-alg aes-gcm-256 crypto-key 5a47467744526c6379636c584b794966627659554e64695172634a6f65516876 esp
exec ipsec tunnel protect ipip1 sa-out 100001 sa-in 1 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.2.1 p2p
exec ipsec sa add 100002 spi 200002 crypto-alg aes-gcm-256 crypto-key 6c587564517375584e544b48785951714472714b51775672666661424574436a esp
exec ipsec sa add 2 spi 100002 crypto-alg aes-gcm-256 crypto-key 6c587564517375584e544b48785951714472714b51775672666661424574436a esp
exec ipsec tunnel protect ipip2 sa-out 100002 sa-in 2 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.3.1 p2p
exec ipsec sa add 100003 spi 200003 crypto-alg aes-gcm-256 crypto-key 4e59507063525643485172547662497244775a716e66577146595a6567757a4c esp
exec ipsec sa add 3 spi 100003 crypto-alg aes-gcm-256 crypto-key 4e59507063525643485172547662497244775a716e66577146595a6567757a4c esp
exec ipsec tunnel protect ipip3 sa-out 100003 sa-in 3 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.4.1 p2p
exec ipsec sa add 100004 spi 200004 crypto-alg aes-gcm-256 crypto-key 446f776e485044484357766c62496c7375586349766b76504670516346577670 esp
exec ipsec sa add 4 spi 100004 crypto-alg aes-gcm-256 crypto-key 446f776e485044484357766c62496c7375586349766b76504670516346577670 esp
exec ipsec tunnel protect ipip4 sa-out 100004 sa-in 4 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.5.1 p2p
exec ipsec sa add 100005 spi 200005 crypto-alg aes-gcm-256 crypto-key 5167536c6c4a70706466694c7679416f4a554254536b557165734d6650434863 esp
exec ipsec sa add 5 spi 100005 crypto-alg aes-gcm-256 crypto-key 5167536c6c4a70706466694c7679416f4a554254536b557165734d6650434863 esp
exec ipsec tunnel protect ipip5 sa-out 100005 sa-in 5 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.6.1 p2p
exec ipsec sa add 100006 spi 200006 crypto-alg aes-gcm-256 crypto-key 654e55596f654d74684d676263735871445a65485a494b417754484450676b75 esp
exec ipsec sa add 6 spi 100006 crypto-alg aes-gcm-256 crypto-key 654e55596f654d74684d676263735871445a65485a494b417754484450676b75 esp
exec ipsec tunnel protect ipip6 sa-out 100006 sa-in 6 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.7.1 p2p
exec ipsec sa add 100007 spi 200007 crypto-alg aes-gcm-256 crypto-key 50664d4150436a6a694a496f664855744469417263664f485446435278445a78 esp
exec ipsec sa add 7 spi 100007 crypto-alg aes-gcm-256 crypto-key 50664d4150436a6a694a496f664855744469417263664f485446435278445a78 esp
exec ipsec tunnel protect ipip7 sa-out 100007 sa-in 7 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.8.1 p2p
exec ipsec sa add 100008 spi 200008 crypto-alg aes-gcm-256 crypto-key 77645067577a464766715756414746574872476a7370667267544b426a4c5951 esp
exec ipsec sa add 8 spi 100008 crypto-alg aes-gcm-256 crypto-key 77645067577a464766715756414746574872476a7370667267544b426a4c5951 esp
exec ipsec tunnel protect ipip8 sa-out 100008 sa-in 8 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.9.1 p2p
exec ipsec sa add 100009 spi 200009 crypto-alg aes-gcm-256 crypto-key 61746550625779536f5477507a6b47744b7a534872476b577666795661674a48 esp
exec ipsec sa add 9 spi 100009 crypto-alg aes-gcm-256 crypto-key 61746550625779536f5477507a6b47744b7a534872476b577666795661674a48 esp
exec ipsec tunnel protect ipip9 sa-out 100009 sa-in 9 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.10.1 p2p
exec ipsec sa add 100010 spi 200010 crypto-alg aes-gcm-256 crypto-key 696344454553527a4877474b42614548486e537472487266786550705345774a esp
exec ipsec sa add 10 spi 100010 crypto-alg aes-gcm-256 crypto-key 696344454553527a4877474b42614548486e537472487266786550705345774a esp
exec ipsec tunnel protect ipip10 sa-out 100010 sa-in 10 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.11.1 p2p
exec ipsec sa add 100011 spi 200011 crypto-alg aes-gcm-256 crypto-key 4a7269726d59735259685450557869796373464d51486c5a6568646a736a5a48 esp
exec ipsec sa add 11 spi 100011 crypto-alg aes-gcm-256 crypto-key 4a7269726d59735259685450557869796373464d51486c5a6568646a736a5a48 esp
exec ipsec tunnel protect ipip11 sa-out 100011 sa-in 11 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.12.1 p2p
exec ipsec sa add 100012 spi 200012 crypto-alg aes-gcm-256 crypto-key 7066745a47546e58594741414c4f6855724a4268765553445249716d784f4464 esp
exec ipsec sa add 12 spi 100012 crypto-alg aes-gcm-256 crypto-key 7066745a47546e58594741414c4f6855724a4268765553445249716d784f4464 esp
exec ipsec tunnel protect ipip12 sa-out 100012 sa-in 12 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.13.1 p2p
exec ipsec sa add 100013 spi 200013 crypto-alg aes-gcm-256 crypto-key 75654f7170577a73505957627662426c705356456a6f466f4975444b744d647a esp
exec ipsec sa add 13 spi 100013 crypto-alg aes-gcm-256 crypto-key 75654f7170577a73505957627662426c705356456a6f466f4975444b744d647a esp
exec ipsec tunnel protect ipip13 sa-out 100013 sa-in 13 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.14.1 p2p
exec ipsec sa add 100014 spi 200014 crypto-alg aes-gcm-256 crypto-key 4c445747464272794553684f4559544761594b426e4f437271774d4753596648 esp
exec ipsec sa add 14 spi 100014 crypto-alg aes-gcm-256 crypto-key 4c445747464272794553684f4559544761594b426e4f437271774d4753596648 esp
exec ipsec tunnel protect ipip14 sa-out 100014 sa-in 14 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.15.1 p2p
exec ipsec sa add 100015 spi 200015 crypto-alg aes-gcm-256 crypto-key 507677534f457059484d656557447270654e6d7a554e4d76436b4f71756e506e esp
exec ipsec sa add 15 spi 100015 crypto-alg aes-gcm-256 crypto-key 507677534f457059484d656557447270654e6d7a554e4d76436b4f71756e506e esp
exec ipsec tunnel protect ipip15 sa-out 100015 sa-in 15 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.16.1 p2p
exec ipsec sa add 100016 spi 200016 crypto-alg aes-gcm-256 crypto-key 634741516369414f6f6e7454594753417276465a66416b7657496d415a714765 esp
exec ipsec sa add 16 spi 100016 crypto-alg aes-gcm-256 crypto-key 634741516369414f6f6e7454594753417276465a66416b7657496d415a714765 esp
exec ipsec tunnel protect ipip16 sa-out 100016 sa-in 16 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.17.1 p2p
exec ipsec sa add 100017 spi 200017 crypto-alg aes-gcm-256 crypto-key 566b5846434c66696569694479476e4673706a436c657a536e6d637141664a4b esp
exec ipsec sa add 17 spi 100017 crypto-alg aes-gcm-256 crypto-key 566b5846434c66696569694479476e4673706a436c657a536e6d637141664a4b esp
exec ipsec tunnel protect ipip17 sa-out 100017 sa-in 17 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.18.1 p2p
exec ipsec sa add 100018 spi 200018 crypto-alg aes-gcm-256 crypto-key 4d565958544b764f48737573484459594643536155724e4a574b6646634a6d70 esp
exec ipsec sa add 18 spi 100018 crypto-alg aes-gcm-256 crypto-key 4d565958544b764f48737573484459594643536155724e4a574b6646634a6d70 esp
exec ipsec tunnel protect ipip18 sa-out 100018 sa-in 18 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.19.1 p2p
exec ipsec sa add 100019 spi 200019 crypto-alg aes-gcm-256 crypto-key 456c624a6c6b4b696174766c454869527750716d6d7650787a7555456254506f esp
exec ipsec sa add 19 spi 100019 crypto-alg aes-gcm-256 crypto-key 456c624a6c6b4b696174766c454869527750716d6d7650787a7555456254506f esp
exec ipsec tunnel protect ipip19 sa-out 100019 sa-in 19 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.20.1 p2p
exec ipsec sa add 100020 spi 200020 crypto-alg aes-gcm-256 crypto-key 47586b54534c5049786d45774e64475570715242454b61654776564e6968426d esp
exec ipsec sa add 20 spi 100020 crypto-alg aes-gcm-256 crypto-key 47586b54534c5049786d45774e64475570715242454b61654776564e6968426d esp
exec ipsec tunnel protect ipip20 sa-out 100020 sa-in 20 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.21.1 p2p
exec ipsec sa add 100021 spi 200021 crypto-alg aes-gcm-256 crypto-key 596f446555716a79666a5969546743596a6256417270454b7167765a44544b48 esp
exec ipsec sa add 21 spi 100021 crypto-alg aes-gcm-256 crypto-key 596f446555716a79666a5969546743596a6256417270454b7167765a44544b48 esp
exec ipsec tunnel protect ipip21 sa-out 100021 sa-in 21 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.22.1 p2p
exec ipsec sa add 100022 spi 200022 crypto-alg aes-gcm-256 crypto-key 516152736863726569496a536347554b796c42437962445652796d7878417861 esp
exec ipsec sa add 22 spi 100022 crypto-alg aes-gcm-256 crypto-key 516152736863726569496a536347554b796c42437962445652796d7878417861 esp
exec ipsec tunnel protect ipip22 sa-out 100022 sa-in 22 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.23.1 p2p
exec ipsec sa add 100023 spi 200023 crypto-alg aes-gcm-256 crypto-key 77484343595554544c466b6e676e79676e54496d424974687a58737046516a6d esp
exec ipsec sa add 23 spi 100023 crypto-alg aes-gcm-256 crypto-key 77484343595554544c466b6e676e79676e54496d424974687a58737046516a6d esp
exec ipsec tunnel protect ipip23 sa-out 100023 sa-in 23 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.24.1 p2p
exec ipsec sa add 100024 spi 200024 crypto-alg aes-gcm-256 crypto-key 566477756e52465a66496b466149416b4155726151684f44494e71724a67586d esp
exec ipsec sa add 24 spi 100024 crypto-alg aes-gcm-256 crypto-key 566477756e52465a66496b466149416b4155726151684f44494e71724a67586d esp
exec ipsec tunnel protect ipip24 sa-out 100024 sa-in 24 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.25.1 p2p
exec ipsec sa add 100025 spi 200025 crypto-alg aes-gcm-256 crypto-key 50536a4d6553667943784d6b6c586747456d5163444c526b436a567764727874 esp
exec ipsec sa add 25 spi 100025 crypto-alg aes-gcm-256 crypto-key 50536a4d6553667943784d6b6c586747456d5163444c526b436a567764727874 esp
exec ipsec tunnel protect ipip25 sa-out 100025 sa-in 25 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.26.1 p2p
exec ipsec sa add 100026 spi 200026 crypto-alg aes-gcm-256 crypto-key 464c6e72745248534d7377436b6b4b67694b4152586a454f6647485567785250 esp
exec ipsec sa add 26 spi 100026 crypto-alg aes-gcm-256 crypto-key 464c6e72745248534d7377436b6b4b67694b4152586a454f6647485567785250 esp
exec ipsec tunnel protect ipip26 sa-out 100026 sa-in 26 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.27.1 p2p
exec ipsec sa add 100027 spi 200027 crypto-alg aes-gcm-256 crypto-key 41444569654a664f577a626b46564269464e4d627875726569595679777a7650 esp
exec ipsec sa add 27 spi 100027 crypto-alg aes-gcm-256 crypto-key 41444569654a664f577a626b46564269464e4d627875726569595679777a7650 esp
exec ipsec tunnel protect ipip27 sa-out 100027 sa-in 27 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.28.1 p2p
exec ipsec sa add 100028 spi 200028 crypto-alg aes-gcm-256 crypto-key 784a436d784b47676c774e677061414865464e7167476b506a59515a5168434c esp
exec ipsec sa add 28 spi 100028 crypto-alg aes-gcm-256 crypto-key 784a436d784b47676c774e677061414865464e7167476b506a59515a5168434c esp
exec ipsec tunnel protect ipip28 sa-out 100028 sa-in 28 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.29.1 p2p
exec ipsec sa add 100029 spi 200029 crypto-alg aes-gcm-256 crypto-key 564d626357494877594441655773724763684865516d57484f68526752454a64 esp
exec ipsec sa add 29 spi 100029 crypto-alg aes-gcm-256 crypto-key 564d626357494877594441655773724763684865516d57484f68526752454a64 esp
exec ipsec tunnel protect ipip29 sa-out 100029 sa-in 29 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.30.1 p2p
exec ipsec sa add 100030 spi 200030 crypto-alg aes-gcm-256 crypto-key 41466d6d56674b716a4e51775362546a5148544f46594246526a537965547148 esp
exec ipsec sa add 30 spi 100030 crypto-alg aes-gcm-256 crypto-key 41466d6d56674b716a4e51775362546a5148544f46594246526a537965547148 esp
exec ipsec tunnel protect ipip30 sa-out 100030 sa-in 30 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.31.1 p2p
exec ipsec sa add 100031 spi 200031 crypto-alg aes-gcm-256 crypto-key 5a51764b4644415546715150696c6f6545586f49644b6276466463706b734d47 esp
exec ipsec sa add 31 spi 100031 crypto-alg aes-gcm-256 crypto-key 5a51764b4644415546715150696c6f6545586f49644b6276466463706b734d47 esp
exec ipsec tunnel protect ipip31 sa-out 100031 sa-in 31 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.32.1 p2p
exec ipsec sa add 100032 spi 200032 crypto-alg aes-gcm-256 crypto-key 636c4b434776664b6e6743626c506156475951525344464841534e5264456b72 esp
exec ipsec sa add 32 spi 100032 crypto-alg aes-gcm-256 crypto-key 636c4b434776664b6e6743626c506156475951525344464841534e5264456b72 esp
exec ipsec tunnel protect ipip32 sa-out 100032 sa-in 32 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.33.1 p2p
exec ipsec sa add 100033 spi 200033 crypto-alg aes-gcm-256 crypto-key 5974586a416c67586b794462454167756a474b43425962785062777254716750 esp
exec ipsec sa add 33 spi 100033 crypto-alg aes-gcm-256 crypto-key 5974586a416c67586b794462454167756a474b43425962785062777254716750 esp
exec ipsec tunnel protect ipip33 sa-out 100033 sa-in 33 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.34.1 p2p
exec ipsec sa add 100034 spi 200034 crypto-alg aes-gcm-256 crypto-key 786869744561534f6650776b616a645952676878706c445252534875664f5753 esp
exec ipsec sa add 34 spi 100034 crypto-alg aes-gcm-256 crypto-key 786869744561534f6650776b616a645952676878706c445252534875664f5753 esp
exec ipsec tunnel protect ipip34 sa-out 100034 sa-in 34 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.35.1 p2p
exec ipsec sa add 100035 spi 200035 crypto-alg aes-gcm-256 crypto-key 5076756c6f526366727859766e6362596770696d68595a454358656c4b786745 esp
exec ipsec sa add 35 spi 100035 crypto-alg aes-gcm-256 crypto-key 5076756c6f526366727859766e6362596770696d68595a454358656c4b786745 esp
exec ipsec tunnel protect ipip35 sa-out 100035 sa-in 35 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.36.1 p2p
exec ipsec sa add 100036 spi 200036 crypto-alg aes-gcm-256 crypto-key 6e4a706c4b4d4f7a594a41754b58626b70766e44415278664e4d4c76497a6d44 esp
exec ipsec sa add 36 spi 100036 crypto-alg aes-gcm-256 crypto-key 6e4a706c4b4d4f7a594a41754b58626b70766e44415278664e4d4c76497a6d44 esp
exec ipsec tunnel protect ipip36 sa-out 100036 sa-in 36 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.37.1 p2p
exec ipsec sa add 100037 spi 200037 crypto-alg aes-gcm-256 crypto-key 666250726c4e5a6d626b4358714841726c6667624c585363737651684f4b5766 esp
exec ipsec sa add 37 spi 100037 crypto-alg aes-gcm-256 crypto-key 666250726c4e5a6d626b4358714841726c6667624c585363737651684f4b5766 esp
exec ipsec tunnel protect ipip37 sa-out 100037 sa-in 37 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.38.1 p2p
exec ipsec sa add 100038 spi 200038 crypto-alg aes-gcm-256 crypto-key 746763796c5467656c70737759555541595562487976716e4c4e4a7a5767656c esp
exec ipsec sa add 38 spi 100038 crypto-alg aes-gcm-256 crypto-key 746763796c5467656c70737759555541595562487976716e4c4e4a7a5767656c esp
exec ipsec tunnel protect ipip38 sa-out 100038 sa-in 38 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.39.1 p2p
exec ipsec sa add 100039 spi 200039 crypto-alg aes-gcm-256 crypto-key 716467597951784e4b526e49686d79724c4e5a495a4f4d6d4179617472636467 esp
exec ipsec sa add 39 spi 100039 crypto-alg aes-gcm-256 crypto-key 716467597951784e4b526e49686d79724c4e5a495a4f4d6d4179617472636467 esp
exec ipsec tunnel protect ipip39 sa-out 100039 sa-in 39 add
exec ip route add 100.0.0.1/8 via 200.0.0.101 TenGigabitEthernet8/0/0
exec set interface unnumbered ipip0 use TenGigabitEthernet8/0/0
exec set interface state ipip0 up
exec ip route add 10.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use TenGigabitEthernet8/0/0
exec set interface state ipip1 up
exec ip route add 10.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use TenGigabitEthernet8/0/0
exec set interface state ipip2 up
exec ip route add 10.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use TenGigabitEthernet8/0/0
exec set interface state ipip3 up
exec ip route add 10.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use TenGigabitEthernet8/0/0
exec set interface state ipip4 up
exec ip route add 10.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use TenGigabitEthernet8/0/0
exec set interface state ipip5 up
exec ip route add 10.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use TenGigabitEthernet8/0/0
exec set interface state ipip6 up
exec ip route add 10.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use TenGigabitEthernet8/0/0
exec set interface state ipip7 up
exec ip route add 10.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use TenGigabitEthernet8/0/0
exec set interface state ipip8 up
exec ip route add 10.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use TenGigabitEthernet8/0/0
exec set interface state ipip9 up
exec ip route add 10.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use TenGigabitEthernet8/0/0
exec set interface state ipip10 up
exec ip route add 10.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use TenGigabitEthernet8/0/0
exec set interface state ipip11 up
exec ip route add 10.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use TenGigabitEthernet8/0/0
exec set interface state ipip12 up
exec ip route add 10.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use TenGigabitEthernet8/0/0
exec set interface state ipip13 up
exec ip route add 10.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use TenGigabitEthernet8/0/0
exec set interface state ipip14 up
exec ip route add 10.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use TenGigabitEthernet8/0/0
exec set interface state ipip15 up
exec ip route add 10.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use TenGigabitEthernet8/0/0
exec set interface state ipip16 up
exec ip route add 10.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use TenGigabitEthernet8/0/0
exec set interface state ipip17 up
exec ip route add 10.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use TenGigabitEthernet8/0/0
exec set interface state ipip18 up
exec ip route add 10.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use TenGigabitEthernet8/0/0
exec set interface state ipip19 up
exec ip route add 10.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use TenGigabitEthernet8/0/0
exec set interface state ipip20 up
exec ip route add 10.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use TenGigabitEthernet8/0/0
exec set interface state ipip21 up
exec ip route add 10.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use TenGigabitEthernet8/0/0
exec set interface state ipip22 up
exec ip route add 10.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use TenGigabitEthernet8/0/0
exec set interface state ipip23 up
exec ip route add 10.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use TenGigabitEthernet8/0/0
exec set interface state ipip24 up
exec ip route add 10.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use TenGigabitEthernet8/0/0
exec set interface state ipip25 up
exec ip route add 10.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use TenGigabitEthernet8/0/0
exec set interface state ipip26 up
exec ip route add 10.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use TenGigabitEthernet8/0/0
exec set interface state ipip27 up
exec ip route add 10.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use TenGigabitEthernet8/0/0
exec set interface state ipip28 up
exec ip route add 10.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use TenGigabitEthernet8/0/0
exec set interface state ipip29 up
exec ip route add 10.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use TenGigabitEthernet8/0/0
exec set interface state ipip30 up
exec ip route add 10.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use TenGigabitEthernet8/0/0
exec set interface state ipip31 up
exec ip route add 10.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use TenGigabitEthernet8/0/0
exec set interface state ipip32 up
exec ip route add 10.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use TenGigabitEthernet8/0/0
exec set interface state ipip33 up
exec ip route add 10.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use TenGigabitEthernet8/0/0
exec set interface state ipip34 up
exec ip route add 10.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use TenGigabitEthernet8/0/0
exec set interface state ipip35 up
exec ip route add 10.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use TenGigabitEthernet8/0/0
exec set interface state ipip36 up
exec ip route add 10.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use TenGigabitEthernet8/0/0
exec set interface state ipip37 up
exec ip route add 10.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use TenGigabitEthernet8/0/0
exec set interface state ipip38 up
exec ip route add 10.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use TenGigabitEthernet8/0/0
exec set interface state ipip39 up
exec ip route add 10.0.0.39/32 via ipip39

 imix-2t2c-ethip4ipsec40tnlsw- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec set interface ip address TenGigabitEthernet8/0/0 200.0.0.102/24.0
exec create ipip tunnel src 200.0.0.102 dst 100.0.0.1 p2p
exec ipsec sa add 100000 spi 200000 crypto-alg aes-gcm-256 crypto-key 557364726c787472666b646f49744e4b636f6e515253716b6573726143624e76 esp
exec ipsec sa add 0 spi 100000 crypto-alg aes-gcm-256 crypto-key 557364726c787472666b646f49744e4b636f6e515253716b6573726143624e76 esp
exec ipsec tunnel protect ipip0 sa-out 100000 sa-in 0 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.1.1 p2p
exec ipsec sa add 100001 spi 200001 crypto-alg aes-gcm-256 crypto-key 69674c62454f48725470676467504468524259484861645a636e5754624f7155 esp
exec ipsec sa add 1 spi 100001 crypto-alg aes-gcm-256 crypto-key 69674c62454f48725470676467504468524259484861645a636e5754624f7155 esp
exec ipsec tunnel protect ipip1 sa-out 100001 sa-in 1 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.2.1 p2p
exec ipsec sa add 100002 spi 200002 crypto-alg aes-gcm-256 crypto-key 72624e6d724b78455875545464756679795a6943614558614c45527661425744 esp
exec ipsec sa add 2 spi 100002 crypto-alg aes-gcm-256 crypto-key 72624e6d724b78455875545464756679795a6943614558614c45527661425744 esp
exec ipsec tunnel protect ipip2 sa-out 100002 sa-in 2 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.3.1 p2p
exec ipsec sa add 100003 spi 200003 crypto-alg aes-gcm-256 crypto-key 53756a706a744f68645076574d6a76424b4e436c5442627a4877755653636564 esp
exec ipsec sa add 3 spi 100003 crypto-alg aes-gcm-256 crypto-key 53756a706a744f68645076574d6a76424b4e436c5442627a4877755653636564 esp
exec ipsec tunnel protect ipip3 sa-out 100003 sa-in 3 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.4.1 p2p
exec ipsec sa add 100004 spi 200004 crypto-alg aes-gcm-256 crypto-key 4875566b524a77694759635851786f4452616d487074644f41797a784d4e6f42 esp
exec ipsec sa add 4 spi 100004 crypto-alg aes-gcm-256 crypto-key 4875566b524a77694759635851786f4452616d487074644f41797a784d4e6f42 esp
exec ipsec tunnel protect ipip4 sa-out 100004 sa-in 4 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.5.1 p2p
exec ipsec sa add 100005 spi 200005 crypto-alg aes-gcm-256 crypto-key 6e78766f72506b5242717243436269765a694d4b6d4d596554527a4a6151736f esp
exec ipsec sa add 5 spi 100005 crypto-alg aes-gcm-256 crypto-key 6e78766f72506b5242717243436269765a694d4b6d4d596554527a4a6151736f esp
exec ipsec tunnel protect ipip5 sa-out 100005 sa-in 5 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.6.1 p2p
exec ipsec sa add 100006 spi 200006 crypto-alg aes-gcm-256 crypto-key 69554779535949506e52437a4172726471775a75786750746658496568465066 esp
exec ipsec sa add 6 spi 100006 crypto-alg aes-gcm-256 crypto-key 69554779535949506e52437a4172726471775a75786750746658496568465066 esp
exec ipsec tunnel protect ipip6 sa-out 100006 sa-in 6 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.7.1 p2p
exec ipsec sa add 100007 spi 200007 crypto-alg aes-gcm-256 crypto-key 6741796f4e73587972574c79526e58417474747a46534e7673416854796d5a54 esp
exec ipsec sa add 7 spi 100007 crypto-alg aes-gcm-256 crypto-key 6741796f4e73587972574c79526e58417474747a46534e7673416854796d5a54 esp
exec ipsec tunnel protect ipip7 sa-out 100007 sa-in 7 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.8.1 p2p
exec ipsec sa add 100008 spi 200008 crypto-alg aes-gcm-256 crypto-key 636555665475676758737a6a58506a7572435843665577655150566d56526345 esp
exec ipsec sa add 8 spi 100008 crypto-alg aes-gcm-256 crypto-key 636555665475676758737a6a58506a7572435843665577655150566d56526345 esp
exec ipsec tunnel protect ipip8 sa-out 100008 sa-in 8 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.9.1 p2p
exec ipsec sa add 100009 spi 200009 crypto-alg aes-gcm-256 crypto-key 666b434856626248746b47716864676e74554d7755735278664b79514a545446 esp
exec ipsec sa add 9 spi 100009 crypto-alg aes-gcm-256 crypto-key 666b434856626248746b47716864676e74554d7755735278664b79514a545446 esp
exec ipsec tunnel protect ipip9 sa-out 100009 sa-in 9 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.10.1 p2p
exec ipsec sa add 100010 spi 200010 crypto-alg aes-gcm-256 crypto-key 4d7a526f444d684d62577349714f75574d62534e614d42616b556d5571734a64 esp
exec ipsec sa add 10 spi 100010 crypto-alg aes-gcm-256 crypto-key 4d7a526f444d684d62577349714f75574d62534e614d42616b556d5571734a64 esp
exec ipsec tunnel protect ipip10 sa-out 100010 sa-in 10 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.11.1 p2p
exec ipsec sa add 100011 spi 200011 crypto-alg aes-gcm-256 crypto-key 6f6e545a746a51665457686476505845485250546346705842424e64496a7467 esp
exec ipsec sa add 11 spi 100011 crypto-alg aes-gcm-256 crypto-key 6f6e545a746a51665457686476505845485250546346705842424e64496a7467 esp
exec ipsec tunnel protect ipip11 sa-out 100011 sa-in 11 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.12.1 p2p
exec ipsec sa add 100012 spi 200012 crypto-alg aes-gcm-256 crypto-key 54524559455a61526c4c6a4e53616e7665777048537857434a5a47616351776d esp
exec ipsec sa add 12 spi 100012 crypto-alg aes-gcm-256 crypto-key 54524559455a61526c4c6a4e53616e7665777048537857434a5a47616351776d esp
exec ipsec tunnel protect ipip12 sa-out 100012 sa-in 12 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.13.1 p2p
exec ipsec sa add 100013 spi 200013 crypto-alg aes-gcm-256 crypto-key 6a73464e4d57716a586e4e587349435546686445417155496275595571735857 esp
exec ipsec sa add 13 spi 100013 crypto-alg aes-gcm-256 crypto-key 6a73464e4d57716a586e4e587349435546686445417155496275595571735857 esp
exec ipsec tunnel protect ipip13 sa-out 100013 sa-in 13 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.14.1 p2p
exec ipsec sa add 100014 spi 200014 crypto-alg aes-gcm-256 crypto-key 4b76546c4e4575486f6949474877795a486b795267526a61735242615a526451 esp
exec ipsec sa add 14 spi 100014 crypto-alg aes-gcm-256 crypto-key 4b76546c4e4575486f6949474877795a486b795267526a61735242615a526451 esp
exec ipsec tunnel protect ipip14 sa-out 100014 sa-in 14 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.15.1 p2p
exec ipsec sa add 100015 spi 200015 crypto-alg aes-gcm-256 crypto-key 6e4b7350735752547262694a744465535946645a4b6872614154794b6a4e4e54 esp
exec ipsec sa add 15 spi 100015 crypto-alg aes-gcm-256 crypto-key 6e4b7350735752547262694a744465535946645a4b6872614154794b6a4e4e54 esp
exec ipsec tunnel protect ipip15 sa-out 100015 sa-in 15 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.16.1 p2p
exec ipsec sa add 100016 spi 200016 crypto-alg aes-gcm-256 crypto-key 47796d5245524655565047707854595664596b5477496c437a41424e6e736875 esp
exec ipsec sa add 16 spi 100016 crypto-alg aes-gcm-256 crypto-key 47796d5245524655565047707854595664596b5477496c437a41424e6e736875 esp
exec ipsec tunnel protect ipip16 sa-out 100016 sa-in 16 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.17.1 p2p
exec ipsec sa add 100017 spi 200017 crypto-alg aes-gcm-256 crypto-key 48775a66474961786b4e7871467462626d6272785448527375447077646d4a6c esp
exec ipsec sa add 17 spi 100017 crypto-alg aes-gcm-256 crypto-key 48775a66474961786b4e7871467462626d6272785448527375447077646d4a6c esp
exec ipsec tunnel protect ipip17 sa-out 100017 sa-in 17 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.18.1 p2p
exec ipsec sa add 100018 spi 200018 crypto-alg aes-gcm-256 crypto-key 6c7655756250457559466954567970504447634a50586e54496a4a537348425a esp
exec ipsec sa add 18 spi 100018 crypto-alg aes-gcm-256 crypto-key 6c7655756250457559466954567970504447634a50586e54496a4a537348425a esp
exec ipsec tunnel protect ipip18 sa-out 100018 sa-in 18 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.19.1 p2p
exec ipsec sa add 100019 spi 200019 crypto-alg aes-gcm-256 crypto-key 6c72565a4b5a41566f6a7266764a556c7553456644644645464f61436e535143 esp
exec ipsec sa add 19 spi 100019 crypto-alg aes-gcm-256 crypto-key 6c72565a4b5a41566f6a7266764a556c7553456644644645464f61436e535143 esp
exec ipsec tunnel protect ipip19 sa-out 100019 sa-in 19 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.20.1 p2p
exec ipsec sa add 100020 spi 200020 crypto-alg aes-gcm-256 crypto-key 565445796d547576726f52444a55696b59494642436a424a67736d716d6d4857 esp
exec ipsec sa add 20 spi 100020 crypto-alg aes-gcm-256 crypto-key 565445796d547576726f52444a55696b59494642436a424a67736d716d6d4857 esp
exec ipsec tunnel protect ipip20 sa-out 100020 sa-in 20 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.21.1 p2p
exec ipsec sa add 100021 spi 200021 crypto-alg aes-gcm-256 crypto-key 46737477744f4847505a5a52634e736e5a47516c4c67727856467a6254656347 esp
exec ipsec sa add 21 spi 100021 crypto-alg aes-gcm-256 crypto-key 46737477744f4847505a5a52634e736e5a47516c4c67727856467a6254656347 esp
exec ipsec tunnel protect ipip21 sa-out 100021 sa-in 21 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.22.1 p2p
exec ipsec sa add 100022 spi 200022 crypto-alg aes-gcm-256 crypto-key 7270536f6c794342506c53664b5553737245737170674d54697970724942566a esp
exec ipsec sa add 22 spi 100022 crypto-alg aes-gcm-256 crypto-key 7270536f6c794342506c53664b5553737245737170674d54697970724942566a esp
exec ipsec tunnel protect ipip22 sa-out 100022 sa-in 22 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.23.1 p2p
exec ipsec sa add 100023 spi 200023 crypto-alg aes-gcm-256 crypto-key 5063756a6e586f50435158664b576665647063565249436b76526659724e5146 esp
exec ipsec sa add 23 spi 100023 crypto-alg aes-gcm-256 crypto-key 5063756a6e586f50435158664b576665647063565249436b76526659724e5146 esp
exec ipsec tunnel protect ipip23 sa-out 100023 sa-in 23 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.24.1 p2p
exec ipsec sa add 100024 spi 200024 crypto-alg aes-gcm-256 crypto-key 536d4d4f5a65674a675358666a7775486a675a58534a4f447a754e535a435746 esp
exec ipsec sa add 24 spi 100024 crypto-alg aes-gcm-256 crypto-key 536d4d4f5a65674a675358666a7775486a675a58534a4f447a754e535a435746 esp
exec ipsec tunnel protect ipip24 sa-out 100024 sa-in 24 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.25.1 p2p
exec ipsec sa add 100025 spi 200025 crypto-alg aes-gcm-256 crypto-key 735347705462776452576f666347665853765074685566654c4c747267524e57 esp
exec ipsec sa add 25 spi 100025 crypto-alg aes-gcm-256 crypto-key 735347705462776452576f666347665853765074685566654c4c747267524e57 esp
exec ipsec tunnel protect ipip25 sa-out 100025 sa-in 25 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.26.1 p2p
exec ipsec sa add 100026 spi 200026 crypto-alg aes-gcm-256 crypto-key 68745a4965526973454c79727364576358484b7942505a7246796147486e6d5a esp
exec ipsec sa add 26 spi 100026 crypto-alg aes-gcm-256 crypto-key 68745a4965526973454c79727364576358484b7942505a7246796147486e6d5a esp
exec ipsec tunnel protect ipip26 sa-out 100026 sa-in 26 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.27.1 p2p
exec ipsec sa add 100027 spi 200027 crypto-alg aes-gcm-256 crypto-key 7749737a6f4867714376796e4972774f78546d6374577553774753505762656a esp
exec ipsec sa add 27 spi 100027 crypto-alg aes-gcm-256 crypto-key 7749737a6f4867714376796e4972774f78546d6374577553774753505762656a esp
exec ipsec tunnel protect ipip27 sa-out 100027 sa-in 27 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.28.1 p2p
exec ipsec sa add 100028 spi 200028 crypto-alg aes-gcm-256 crypto-key 6973585870424d56446e485564646d4359574b734469784f6264786645705854 esp
exec ipsec sa add 28 spi 100028 crypto-alg aes-gcm-256 crypto-key 6973585870424d56446e485564646d4359574b734469784f6264786645705854 esp
exec ipsec tunnel protect ipip28 sa-out 100028 sa-in 28 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.29.1 p2p
exec ipsec sa add 100029 spi 200029 crypto-alg aes-gcm-256 crypto-key 7272754177795676765a6b594c666d4f66456353744d715864594f7254424b79 esp
exec ipsec sa add 29 spi 100029 crypto-alg aes-gcm-256 crypto-key 7272754177795676765a6b594c666d4f66456353744d715864594f7254424b79 esp
exec ipsec tunnel protect ipip29 sa-out 100029 sa-in 29 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.30.1 p2p
exec ipsec sa add 100030 spi 200030 crypto-alg aes-gcm-256 crypto-key 784979724b6f6d6e746f71784a4648584c597170524a424269777a4158656f72 esp
exec ipsec sa add 30 spi 100030 crypto-alg aes-gcm-256 crypto-key 784979724b6f6d6e746f71784a4648584c597170524a424269777a4158656f72 esp
exec ipsec tunnel protect ipip30 sa-out 100030 sa-in 30 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.31.1 p2p
exec ipsec sa add 100031 spi 200031 crypto-alg aes-gcm-256 crypto-key 4978444c73676a537343474b4c684547514244774e424a52704d4a576c744e77 esp
exec ipsec sa add 31 spi 100031 crypto-alg aes-gcm-256 crypto-key 4978444c73676a537343474b4c684547514244774e424a52704d4a576c744e77 esp
exec ipsec tunnel protect ipip31 sa-out 100031 sa-in 31 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.32.1 p2p
exec ipsec sa add 100032 spi 200032 crypto-alg aes-gcm-256 crypto-key 47426959574a4a71646b4974556569505469787547477668656d4972747a6e52 esp
exec ipsec sa add 32 spi 100032 crypto-alg aes-gcm-256 crypto-key 47426959574a4a71646b4974556569505469787547477668656d4972747a6e52 esp
exec ipsec tunnel protect ipip32 sa-out 100032 sa-in 32 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.33.1 p2p
exec ipsec sa add 100033 spi 200033 crypto-alg aes-gcm-256 crypto-key 7a79514279425258576e494a4f5a63496d765677714669486a654c4d7a5a767a esp
exec ipsec sa add 33 spi 100033 crypto-alg aes-gcm-256 crypto-key 7a79514279425258576e494a4f5a63496d765677714669486a654c4d7a5a767a esp
exec ipsec tunnel protect ipip33 sa-out 100033 sa-in 33 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.34.1 p2p
exec ipsec sa add 100034 spi 200034 crypto-alg aes-gcm-256 crypto-key 564e437a534747796f6e4f4a72494c41596b6c5766694559694a4350504f6b4e esp
exec ipsec sa add 34 spi 100034 crypto-alg aes-gcm-256 crypto-key 564e437a534747796f6e4f4a72494c41596b6c5766694559694a4350504f6b4e esp
exec ipsec tunnel protect ipip34 sa-out 100034 sa-in 34 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.35.1 p2p
exec ipsec sa add 100035 spi 200035 crypto-alg aes-gcm-256 crypto-key 78504c79416451574a6a7670474f6c77624c615a53696c474969657a67494e46 esp
exec ipsec sa add 35 spi 100035 crypto-alg aes-gcm-256 crypto-key 78504c79416451574a6a7670474f6c77624c615a53696c474969657a67494e46 esp
exec ipsec tunnel protect ipip35 sa-out 100035 sa-in 35 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.36.1 p2p
exec ipsec sa add 100036 spi 200036 crypto-alg aes-gcm-256 crypto-key 78716a45714377794673534d744751776c794e745373466362676749714e5270 esp
exec ipsec sa add 36 spi 100036 crypto-alg aes-gcm-256 crypto-key 78716a45714377794673534d744751776c794e745373466362676749714e5270 esp
exec ipsec tunnel protect ipip36 sa-out 100036 sa-in 36 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.37.1 p2p
exec ipsec sa add 100037 spi 200037 crypto-alg aes-gcm-256 crypto-key 75454453747a4b676842687871765a574866667253656466626b66724f4f6c46 esp
exec ipsec sa add 37 spi 100037 crypto-alg aes-gcm-256 crypto-key 75454453747a4b676842687871765a574866667253656466626b66724f4f6c46 esp
exec ipsec tunnel protect ipip37 sa-out 100037 sa-in 37 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.38.1 p2p
exec ipsec sa add 100038 spi 200038 crypto-alg aes-gcm-256 crypto-key 72724d41446277567561426d55656d654b7956614d5a514f7178547a58734f56 esp
exec ipsec sa add 38 spi 100038 crypto-alg aes-gcm-256 crypto-key 72724d41446277567561426d55656d654b7956614d5a514f7178547a58734f56 esp
exec ipsec tunnel protect ipip38 sa-out 100038 sa-in 38 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.39.1 p2p
exec ipsec sa add 100039 spi 200039 crypto-alg aes-gcm-256 crypto-key 47774c4c705657435479616f6d734f6870476359694c6f57754f4a4a7a6e6c6d esp
exec ipsec sa add 39 spi 100039 crypto-alg aes-gcm-256 crypto-key 47774c4c705657435479616f6d734f6870476359694c6f57754f4a4a7a6e6c6d esp
exec ipsec tunnel protect ipip39 sa-out 100039 sa-in 39 add
exec ip route add 100.0.0.1/8 via 200.0.0.101 TenGigabitEthernet8/0/0
exec set interface unnumbered ipip0 use TenGigabitEthernet8/0/0
exec set interface state ipip0 up
exec ip route add 10.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use TenGigabitEthernet8/0/0
exec set interface state ipip1 up
exec ip route add 10.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use TenGigabitEthernet8/0/0
exec set interface state ipip2 up
exec ip route add 10.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use TenGigabitEthernet8/0/0
exec set interface state ipip3 up
exec ip route add 10.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use TenGigabitEthernet8/0/0
exec set interface state ipip4 up
exec ip route add 10.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use TenGigabitEthernet8/0/0
exec set interface state ipip5 up
exec ip route add 10.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use TenGigabitEthernet8/0/0
exec set interface state ipip6 up
exec ip route add 10.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use TenGigabitEthernet8/0/0
exec set interface state ipip7 up
exec ip route add 10.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use TenGigabitEthernet8/0/0
exec set interface state ipip8 up
exec ip route add 10.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use TenGigabitEthernet8/0/0
exec set interface state ipip9 up
exec ip route add 10.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use TenGigabitEthernet8/0/0
exec set interface state ipip10 up
exec ip route add 10.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use TenGigabitEthernet8/0/0
exec set interface state ipip11 up
exec ip route add 10.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use TenGigabitEthernet8/0/0
exec set interface state ipip12 up
exec ip route add 10.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use TenGigabitEthernet8/0/0
exec set interface state ipip13 up
exec ip route add 10.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use TenGigabitEthernet8/0/0
exec set interface state ipip14 up
exec ip route add 10.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use TenGigabitEthernet8/0/0
exec set interface state ipip15 up
exec ip route add 10.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use TenGigabitEthernet8/0/0
exec set interface state ipip16 up
exec ip route add 10.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use TenGigabitEthernet8/0/0
exec set interface state ipip17 up
exec ip route add 10.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use TenGigabitEthernet8/0/0
exec set interface state ipip18 up
exec ip route add 10.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use TenGigabitEthernet8/0/0
exec set interface state ipip19 up
exec ip route add 10.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use TenGigabitEthernet8/0/0
exec set interface state ipip20 up
exec ip route add 10.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use TenGigabitEthernet8/0/0
exec set interface state ipip21 up
exec ip route add 10.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use TenGigabitEthernet8/0/0
exec set interface state ipip22 up
exec ip route add 10.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use TenGigabitEthernet8/0/0
exec set interface state ipip23 up
exec ip route add 10.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use TenGigabitEthernet8/0/0
exec set interface state ipip24 up
exec ip route add 10.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use TenGigabitEthernet8/0/0
exec set interface state ipip25 up
exec ip route add 10.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use TenGigabitEthernet8/0/0
exec set interface state ipip26 up
exec ip route add 10.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use TenGigabitEthernet8/0/0
exec set interface state ipip27 up
exec ip route add 10.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use TenGigabitEthernet8/0/0
exec set interface state ipip28 up
exec ip route add 10.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use TenGigabitEthernet8/0/0
exec set interface state ipip29 up
exec ip route add 10.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use TenGigabitEthernet8/0/0
exec set interface state ipip30 up
exec ip route add 10.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use TenGigabitEthernet8/0/0
exec set interface state ipip31 up
exec ip route add 10.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use TenGigabitEthernet8/0/0
exec set interface state ipip32 up
exec ip route add 10.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use TenGigabitEthernet8/0/0
exec set interface state ipip33 up
exec ip route add 10.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use TenGigabitEthernet8/0/0
exec set interface state ipip34 up
exec ip route add 10.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use TenGigabitEthernet8/0/0
exec set interface state ipip35 up
exec ip route add 10.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use TenGigabitEthernet8/0/0
exec set interface state ipip36 up
exec ip route add 10.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use TenGigabitEthernet8/0/0
exec set interface state ipip37 up
exec ip route add 10.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use TenGigabitEthernet8/0/0
exec set interface state ipip38 up
exec ip route add 10.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use TenGigabitEthernet8/0/0
exec set interface state ipip39 up
exec ip route add 10.0.0.39/32 via ipip39

 imix-4t4c-ethip4ipsec40tnlsw- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec set interface ip address TenGigabitEthernet8/0/0 200.0.0.102/24.0
exec create ipip tunnel src 200.0.0.102 dst 100.0.0.1 p2p
exec ipsec sa add 100000 spi 200000 crypto-alg aes-gcm-256 crypto-key 6553505646734b4b567a41494f5a6d6b494f625353736463504248626a4a5346 esp
exec ipsec sa add 0 spi 100000 crypto-alg aes-gcm-256 crypto-key 6553505646734b4b567a41494f5a6d6b494f625353736463504248626a4a5346 esp
exec ipsec tunnel protect ipip0 sa-out 100000 sa-in 0 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.1.1 p2p
exec ipsec sa add 100001 spi 200001 crypto-alg aes-gcm-256 crypto-key 624e4972414356684e6348714972425a415a4567724863714568436248554d66 esp
exec ipsec sa add 1 spi 100001 crypto-alg aes-gcm-256 crypto-key 624e4972414356684e6348714972425a415a4567724863714568436248554d66 esp
exec ipsec tunnel protect ipip1 sa-out 100001 sa-in 1 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.2.1 p2p
exec ipsec sa add 100002 spi 200002 crypto-alg aes-gcm-256 crypto-key 6f5943495479575a75657465764a6f677a4f56465759565641484f4b52736779 esp
exec ipsec sa add 2 spi 100002 crypto-alg aes-gcm-256 crypto-key 6f5943495479575a75657465764a6f677a4f56465759565641484f4b52736779 esp
exec ipsec tunnel protect ipip2 sa-out 100002 sa-in 2 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.3.1 p2p
exec ipsec sa add 100003 spi 200003 crypto-alg aes-gcm-256 crypto-key 5a627a66714b6344484877426f766245544c5164427a5256765a77514b576456 esp
exec ipsec sa add 3 spi 100003 crypto-alg aes-gcm-256 crypto-key 5a627a66714b6344484877426f766245544c5164427a5256765a77514b576456 esp
exec ipsec tunnel protect ipip3 sa-out 100003 sa-in 3 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.4.1 p2p
exec ipsec sa add 100004 spi 200004 crypto-alg aes-gcm-256 crypto-key 4b66656b6b5572586f6b584a4f6c4c4d744873627a4b6f44704d6e52626c5342 esp
exec ipsec sa add 4 spi 100004 crypto-alg aes-gcm-256 crypto-key 4b66656b6b5572586f6b584a4f6c4c4d744873627a4b6f44704d6e52626c5342 esp
exec ipsec tunnel protect ipip4 sa-out 100004 sa-in 4 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.5.1 p2p
exec ipsec sa add 100005 spi 200005 crypto-alg aes-gcm-256 crypto-key 69506b584c4e726966564d6f6c794959594a71745356616e49587747664a744a esp
exec ipsec sa add 5 spi 100005 crypto-alg aes-gcm-256 crypto-key 69506b584c4e726966564d6f6c794959594a71745356616e49587747664a744a esp
exec ipsec tunnel protect ipip5 sa-out 100005 sa-in 5 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.6.1 p2p
exec ipsec sa add 100006 spi 200006 crypto-alg aes-gcm-256 crypto-key 63625256726c43416b447566644c4d79515a656b454b4b664b566842616b4d55 esp
exec ipsec sa add 6 spi 100006 crypto-alg aes-gcm-256 crypto-key 63625256726c43416b447566644c4d79515a656b454b4b664b566842616b4d55 esp
exec ipsec tunnel protect ipip6 sa-out 100006 sa-in 6 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.7.1 p2p
exec ipsec sa add 100007 spi 200007 crypto-alg aes-gcm-256 crypto-key 43597751746970666b66616274444b78524e5746526263467770474978566a58 esp
exec ipsec sa add 7 spi 100007 crypto-alg aes-gcm-256 crypto-key 43597751746970666b66616274444b78524e5746526263467770474978566a58 esp
exec ipsec tunnel protect ipip7 sa-out 100007 sa-in 7 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.8.1 p2p
exec ipsec sa add 100008 spi 200008 crypto-alg aes-gcm-256 crypto-key 7456417353597372517466634a44697450775a646d556c475456756a6d6a7171 esp
exec ipsec sa add 8 spi 100008 crypto-alg aes-gcm-256 crypto-key 7456417353597372517466634a44697450775a646d556c475456756a6d6a7171 esp
exec ipsec tunnel protect ipip8 sa-out 100008 sa-in 8 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.9.1 p2p
exec ipsec sa add 100009 spi 200009 crypto-alg aes-gcm-256 crypto-key 506f64704145657063524a72564c695448666e4d50644659714877616f715a67 esp
exec ipsec sa add 9 spi 100009 crypto-alg aes-gcm-256 crypto-key 506f64704145657063524a72564c695448666e4d50644659714877616f715a67 esp
exec ipsec tunnel protect ipip9 sa-out 100009 sa-in 9 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.10.1 p2p
exec ipsec sa add 100010 spi 200010 crypto-alg aes-gcm-256 crypto-key 724474454a61654456775a5177635066564b4c494c624279434e5341425a6c54 esp
exec ipsec sa add 10 spi 100010 crypto-alg aes-gcm-256 crypto-key 724474454a61654456775a5177635066564b4c494c624279434e5341425a6c54 esp
exec ipsec tunnel protect ipip10 sa-out 100010 sa-in 10 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.11.1 p2p
exec ipsec sa add 100011 spi 200011 crypto-alg aes-gcm-256 crypto-key 784b776c5052506651674f53704a47597766556b6f5754797541516453794343 esp
exec ipsec sa add 11 spi 100011 crypto-alg aes-gcm-256 crypto-key 784b776c5052506651674f53704a47597766556b6f5754797541516453794343 esp
exec ipsec tunnel protect ipip11 sa-out 100011 sa-in 11 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.12.1 p2p
exec ipsec sa add 100012 spi 200012 crypto-alg aes-gcm-256 crypto-key 7a4f48737955656a4c61654175495947597a4f5a4a676e6a47524e68465a6364 esp
exec ipsec sa add 12 spi 100012 crypto-alg aes-gcm-256 crypto-key 7a4f48737955656a4c61654175495947597a4f5a4a676e6a47524e68465a6364 esp
exec ipsec tunnel protect ipip12 sa-out 100012 sa-in 12 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.13.1 p2p
exec ipsec sa add 100013 spi 200013 crypto-alg aes-gcm-256 crypto-key 6c71617a6d44654959724a7a4752466275695063757243466e4e56526d476356 esp
exec ipsec sa add 13 spi 100013 crypto-alg aes-gcm-256 crypto-key 6c71617a6d44654959724a7a4752466275695063757243466e4e56526d476356 esp
exec ipsec tunnel protect ipip13 sa-out 100013 sa-in 13 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.14.1 p2p
exec ipsec sa add 100014 spi 200014 crypto-alg aes-gcm-256 crypto-key 487943694e4157666d7a6f5859737277534c74724f537a47594f697a474b6872 esp
exec ipsec sa add 14 spi 100014 crypto-alg aes-gcm-256 crypto-key 487943694e4157666d7a6f5859737277534c74724f537a47594f697a474b6872 esp
exec ipsec tunnel protect ipip14 sa-out 100014 sa-in 14 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.15.1 p2p
exec ipsec sa add 100015 spi 200015 crypto-alg aes-gcm-256 crypto-key 4a504f546d65745867776c68716f586d53676674594f7a44496e74526f6e767a esp
exec ipsec sa add 15 spi 100015 crypto-alg aes-gcm-256 crypto-key 4a504f546d65745867776c68716f586d53676674594f7a44496e74526f6e767a esp
exec ipsec tunnel protect ipip15 sa-out 100015 sa-in 15 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.16.1 p2p
exec ipsec sa add 100016 spi 200016 crypto-alg aes-gcm-256 crypto-key 6e74756c584943584a6676727369716b707356677666734553686e61466c4d63 esp
exec ipsec sa add 16 spi 100016 crypto-alg aes-gcm-256 crypto-key 6e74756c584943584a6676727369716b707356677666734553686e61466c4d63 esp
exec ipsec tunnel protect ipip16 sa-out 100016 sa-in 16 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.17.1 p2p
exec ipsec sa add 100017 spi 200017 crypto-alg aes-gcm-256 crypto-key 68666b42714557717a7a617a41434652496e416b576465665154545a7063586f esp
exec ipsec sa add 17 spi 100017 crypto-alg aes-gcm-256 crypto-key 68666b42714557717a7a617a41434652496e416b576465665154545a7063586f esp
exec ipsec tunnel protect ipip17 sa-out 100017 sa-in 17 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.18.1 p2p
exec ipsec sa add 100018 spi 200018 crypto-alg aes-gcm-256 crypto-key 414c464d636669686f794b44506d6761555470577068794c4a494e686e71784a esp
exec ipsec sa add 18 spi 100018 crypto-alg aes-gcm-256 crypto-key 414c464d636669686f794b44506d6761555470577068794c4a494e686e71784a esp
exec ipsec tunnel protect ipip18 sa-out 100018 sa-in 18 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.19.1 p2p
exec ipsec sa add 100019 spi 200019 crypto-alg aes-gcm-256 crypto-key 716a51684a4e6e6159437871637961697947506561727656755767636764764e esp
exec ipsec sa add 19 spi 100019 crypto-alg aes-gcm-256 crypto-key 716a51684a4e6e6159437871637961697947506561727656755767636764764e esp
exec ipsec tunnel protect ipip19 sa-out 100019 sa-in 19 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.20.1 p2p
exec ipsec sa add 100020 spi 200020 crypto-alg aes-gcm-256 crypto-key 78684d625a516f61705247744b57457a7a616c7776764e7952764d6d486c744c esp
exec ipsec sa add 20 spi 100020 crypto-alg aes-gcm-256 crypto-key 78684d625a516f61705247744b57457a7a616c7776764e7952764d6d486c744c esp
exec ipsec tunnel protect ipip20 sa-out 100020 sa-in 20 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.21.1 p2p
exec ipsec sa add 100021 spi 200021 crypto-alg aes-gcm-256 crypto-key 776276456e514a68444c444d4553464b794f4b6d4e7a56544147546d4b4e4e6b esp
exec ipsec sa add 21 spi 100021 crypto-alg aes-gcm-256 crypto-key 776276456e514a68444c444d4553464b794f4b6d4e7a56544147546d4b4e4e6b esp
exec ipsec tunnel protect ipip21 sa-out 100021 sa-in 21 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.22.1 p2p
exec ipsec sa add 100022 spi 200022 crypto-alg aes-gcm-256 crypto-key 4a464d78756e59734b5673734a7451496754586f4b627a6d4359735a4c795161 esp
exec ipsec sa add 22 spi 100022 crypto-alg aes-gcm-256 crypto-key 4a464d78756e59734b5673734a7451496754586f4b627a6d4359735a4c795161 esp
exec ipsec tunnel protect ipip22 sa-out 100022 sa-in 22 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.23.1 p2p
exec ipsec sa add 100023 spi 200023 crypto-alg aes-gcm-256 crypto-key 78676c456b736c4256464c4a726a67576a535a4f754e644e7965707941656150 esp
exec ipsec sa add 23 spi 100023 crypto-alg aes-gcm-256 crypto-key 78676c456b736c4256464c4a726a67576a535a4f754e644e7965707941656150 esp
exec ipsec tunnel protect ipip23 sa-out 100023 sa-in 23 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.24.1 p2p
exec ipsec sa add 100024 spi 200024 crypto-alg aes-gcm-256 crypto-key 4f4c4f6c46704e47486d6f4875767a567278464b79647a637a6f525772746f7a esp
exec ipsec sa add 24 spi 100024 crypto-alg aes-gcm-256 crypto-key 4f4c4f6c46704e47486d6f4875767a567278464b79647a637a6f525772746f7a esp
exec ipsec tunnel protect ipip24 sa-out 100024 sa-in 24 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.25.1 p2p
exec ipsec sa add 100025 spi 200025 crypto-alg aes-gcm-256 crypto-key 495666526863695664464b4770677167536447517246554945704952426f7349 esp
exec ipsec sa add 25 spi 100025 crypto-alg aes-gcm-256 crypto-key 495666526863695664464b4770677167536447517246554945704952426f7349 esp
exec ipsec tunnel protect ipip25 sa-out 100025 sa-in 25 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.26.1 p2p
exec ipsec sa add 100026 spi 200026 crypto-alg aes-gcm-256 crypto-key 5a61516967514141544e474e546f6c49794f6d44486a4b7352746f6563756565 esp
exec ipsec sa add 26 spi 100026 crypto-alg aes-gcm-256 crypto-key 5a61516967514141544e474e546f6c49794f6d44486a4b7352746f6563756565 esp
exec ipsec tunnel protect ipip26 sa-out 100026 sa-in 26 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.27.1 p2p
exec ipsec sa add 100027 spi 200027 crypto-alg aes-gcm-256 crypto-key 476971437a646241425456476155595541744d4678516b4d48665a705562794c esp
exec ipsec sa add 27 spi 100027 crypto-alg aes-gcm-256 crypto-key 476971437a646241425456476155595541744d4678516b4d48665a705562794c esp
exec ipsec tunnel protect ipip27 sa-out 100027 sa-in 27 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.28.1 p2p
exec ipsec sa add 100028 spi 200028 crypto-alg aes-gcm-256 crypto-key 564270635a4d4b4e6f46737a5a6a6665655543637a786f5a4377775070774469 esp
exec ipsec sa add 28 spi 100028 crypto-alg aes-gcm-256 crypto-key 564270635a4d4b4e6f46737a5a6a6665655543637a786f5a4377775070774469 esp
exec ipsec tunnel protect ipip28 sa-out 100028 sa-in 28 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.29.1 p2p
exec ipsec sa add 100029 spi 200029 crypto-alg aes-gcm-256 crypto-key 7375727148504748456454574851797959707742677062554d70625569734671 esp
exec ipsec sa add 29 spi 100029 crypto-alg aes-gcm-256 crypto-key 7375727148504748456454574851797959707742677062554d70625569734671 esp
exec ipsec tunnel protect ipip29 sa-out 100029 sa-in 29 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.30.1 p2p
exec ipsec sa add 100030 spi 200030 crypto-alg aes-gcm-256 crypto-key 684c4f68697954595a51796c5143514b787a506c796456635654576948615a69 esp
exec ipsec sa add 30 spi 100030 crypto-alg aes-gcm-256 crypto-key 684c4f68697954595a51796c5143514b787a506c796456635654576948615a69 esp
exec ipsec tunnel protect ipip30 sa-out 100030 sa-in 30 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.31.1 p2p
exec ipsec sa add 100031 spi 200031 crypto-alg aes-gcm-256 crypto-key 7366586979506c596146546b755450767141574d756650595259754653666654 esp
exec ipsec sa add 31 spi 100031 crypto-alg aes-gcm-256 crypto-key 7366586979506c596146546b755450767141574d756650595259754653666654 esp
exec ipsec tunnel protect ipip31 sa-out 100031 sa-in 31 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.32.1 p2p
exec ipsec sa add 100032 spi 200032 crypto-alg aes-gcm-256 crypto-key 7067654b64436a6a594d626457724f4f57705748594559637646436f59766142 esp
exec ipsec sa add 32 spi 100032 crypto-alg aes-gcm-256 crypto-key 7067654b64436a6a594d626457724f4f57705748594559637646436f59766142 esp
exec ipsec tunnel protect ipip32 sa-out 100032 sa-in 32 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.33.1 p2p
exec ipsec sa add 100033 spi 200033 crypto-alg aes-gcm-256 crypto-key 5a6b43464c6a4f4d6d6d514b486468535342625557706174765067494f554d47 esp
exec ipsec sa add 33 spi 100033 crypto-alg aes-gcm-256 crypto-key 5a6b43464c6a4f4d6d6d514b486468535342625557706174765067494f554d47 esp
exec ipsec tunnel protect ipip33 sa-out 100033 sa-in 33 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.34.1 p2p
exec ipsec sa add 100034 spi 200034 crypto-alg aes-gcm-256 crypto-key 5542494e6f4b7764537064686b7677417377747269434f7266796b75476f6577 esp
exec ipsec sa add 34 spi 100034 crypto-alg aes-gcm-256 crypto-key 5542494e6f4b7764537064686b7677417377747269434f7266796b75476f6577 esp
exec ipsec tunnel protect ipip34 sa-out 100034 sa-in 34 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.35.1 p2p
exec ipsec sa add 100035 spi 200035 crypto-alg aes-gcm-256 crypto-key 47564b76466b544b4a4c7956635867717944716d4e61625077545759764b7366 esp
exec ipsec sa add 35 spi 100035 crypto-alg aes-gcm-256 crypto-key 47564b76466b544b4a4c7956635867717944716d4e61625077545759764b7366 esp
exec ipsec tunnel protect ipip35 sa-out 100035 sa-in 35 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.36.1 p2p
exec ipsec sa add 100036 spi 200036 crypto-alg aes-gcm-256 crypto-key 586767417a4c6c64505877514b4e4f5a6c57774969526b796555424764504e64 esp
exec ipsec sa add 36 spi 100036 crypto-alg aes-gcm-256 crypto-key 586767417a4c6c64505877514b4e4f5a6c57774969526b796555424764504e64 esp
exec ipsec tunnel protect ipip36 sa-out 100036 sa-in 36 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.37.1 p2p
exec ipsec sa add 100037 spi 200037 crypto-alg aes-gcm-256 crypto-key 64504a535569526e495a676269654356644b4466476270656c7152794f6d6f59 esp
exec ipsec sa add 37 spi 100037 crypto-alg aes-gcm-256 crypto-key 64504a535569526e495a676269654356644b4466476270656c7152794f6d6f59 esp
exec ipsec tunnel protect ipip37 sa-out 100037 sa-in 37 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.38.1 p2p
exec ipsec sa add 100038 spi 200038 crypto-alg aes-gcm-256 crypto-key 7a4a53697044795642765449784461576d657663456d496c506a674a684c6470 esp
exec ipsec sa add 38 spi 100038 crypto-alg aes-gcm-256 crypto-key 7a4a53697044795642765449784461576d657663456d496c506a674a684c6470 esp
exec ipsec tunnel protect ipip38 sa-out 100038 sa-in 38 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.39.1 p2p
exec ipsec sa add 100039 spi 200039 crypto-alg aes-gcm-256 crypto-key 466a7558764a587156644e595a4e6f754a4e4b77507249437a694b6d73574a75 esp
exec ipsec sa add 39 spi 100039 crypto-alg aes-gcm-256 crypto-key 466a7558764a587156644e595a4e6f754a4e4b77507249437a694b6d73574a75 esp
exec ipsec tunnel protect ipip39 sa-out 100039 sa-in 39 add
exec ip route add 100.0.0.1/8 via 200.0.0.101 TenGigabitEthernet8/0/0
exec set interface unnumbered ipip0 use TenGigabitEthernet8/0/0
exec set interface state ipip0 up
exec ip route add 10.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use TenGigabitEthernet8/0/0
exec set interface state ipip1 up
exec ip route add 10.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use TenGigabitEthernet8/0/0
exec set interface state ipip2 up
exec ip route add 10.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use TenGigabitEthernet8/0/0
exec set interface state ipip3 up
exec ip route add 10.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use TenGigabitEthernet8/0/0
exec set interface state ipip4 up
exec ip route add 10.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use TenGigabitEthernet8/0/0
exec set interface state ipip5 up
exec ip route add 10.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use TenGigabitEthernet8/0/0
exec set interface state ipip6 up
exec ip route add 10.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use TenGigabitEthernet8/0/0
exec set interface state ipip7 up
exec ip route add 10.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use TenGigabitEthernet8/0/0
exec set interface state ipip8 up
exec ip route add 10.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use TenGigabitEthernet8/0/0
exec set interface state ipip9 up
exec ip route add 10.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use TenGigabitEthernet8/0/0
exec set interface state ipip10 up
exec ip route add 10.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use TenGigabitEthernet8/0/0
exec set interface state ipip11 up
exec ip route add 10.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use TenGigabitEthernet8/0/0
exec set interface state ipip12 up
exec ip route add 10.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use TenGigabitEthernet8/0/0
exec set interface state ipip13 up
exec ip route add 10.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use TenGigabitEthernet8/0/0
exec set interface state ipip14 up
exec ip route add 10.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use TenGigabitEthernet8/0/0
exec set interface state ipip15 up
exec ip route add 10.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use TenGigabitEthernet8/0/0
exec set interface state ipip16 up
exec ip route add 10.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use TenGigabitEthernet8/0/0
exec set interface state ipip17 up
exec ip route add 10.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use TenGigabitEthernet8/0/0
exec set interface state ipip18 up
exec ip route add 10.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use TenGigabitEthernet8/0/0
exec set interface state ipip19 up
exec ip route add 10.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use TenGigabitEthernet8/0/0
exec set interface state ipip20 up
exec ip route add 10.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use TenGigabitEthernet8/0/0
exec set interface state ipip21 up
exec ip route add 10.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use TenGigabitEthernet8/0/0
exec set interface state ipip22 up
exec ip route add 10.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use TenGigabitEthernet8/0/0
exec set interface state ipip23 up
exec ip route add 10.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use TenGigabitEthernet8/0/0
exec set interface state ipip24 up
exec ip route add 10.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use TenGigabitEthernet8/0/0
exec set interface state ipip25 up
exec ip route add 10.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use TenGigabitEthernet8/0/0
exec set interface state ipip26 up
exec ip route add 10.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use TenGigabitEthernet8/0/0
exec set interface state ipip27 up
exec ip route add 10.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use TenGigabitEthernet8/0/0
exec set interface state ipip28 up
exec ip route add 10.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use TenGigabitEthernet8/0/0
exec set interface state ipip29 up
exec ip route add 10.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use TenGigabitEthernet8/0/0
exec set interface state ipip30 up
exec ip route add 10.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use TenGigabitEthernet8/0/0
exec set interface state ipip31 up
exec ip route add 10.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use TenGigabitEthernet8/0/0
exec set interface state ipip32 up
exec ip route add 10.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use TenGigabitEthernet8/0/0
exec set interface state ipip33 up
exec ip route add 10.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use TenGigabitEthernet8/0/0
exec set interface state ipip34 up
exec ip route add 10.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use TenGigabitEthernet8/0/0
exec set interface state ipip35 up
exec ip route add 10.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use TenGigabitEthernet8/0/0
exec set interface state ipip36 up
exec ip route add 10.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use TenGigabitEthernet8/0/0
exec set interface state ipip37 up
exec ip route add 10.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use TenGigabitEthernet8/0/0
exec set interface state ipip38 up
exec ip route add 10.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use TenGigabitEthernet8/0/0
exec set interface state ipip39 up
exec ip route add 10.0.0.39/32 via ipip39

10ge2p1x553-ethip4ipsec4tnlsw-ip4base-int-aes128cbc-hmac512sha-ndrpdr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular opology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG verification: TG finds and reports throughput NDR (Non Drop Rate) with zero packet loss tolerance and throughput PDR (Partial Drop Rate) with non-zero packet loss tolerance (LT) expressed in percentage of packets transmitted. NDR and PDR are discovered for different Ethernet L2 frame sizes using MLRsearch library.

Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to umber of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG ode interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 64b-2t2c-ethip4ipsec4tnlsw-ip4base- 
int-aes128cbc-hmac512sha-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’TSXPjyZFxeAwjAVh’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’RFEDiTnepmiBZIHpVmDoeVwhoTxXBxTRKgdciPfEOEmVMNUeKpukPSstuoQyeCrC’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’TSXPjyZFxeAwjAVh’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’RFEDiTnepmiBZIHpVmDoeVwhoTxXBxTRKgdciPfEOEmVMNUeKpukPSstuoQyeCrC’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’RsBMydPIVXMIcJJn’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’ZkGNGelrikMpMBYQrhAhOabhObCKSaKxiVhsZXDSBKNcSAPkIdRUEuAJpwngWUDl’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’RsBMydPIVXMIcJJn’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’ZkGNGelrikMpMBYQrhAhOabhObCKSaKxiVhsZXDSBKNcSAPkIdRUEuAJpwngWUDl’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’SIhWnjLTbkrHrzKf’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’rhoFdaqvdLOXqPEieSVxETCrQDMqocegJISRtcQireEFpiolWwpmGtwcsoSMHvNB’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’SIhWnjLTbkrHrzKf’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’rhoFdaqvdLOXqPEieSVxETCrQDMqocegJISRtcQireEFpiolWwpmGtwcsoSMHvNB’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’gLelRfLItgfukJWs’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’mKcbyQpXzRRhBzuAivGzjATSUCuOGwMGrOBkculxXtyCBomHqyaVOikDNJtHmmxd’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’gLelRfLItgfukJWs’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’mKcbyQpXzRRhBzuAivGzjATSUCuOGwMGrOBkculxXtyCBomHqyaVOikDNJtHmmxd’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 64b-4t4c-ethip4ipsec4tnlsw-ip4base- 
int-aes128cbc-hmac512sha-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’BiEKeGIvbWiYXCvI’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’bfQPenGKtojqubjSZigNWsaRqEpUIlphWsWmEXVwLCzTnpUqaOjHsvnIGDNihFNm’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’BiEKeGIvbWiYXCvI’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’bfQPenGKtojqubjSZigNWsaRqEpUIlphWsWmEXVwLCzTnpUqaOjHsvnIGDNihFNm’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’aIBEtXaJesTWuZco’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’KJHxHJtyvknubiZXUEsZscXItFRgyTCLIogYdrmyIbsUbbwsBUKBMxWArTuByntr’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’aIBEtXaJesTWuZco’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’KJHxHJtyvknubiZXUEsZscXItFRgyTCLIogYdrmyIbsUbbwsBUKBMxWArTuByntr’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’mafcLEhyBNjuSNHt’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’WZmiDmqnKWphssNUBmCwNotAwFyYAjBRpldoQcpYFjDQEEEUMYpvNfBldbhdRnQS’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’mafcLEhyBNjuSNHt’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’WZmiDmqnKWphssNUBmCwNotAwFyYAjBRpldoQcpYFjDQEEEUMYpvNfBldbhdRnQS’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’SSlvujwSXeoDLteX’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’ydDycRmziARKipSXLMDyyQIwLgZwxSjeHrenhJMOIyoyOltOxBoNqwjaXISxqohO’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’SSlvujwSXeoDLteX’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’ydDycRmziARKipSXLMDyyQIwLgZwxSjeHrenhJMOIyoyOltOxBoNqwjaXISxqohO’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-1t1c-ethip4ipsec4tnlsw-ip4base- 
int-aes128cbc-hmac512sha-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’pmitrjkujGktpQST’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’MeVIgRZyekuPptvoCMDiCaSaZIHsbjIBmhzmJYjNVwjhpVNwGijzGbdovGJgoKDm’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’pmitrjkujGktpQST’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’MeVIgRZyekuPptvoCMDiCaSaZIHsbjIBmhzmJYjNVwjhpVNwGijzGbdovGJgoKDm’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’sFmRIjrfInDJtBFS’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’EerfJElnRcuAunJPYLYugWjHGjmdtaiXoTiNkLAacIQsJJiMjIDRTTwisQoldWNW’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’sFmRIjrfInDJtBFS’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’EerfJElnRcuAunJPYLYugWjHGjmdtaiXoTiNkLAacIQsJJiMjIDRTTwisQoldWNW’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’UmBsjCdUXGixPhCg’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’JLkonFHDXTIECHdAYywqtfZWUmIdNmpqMedymJabuEvguNSrsxaCFtLdrvhCBDNJ’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’UmBsjCdUXGixPhCg’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’JLkonFHDXTIECHdAYywqtfZWUmIdNmpqMedymJabuEvguNSrsxaCFtLdrvhCBDNJ’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’lAgZRTCsZpPytJAh’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’qjyHxLtjRlKIjNGOnOiGekzhpqwkRrkskhOPEMDNTvcMNLzyUQUCIZsabQlMziXw’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’lAgZRTCsZpPytJAh’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’qjyHxLtjRlKIjNGOnOiGekzhpqwkRrkskhOPEMDNTvcMNLzyUQUCIZsabQlMziXw’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-2t2c-ethip4ipsec4tnlsw-ip4base- 
int-aes128cbc-hmac512sha-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’AFhDHmiyyzrsBlnR’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’bzqeXRQlftFqewdyYhiRvUpFaJjpqrHKKBPXaCLYEBabZiSveHVszrrGcQfucSMl’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’AFhDHmiyyzrsBlnR’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’bzqeXRQlftFqewdyYhiRvUpFaJjpqrHKKBPXaCLYEBabZiSveHVszrrGcQfucSMl’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’UmVnwCzLZdoNHKFL’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’NOCfLnmziMnnYzVxThaiPVTkggsAuVyltyMZfpSUgGMKhafIZfxLoDilvqyawEwm’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’UmVnwCzLZdoNHKFL’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’NOCfLnmziMnnYzVxThaiPVTkggsAuVyltyMZfpSUgGMKhafIZfxLoDilvqyawEwm’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’HlQeDupOqtqeqLZl’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’DJgFLciLngnWeYQBwseotegWrKTLtUNlXORaOtiqKzcWCzHGCwlbksADWduHaZsB’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’HlQeDupOqtqeqLZl’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’DJgFLciLngnWeYQBwseotegWrKTLtUNlXORaOtiqKzcWCzHGCwlbksADWduHaZsB’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’HhAtIsXoYqXqgBYu’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’pobhAfUxgrpKVbzasdrHiIFNmUUtNSWoPfbPFBgBKgTcOeFCuowXvFAmEiQORfKy’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’HhAtIsXoYqXqgBYu’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’pobhAfUxgrpKVbzasdrHiIFNmUUtNSWoPfbPFBgBKgTcOeFCuowXvFAmEiQORfKy’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-1t1c-ethip4ipsec4tnlsw-ip4base- 
int-aes128cbc-hmac512sha-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’lVXgyKOZUGlMRgFt’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’kMHTgvuJSACCYCFQQrPnBAxLtxZMEdRfqCvFXppWwqsKiaHkdoSdcbpEKopXMDSH’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’lVXgyKOZUGlMRgFt’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’kMHTgvuJSACCYCFQQrPnBAxLtxZMEdRfqCvFXppWwqsKiaHkdoSdcbpEKopXMDSH’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’SqIqTvfjIlqdnOXa’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’mlZRxBjubQzqOpcktXZVlZxZhPtLlbtBcPbIephyfWdsdoiblQBrfdECvjthLQzh’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’SqIqTvfjIlqdnOXa’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’mlZRxBjubQzqOpcktXZVlZxZhPtLlbtBcPbIephyfWdsdoiblQBrfdECvjthLQzh’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’KmOmhNRsIUzgeYiK’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’bShfYokHrfnltPvnmCLcGEiQrCvqPzUXLBiyjHCqBFjBFljRbleCoxRcuDMhXhfe’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’KmOmhNRsIUzgeYiK’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’bShfYokHrfnltPvnmCLcGEiQrCvqPzUXLBiyjHCqBFjBFljRbleCoxRcuDMhXhfe’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’oBmUlNdTNajrhPYS’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’qmRDGTiigQkPFUgqMWNyAjaXVbmmmbzSfVaYbmyOKbvKuuwJQtNCssOXzhyyyCSc’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’oBmUlNdTNajrhPYS’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’qmRDGTiigQkPFUgqMWNyAjaXVbmmmbzSfVaYbmyOKbvKuuwJQtNCssOXzhyyyCSc’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-2t2c-ethip4ipsec4tnlsw-ip4base- 
int-aes128cbc-hmac512sha-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’hDoVRjUSMRDFTkof’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’dedRuEZekbnSVNaIRQjsbVgYlPmxJurIdtOvnxkMfVcyJPAtAwdUwHUKvmIRkdOi’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’hDoVRjUSMRDFTkof’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’dedRuEZekbnSVNaIRQjsbVgYlPmxJurIdtOvnxkMfVcyJPAtAwdUwHUKvmIRkdOi’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’gvVJWmBtScRbqiOK’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’gLNaNwggbbsArJmEdcWQEYvgsczsTeajzujFPBwwwPVkaLZVyUjYqewgtTXyMmkG’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’gvVJWmBtScRbqiOK’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’gLNaNwggbbsArJmEdcWQEYvgsczsTeajzujFPBwwwPVkaLZVyUjYqewgtTXyMmkG’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’gqvFhlkSvjJtobLh’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’NLEtRjaJcNmPKFHPTPDMnLHVoBoFFffsQoDJMugXZdDJPiiydHfboVuAtTGBrNfa’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’gqvFhlkSvjJtobLh’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’NLEtRjaJcNmPKFHPTPDMnLHVoBoFFffsQoDJMugXZdDJPiiydHfboVuAtTGBrNfa’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’qWaaQfRzESeUrsnk’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’ZoyIWMJQfHPsyKkWFhzAlVwjpGfcxtCYxYmFmfhAJMugBOrPcawRcNSxCVwaLhOZ’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’qWaaQfRzESeUrsnk’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’ZoyIWMJQfHPsyKkWFhzAlVwjpGfcxtCYxYmFmfhAJMugBOrPcawRcNSxCVwaLhOZ’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

10ge2p1x553-ethip4ipsec4tnlsw-ip4base-int-aes128gcm-ndrpdr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular opology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG verification: TG finds and reports throughput NDR (Non Drop Rate) with zero packet loss tolerance and throughput PDR (Partial Drop Rate) with non-zero packet loss tolerance (LT) expressed in percentage of packets transmitted. NDR and PDR are discovered for different Ethernet L2 frame sizes using MLRsearch library.

Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to umber of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG ode interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 64b-1t1c-ethip4ipsec4tnlsw- 
ip4base-int-aes128gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’SYNuzuGDvicaYdUO’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’SYNuzuGDvicaYdUO’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’xNnuCHKDAyfNCotT’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’xNnuCHKDAyfNCotT’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’RglToqjOcegzmbwM’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’RglToqjOcegzmbwM’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’SuQNEuIrdyZWrGCF’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’SuQNEuIrdyZWrGCF’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 64b-2t2c-ethip4ipsec4tnlsw- 
ip4base-int-aes128gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’PdFxltFtuVakkiZe’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’PdFxltFtuVakkiZe’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’IBVqolsrTpYYLfOK’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’IBVqolsrTpYYLfOK’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’YPTlZRtKrcovfgvf’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’YPTlZRtKrcovfgvf’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’MgyvpvPrnnJaLwul’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’MgyvpvPrnnJaLwul’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 64b-4t4c-ethip4ipsec4tnlsw- 
ip4base-int-aes128gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’LDXpyVxXoXXtRdND’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’LDXpyVxXoXXtRdND’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’dNQqqPNZRvAnbQiz’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’dNQqqPNZRvAnbQiz’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’bySBRZitfyfvuWEg’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’bySBRZitfyfvuWEg’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’lzehEGMISkziSTIo’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’lzehEGMISkziSTIo’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-1t1c-ethip4ipsec4tnlsw- 
ip4base-int-aes128gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’CavBDpPXyeTcvWEI’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’CavBDpPXyeTcvWEI’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’bmpLNZWWBSRkddch’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’bmpLNZWWBSRkddch’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’jpIFqTILlQQuvrAG’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’jpIFqTILlQQuvrAG’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’sbTfDuljrPOpcYaZ’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’sbTfDuljrPOpcYaZ’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-2t2c-ethip4ipsec4tnlsw- 
ip4base-int-aes128gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’pPXyndyArnpcqsxx’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’pPXyndyArnpcqsxx’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’hNVQWmGLwURJysDO’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’hNVQWmGLwURJysDO’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’cuVWFnwnBPYmRrgi’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’cuVWFnwnBPYmRrgi’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’drXpAYzRWAVCexFk’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’drXpAYzRWAVCexFk’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-1t1c-ethip4ipsec4tnlsw- 
ip4base-int-aes128gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’sMxsveyPLsHZkrfZ’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’sMxsveyPLsHZkrfZ’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’jPbbSVAaHYtiABny’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’jPbbSVAaHYtiABny’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’IVMcOUteXujWpCpv’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’IVMcOUteXujWpCpv’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’NhXZtRhxbqtFhxhq’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’NhXZtRhxbqtFhxhq’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-2t2c-ethip4ipsec4tnlsw- 
ip4base-int-aes128gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’PzXysEbNcAmAXceZ’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’PzXysEbNcAmAXceZ’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’dAmUNKJCdfnykEYr’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’dAmUNKJCdfnykEYr’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’kXvdNrLCnNgkRLqO’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’kXvdNrLCnNgkRLqO’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’ZHHELeixhvVOhebF’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’ZHHELeixhvVOhebF’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

10ge2p1x553-ethip4ipsec4tnlsw-ip4base-int-aes256gcm-ndrpdr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular opology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG verification: TG finds and reports throughput NDR (Non Drop Rate) with zero packet loss tolerance and throughput PDR (Partial Drop Rate) with non-zero packet loss tolerance (LT) expressed in percentage of packets transmitted. NDR and PDR are discovered for different Ethernet L2 frame sizes using MLRsearch library.

Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to umber of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG ode interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 64b-1t1c-ethip4ipsec4tnlsw- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’vIbQYQttrPvUnJZotyjsVMpPlNoadMlB’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’vIbQYQttrPvUnJZotyjsVMpPlNoadMlB’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’VnWEUjYCnIevftwrWldOXkzYjcakZAsy’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’VnWEUjYCnIevftwrWldOXkzYjcakZAsy’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’dmPmctRamRGzMczYyYbbOpRqrNpdiLil’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’dmPmctRamRGzMczYyYbbOpRqrNpdiLil’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’piwVkCmReOtGtTFrlXLaFBAWXCMspslk’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’piwVkCmReOtGtTFrlXLaFBAWXCMspslk’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 64b-2t2c-ethip4ipsec4tnlsw- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’hPuGCNyKQkDavpazutZpUhgTNzlwswsX’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’hPuGCNyKQkDavpazutZpUhgTNzlwswsX’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’SOqFGQQeJxDvEBJwVZNnNxvODDWsHJgm’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’SOqFGQQeJxDvEBJwVZNnNxvODDWsHJgm’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’xbuiYgcujjehwLAMZykCPDABJpqGZrbt’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’xbuiYgcujjehwLAMZykCPDABJpqGZrbt’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’JuCfjYBEZMzzJcDrsGTQXrrgmnLffsLU’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’JuCfjYBEZMzzJcDrsGTQXrrgmnLffsLU’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-1t1c-ethip4ipsec4tnlsw- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’LznlUKDTWVjzCMEvimmEzetadMUJWLUT’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’LznlUKDTWVjzCMEvimmEzetadMUJWLUT’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’QFxfQaDERLOweFTLRMqpxWHXhbMaBNNd’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’QFxfQaDERLOweFTLRMqpxWHXhbMaBNNd’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’LhFCNwCXstFCRIpEJPjJUjcDiuNNXpsX’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’LhFCNwCXstFCRIpEJPjJUjcDiuNNXpsX’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’oSCcJoqAlXBvazvuRIvUZSVfVdRrTvaQ’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’oSCcJoqAlXBvazvuRIvUZSVfVdRrTvaQ’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-2t2c-ethip4ipsec4tnlsw- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’PQQsUDTlSrYfnqfvLAUtGPfJMMfgzMTg’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’PQQsUDTlSrYfnqfvLAUtGPfJMMfgzMTg’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’bveWdtODwRjcCEEiupwFCJvdWXypSgJa’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’bveWdtODwRjcCEEiupwFCJvdWXypSgJa’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’EPOzLGwCgQUKREIQOnCKtrIVKHroICbY’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’EPOzLGwCgQUKREIQOnCKtrIVKHroICbY’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’xYgJCTrWKCqNnurYyDRBpHrrOWhXwGZH’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’xYgJCTrWKCqNnurYyDRBpHrrOWhXwGZH’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-1t1c-ethip4ipsec4tnlsw- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’AQiZRdSHiVukgGRuRLJojVjiCSNIOgMi’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’AQiZRdSHiVukgGRuRLJojVjiCSNIOgMi’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’AEuwucfAWuCMBwWjWZgVMFsUBQtfcDwI’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’AEuwucfAWuCMBwWjWZgVMFsUBQtfcDwI’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’ZgfpNZlOimDNJlmAqPSHsnKThuaZPKcE’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’ZgfpNZlOimDNJlmAqPSHsnKThuaZPKcE’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’CWPCvyJIaaVKxKmkSbomlYvqJQZAesGV’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’CWPCvyJIaaVKxKmkSbomlYvqJQZAesGV’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-4t4c-ethip4ipsec4tnlsw- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’PDixAqOuBXvKlXwrDAfXNJtCIbovPRpu’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’PDixAqOuBXvKlXwrDAfXNJtCIbovPRpu’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’mkoOvpBvULsTFkLEcwicGeqCUxijauCg’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’mkoOvpBvULsTFkLEcwicGeqCUxijauCg’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’rUXJysSTJmLDEpZcdwqzFabXYgZwdBfX’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’rUXJysSTJmLDEpZcdwqzFabXYgZwdBfX’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’xniTkScCNjTeUPQKYFxWzTZqaogMnsnG’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’xniTkScCNjTeUPQKYFxWzTZqaogMnsnG’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

10ge2p1x553-ethip4ipsec4tnlswasync-scheduler-ip4base-int-aes128cbc-hmac512sha-ndrpdr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular opology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them, run with IPsec async mode and use crypto sw scheduler engine to schedule crypto work to crypto cores. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG verification: TG finds and reports throughput NDR (Non Drop Rate) with zero packet loss tolerance and throughput PDR (Partial Drop Rate) with non-zero packet loss tolerance (LT) expressed in percentage of packets transmitted. NDR and PDR are discovered for different Ethernet L2 frame sizes using MLRsearch library.

Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to umber of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG ode interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 1518b-1t2c-ethip4ipsec4tnlswasync-scheduler- 
ip4base-int-aes128cbc-hmac512sha-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’ehrdKpZCGPXUoDbV’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’yVoFbrqosxOyAwBbdIafwCrbpzEGdpvGqubjIBiHaRBjORZKYfkGfaErJUgHSQTO’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’ehrdKpZCGPXUoDbV’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’yVoFbrqosxOyAwBbdIafwCrbpzEGdpvGqubjIBiHaRBjORZKYfkGfaErJUgHSQTO’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’UMWYYIaVCrLfjGNa’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’OiBzNBEMvuvcwUZGKcYdosyvkwHfISadbxyNNMcHhsUYlgmBMATziJaLGcbMpsLf’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’UMWYYIaVCrLfjGNa’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’OiBzNBEMvuvcwUZGKcYdosyvkwHfISadbxyNNMcHhsUYlgmBMATziJaLGcbMpsLf’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’JLpWUDRnMYrodIAy’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’QWVCUmqkUcheqnIRtlEQSwjTrqfjTURFtjzlFIyOAnGxTxbgGmALRRGEGBvLUwcV’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’JLpWUDRnMYrodIAy’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’QWVCUmqkUcheqnIRtlEQSwjTrqfjTURFtjzlFIyOAnGxTxbgGmALRRGEGBvLUwcV’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’WDnRKRtWduFQIXIx’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’PjpaNYaJxXgehdJvfXteskukYQHPGAyDjvvigzyBWxnwPcYgaApdnqnrqUElehLL’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’WDnRKRtWduFQIXIx’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’PjpaNYaJxXgehdJvfXteskukYQHPGAyDjvvigzyBWxnwPcYgaApdnqnrqUElehLL’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-1t2c-ethip4ipsec4tnlswasync-scheduler- 
ip4base-int-aes128cbc-hmac512sha-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’sSKGmfCmtYHrbsBq’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’MgxlENWFYTnyWNOcUSErhpRdheQWFvUMDECMICssJoavzwaGPHPtymUDEXpfsgKv’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’sSKGmfCmtYHrbsBq’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’MgxlENWFYTnyWNOcUSErhpRdheQWFvUMDECMICssJoavzwaGPHPtymUDEXpfsgKv’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’bQmtXEKPgtFNRMYd’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’pxmrnQPGMEZPQxstkaUaqvcElApQtWztDYIPGBdjfjglVmvKwpZhEafEfMIZBugm’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’bQmtXEKPgtFNRMYd’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’pxmrnQPGMEZPQxstkaUaqvcElApQtWztDYIPGBdjfjglVmvKwpZhEafEfMIZBugm’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’lpIyHVmvFoEIfeay’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’QlXDFOJBLTXeNaSAAuIDNPFxofmoygnuMwSEnwEBnBazUhRamMPlKtoOjaYUrBgt’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’lpIyHVmvFoEIfeay’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’QlXDFOJBLTXeNaSAAuIDNPFxofmoygnuMwSEnwEBnBazUhRamMPlKtoOjaYUrBgt’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’mGUmwlbNjLmbYYVz’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’fkRVAZkuPeVbRLVrvRWYVuVHNPUffMPkXgcyMcrCOFPBrbazfmFloXgsPPjBaKuH’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’mGUmwlbNjLmbYYVz’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’fkRVAZkuPeVbRLVrvRWYVuVHNPUffMPkXgcyMcrCOFPBrbazfmFloXgsPPjBaKuH’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-1t4c-ethip4ipsec4tnlswasync-scheduler- 
ip4base-int-aes128cbc-hmac512sha-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’RiAgqSXtOwGnfYbl’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’XRcArAKQMkufxavfYJiPRHnVQLSMurLcgEMlZRBESslDKxWGqGuyyrCkHANiGRTf’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’RiAgqSXtOwGnfYbl’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’XRcArAKQMkufxavfYJiPRHnVQLSMurLcgEMlZRBESslDKxWGqGuyyrCkHANiGRTf’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’QlDQYTGKZwgVXdrt’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’hVPicotyaPHJNHKorVmgPAPObQwdMVWixjOlLYbbLAbMsXTUbtGrwHpavlywKMRy’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’QlDQYTGKZwgVXdrt’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’hVPicotyaPHJNHKorVmgPAPObQwdMVWixjOlLYbbLAbMsXTUbtGrwHpavlywKMRy’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’JqoZVLogjUuDcqrz’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’bSzppLyEieKvvVaJrWmpteilgzfKtkzsGBQmcKmZtMArngYWUzZbzuBosDZAebtF’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’JqoZVLogjUuDcqrz’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’bSzppLyEieKvvVaJrWmpteilgzfKtkzsGBQmcKmZtMArngYWUzZbzuBosDZAebtF’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’VrCPOjOhSbRdSFkU’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’hrHqtFIOsUqGxnanQlvBZnRLgqxWsHdlLpQLxKIhfJLacxiYXrSlaHPEHBBOQlZn’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’VrCPOjOhSbRdSFkU’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’hrHqtFIOsUqGxnanQlvBZnRLgqxWsHdlLpQLxKIhfJLacxiYXrSlaHPEHBBOQlZn’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

10ge2p1x553-ethip4ipsec4tnlswasync-scheduler-ip4base-int-aes128gcm-ndrpdr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular opology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them, run with IPsec async mode and use crypto sw scheduler engine to schedule crypto work to crypto cores. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG verification: TG finds and reports throughput NDR (Non Drop Rate) with zero packet loss tolerance and throughput PDR (Partial Drop Rate) with non-zero packet loss tolerance (LT) expressed in percentage of packets transmitted. NDR and PDR are discovered for different Ethernet L2 frame sizes using MLRsearch library.

Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to umber of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG ode interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 64b-1t2c-ethip4ipsec4tnlswasync-scheduler- 
ip4base-int-aes128gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’PrGtUeZAeATQbxKB’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’PrGtUeZAeATQbxKB’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’puzEHpfbdkHzpjNO’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’puzEHpfbdkHzpjNO’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’JysYtgSiTDvNpOVz’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’JysYtgSiTDvNpOVz’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’EFmiNZpvGjSHVgQs’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’EFmiNZpvGjSHVgQs’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-1t2c-ethip4ipsec4tnlswasync-scheduler- 
ip4base-int-aes128gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’RvjuikBWnckcnOrk’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’RvjuikBWnckcnOrk’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’mciifECTkkXaTPsR’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’mciifECTkkXaTPsR’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’suWHqmlbrArKpApt’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’suWHqmlbrArKpApt’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’TpvhXFYzCwSahkKi’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’TpvhXFYzCwSahkKi’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-1t2c-ethip4ipsec4tnlswasync-scheduler- 
ip4base-int-aes128gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’DfwnyOYmzSbufibV’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’DfwnyOYmzSbufibV’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’ZbdzCLqRpEVrjpxG’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’ZbdzCLqRpEVrjpxG’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’efCvAHrVmWtbyHEl’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’efCvAHrVmWtbyHEl’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’SNaHAvcooWHudxmg’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’SNaHAvcooWHudxmg’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

10ge2p1x553-ethip4ipsec4tnlswasync-scheduler-ip4base-int-aes256gcm-ndrpdr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular opology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them, run with IPsec async mode and use crypto sw scheduler engine to schedule crypto work to crypto cores. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG verification: TG finds and reports throughput NDR (Non Drop Rate) with zero packet loss tolerance and throughput PDR (Partial Drop Rate) with non-zero packet loss tolerance (LT) expressed in percentage of packets transmitted. NDR and PDR are discovered for different Ethernet L2 frame sizes using MLRsearch library.

Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to umber of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG ode interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 64b-1t2c-ethip4ipsec4tnlswasync-scheduler- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’rKxByvCujKVyGItMCmGZlaizeYLhRgaW’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’rKxByvCujKVyGItMCmGZlaizeYLhRgaW’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’bEZuWmEtTZOaKrWuwFKjUTMAZnYMpihZ’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’bEZuWmEtTZOaKrWuwFKjUTMAZnYMpihZ’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’RfgTACsoZvFkOuqYPaCSlKPWxeZJzWSK’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’RfgTACsoZvFkOuqYPaCSlKPWxeZJzWSK’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’YhVbmWGqvNCsUYYnqIdswZLprLsaHGkj’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’YhVbmWGqvNCsUYYnqIdswZLprLsaHGkj’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 64b-1t4c-ethip4ipsec4tnlswasync-scheduler- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’uidfEdEcpqbamyYVFvZbqExWKfgnpZZf’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’uidfEdEcpqbamyYVFvZbqExWKfgnpZZf’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’zWiPncXfbYvKilxsryMCjrLBWqsZiYxd’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’zWiPncXfbYvKilxsryMCjrLBWqsZiYxd’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’eRlLOWRUMiRBNpSgaPySLURVJGHGinis’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’eRlLOWRUMiRBNpSgaPySLURVJGHGinis’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’IxJirPJNqzHnHKqjiqqiUvXYEabiCftq’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’IxJirPJNqzHnHKqjiqqiUvXYEabiCftq’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-1t2c-ethip4ipsec4tnlswasync-scheduler- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’pIUWzvDMaAqbwnHweFCFNmvBexuTpwTJ’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’pIUWzvDMaAqbwnHweFCFNmvBexuTpwTJ’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’xMYbnzRPokPIkICQMmZogAiTnnmslaVO’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’xMYbnzRPokPIkICQMmZogAiTnnmslaVO’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’HBUMIUqeUqxHgJcsifWehvNxipMErfvE’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’HBUMIUqeUqxHgJcsifWehvNxipMErfvE’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’rLbSQwxJlvjJuwKQAlKminZugpmKRtdd’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’rLbSQwxJlvjJuwKQAlKminZugpmKRtdd’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-1t4c-ethip4ipsec4tnlswasync-scheduler- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’PwJdujYVELcahwSFXSiUTIBkmWLweAHz’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’PwJdujYVELcahwSFXSiUTIBkmWLweAHz’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’BoGpxKhztgcDAYQyxEwpERPNuUApRQjo’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’BoGpxKhztgcDAYQyxEwpERPNuUApRQjo’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’swRYUEUHWcvhQjyHZweXjItSGRRKGuVY’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’swRYUEUHWcvhQjyHZweXjItSGRRKGuVY’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’mgCcbyTDEjwjStOTPXxOnlWQkTUsvfTU’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’mgCcbyTDEjwjStOTPXxOnlWQkTUsvfTU’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

10ge2p1x553-ethip4ipsec8tnlswasync-scheduler-ip4base-int-aes128cbc-hmac512sha-ndrpdr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular opology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them, run with IPsec async mode and use crypto sw scheduler engine to schedule crypto work to crypto cores. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG verification: TG finds and reports throughput NDR (Non Drop Rate) with zero packet loss tolerance and throughput PDR (Partial Drop Rate) with non-zero packet loss tolerance (LT) expressed in percentage of packets transmitted. NDR and PDR are discovered for different Ethernet L2 frame sizes using MLRsearch library.

Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to umber of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG ode interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 64b-1t4c-ethip4ipsec8tnlswasync-scheduler- 
ip4base-int-aes128cbc-hmac512sha-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x06x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x07x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’YWQvdwzmApuHvsQk’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’UTHnVyVuLGLXtuiTKqnvjGUZwlTSIqACPmapuawMjtvrEFrlLDALKxgrdAgDsCkE’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’YWQvdwzmApuHvsQk’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’UTHnVyVuLGLXtuiTKqnvjGUZwlTSIqACPmapuawMjtvrEFrlLDALKxgrdAgDsCkE’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’ttKceJZpiMHnWskI’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’OsPVWIsGPMHNNtOCTtXESFUVsGupHkLChNKLAwGOBRSivTlxheMVFRiFxoSNYSJS’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’ttKceJZpiMHnWskI’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’OsPVWIsGPMHNNtOCTtXESFUVsGupHkLChNKLAwGOBRSivTlxheMVFRiFxoSNYSJS’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100006, ‘spi’: 200006, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’xOXYARLXhTilxTbk’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’HsVeSvymVCSNMLBmzglTScmgRTsCMAJEkrNgijkuCEOYUZCDfnTcOOgJVhlqSbxH’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 6, ‘spi’: 100006, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’xOXYARLXhTilxTbk’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’HsVeSvymVCSNMLBmzglTScmgRTsCMAJEkrNgijkuCEOYUZCDfnTcOOgJVhlqSbxH’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100007, ‘spi’: 200007, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’oBerwzBoTxlWXQBM’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’xhgeOoMEcVWigfDSwOWwWQrsQcuVKyVEZOQxtjlTTfSsGFPXMJEFXNCBBUtRpxmF’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 7, ‘spi’: 100007, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’oBerwzBoTxlWXQBM’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’xhgeOoMEcVWigfDSwOWwWQrsQcuVKyVEZOQxtjlTTfSsGFPXMJEFXNCBBUtRpxmF’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 9, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100006, ‘n_sa_in’: 1, ‘sa_in’: [6]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 10, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100007, ‘n_sa_in’: 1, ‘sa_in’: [7]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=9)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=10)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=9,flags=1)
sw_interface_set_flags(sw_if_index=10,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x06’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 9, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x07’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 10, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-1t2c-ethip4ipsec8tnlswasync-scheduler- 
ip4base-int-aes128cbc-hmac512sha-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x06x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x07x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’UyPiHirNUFKarrfB’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’nIdlPaEiLYamSZCsNQAqYxyHauAISJhoybZMDwDoHgqVGpKuCDHErsURUCkQwepZ’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’UyPiHirNUFKarrfB’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’nIdlPaEiLYamSZCsNQAqYxyHauAISJhoybZMDwDoHgqVGpKuCDHErsURUCkQwepZ’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’zoUwpUewCiQzpSkI’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’zuYSUPGlomuDQicFgQJgDDjESEoBXysqeaMtPpOekhIFQaLJFZhrJYCKVJnTntxP’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’zoUwpUewCiQzpSkI’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’zuYSUPGlomuDQicFgQJgDDjESEoBXysqeaMtPpOekhIFQaLJFZhrJYCKVJnTntxP’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100006, ‘spi’: 200006, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’vspxlvsBEkqPLsZK’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’ToKLtalYboBELSffHPHRwBysEIzVFghoUViVtWqWMLPAdyYtZfQgooFyCaxwPwDO’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 6, ‘spi’: 100006, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’vspxlvsBEkqPLsZK’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’ToKLtalYboBELSffHPHRwBysEIzVFghoUViVtWqWMLPAdyYtZfQgooFyCaxwPwDO’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100007, ‘spi’: 200007, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’ITevVvUJxAVwEGmC’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’JlyQasqUXtMsdggooBMUPZYpfdjbQWBgJqbzBPIoCpvqBvUBCZvfsVTNWCjCgCcI’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 7, ‘spi’: 100007, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’ITevVvUJxAVwEGmC’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’JlyQasqUXtMsdggooBMUPZYpfdjbQWBgJqbzBPIoCpvqBvUBCZvfsVTNWCjCgCcI’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 9, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100006, ‘n_sa_in’: 1, ‘sa_in’: [6]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 10, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100007, ‘n_sa_in’: 1, ‘sa_in’: [7]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=9)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=10)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=9,flags=1)
sw_interface_set_flags(sw_if_index=10,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x06’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 9, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x07’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 10, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-1t2c-ethip4ipsec8tnlswasync-scheduler- 
ip4base-int-aes128cbc-hmac512sha-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x06x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x07x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’qovEqYJNoiSrYfwr’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’jweJJOGophQtINIpBtjLVqpOlSGsiOJpbamBNQfvWYUhuEZANsJrXEXwnsjfJISz’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’qovEqYJNoiSrYfwr’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’jweJJOGophQtINIpBtjLVqpOlSGsiOJpbamBNQfvWYUhuEZANsJrXEXwnsjfJISz’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’bnNakSFNMiXilast’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’EodJsiojkOuCrmBbWuMtuSceshvKIonOwQQsprNjbgZgGSgTXwpjjngjPMwefTcQ’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’bnNakSFNMiXilast’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’EodJsiojkOuCrmBbWuMtuSceshvKIonOwQQsprNjbgZgGSgTXwpjjngjPMwefTcQ’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100006, ‘spi’: 200006, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’FUekDDTRtJCSlNHX’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’ADCuSluPoFTfrrsAFAoGduRZfHaBQgZfLZLkTjCEhGteEXUwMqlCahZjnJCJMjxh’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 6, ‘spi’: 100006, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’FUekDDTRtJCSlNHX’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’ADCuSluPoFTfrrsAFAoGduRZfHaBQgZfLZLkTjCEhGteEXUwMqlCahZjnJCJMjxh’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100007, ‘spi’: 200007, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’SyIzDetHYXbSCmXC’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’KsbmMnPSPDRtOKHhPOlaIDOlhGLqTmGHDPFJInIZSLCfPZrfKSSiYxYDIWLITroI’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 7, ‘spi’: 100007, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’SyIzDetHYXbSCmXC’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’KsbmMnPSPDRtOKHhPOlaIDOlhGLqTmGHDPFJInIZSLCfPZrfKSSiYxYDIWLITroI’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 9, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100006, ‘n_sa_in’: 1, ‘sa_in’: [6]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 10, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100007, ‘n_sa_in’: 1, ‘sa_in’: [7]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=9)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=10)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=9,flags=1)
sw_interface_set_flags(sw_if_index=10,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x06’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 9, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x07’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 10, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-1t4c-ethip4ipsec8tnlswasync-scheduler- 
ip4base-int-aes128cbc-hmac512sha-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x06x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x07x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’oyXlCuZNTVxxzVem’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’MCNQAJQMZhHnKVJlDjFJQDbOwgNWFbWuozuixVpEUNKTRILHoYMmfxKuWRoiyTqM’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’oyXlCuZNTVxxzVem’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’MCNQAJQMZhHnKVJlDjFJQDbOwgNWFbWuozuixVpEUNKTRILHoYMmfxKuWRoiyTqM’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’mFhwCZXdMugnTqSk’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’SdyyFCPRdlpJQGqXGyRMdUrCtRqvWxfbrduwPdOxTIzxzYTfmYtmZHVwWAYaENuT’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’mFhwCZXdMugnTqSk’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’SdyyFCPRdlpJQGqXGyRMdUrCtRqvWxfbrduwPdOxTIzxzYTfmYtmZHVwWAYaENuT’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100006, ‘spi’: 200006, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’rMnemWNzVTfiDFkV’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’nPxtNnYCBRueJAjtloCkVdzmLFqVYrKBxfQToTNkUaOicebyXpqgspHJhZgjiPdS’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 6, ‘spi’: 100006, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’rMnemWNzVTfiDFkV’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’nPxtNnYCBRueJAjtloCkVdzmLFqVYrKBxfQToTNkUaOicebyXpqgspHJhZgjiPdS’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100007, ‘spi’: 200007, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’AiHLrwXXzYOkAooO’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’jePAydTbfokdzgJNJVXhxznlDKOnBDkOJYXdmfUCYgUWBhAhZjIXtpsURHzKbdTC’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 7, ‘spi’: 100007, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’AiHLrwXXzYOkAooO’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’jePAydTbfokdzgJNJVXhxznlDKOnBDkOJYXdmfUCYgUWBhAhZjIXtpsURHzKbdTC’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 9, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100006, ‘n_sa_in’: 1, ‘sa_in’: [6]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 10, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100007, ‘n_sa_in’: 1, ‘sa_in’: [7]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=9)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=10)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=9,flags=1)
sw_interface_set_flags(sw_if_index=10,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x06’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 9, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x07’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 10, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

10ge2p1x553-ethip4ipsec8tnlswasync-scheduler-ip4base-int-aes128gcm-ndrpdr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular opology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them, run with IPsec async mode and use crypto sw scheduler engine to schedule crypto work to crypto cores. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG verification: TG finds and reports throughput NDR (Non Drop Rate) with zero packet loss tolerance and throughput PDR (Partial Drop Rate) with non-zero packet loss tolerance (LT) expressed in percentage of packets transmitted. NDR and PDR are discovered for different Ethernet L2 frame sizes using MLRsearch library.

Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to umber of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG ode interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 64b-1t2c-ethip4ipsec8tnlswasync-scheduler- 
ip4base-int-aes128gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x06x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x07x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’TFHzHubzAvsVAcQR’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’TFHzHubzAvsVAcQR’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’sLmdsgtGTHdYqiPs’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’sLmdsgtGTHdYqiPs’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100006, ‘spi’: 200006, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’xMjvSfpDLIHyqlcx’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 6, ‘spi’: 100006, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’xMjvSfpDLIHyqlcx’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100007, ‘spi’: 200007, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’LYUrIUIMMAHxfdLX’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 7, ‘spi’: 100007, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’LYUrIUIMMAHxfdLX’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 9, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100006, ‘n_sa_in’: 1, ‘sa_in’: [6]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 10, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100007, ‘n_sa_in’: 1, ‘sa_in’: [7]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=9)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=10)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=9,flags=1)
sw_interface_set_flags(sw_if_index=10,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x06’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 9, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x07’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 10, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 64b-1t4c-ethip4ipsec8tnlswasync-scheduler- 
ip4base-int-aes128gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x06x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x07x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’kIEWnAqnZTABimQG’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’kIEWnAqnZTABimQG’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’wmFqyQAyorABtZZz’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’wmFqyQAyorABtZZz’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100006, ‘spi’: 200006, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’Agrwikgtykigkcjk’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 6, ‘spi’: 100006, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’Agrwikgtykigkcjk’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100007, ‘spi’: 200007, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’lUjQRhsoCzVdJXqN’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 7, ‘spi’: 100007, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’lUjQRhsoCzVdJXqN’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 9, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100006, ‘n_sa_in’: 1, ‘sa_in’: [6]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 10, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100007, ‘n_sa_in’: 1, ‘sa_in’: [7]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=9)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=10)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=9,flags=1)
sw_interface_set_flags(sw_if_index=10,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x06’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 9, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x07’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 10, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-1t2c-ethip4ipsec8tnlswasync-scheduler- 
ip4base-int-aes128gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x06x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x07x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’NbXYqdlNCCkyQiqr’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’NbXYqdlNCCkyQiqr’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’ofOTKQHXwCGEbaFi’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’ofOTKQHXwCGEbaFi’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100006, ‘spi’: 200006, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’vHmzqUgcbAwmLKOc’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 6, ‘spi’: 100006, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’vHmzqUgcbAwmLKOc’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100007, ‘spi’: 200007, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’zucisxxFpvdhqLWm’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 7, ‘spi’: 100007, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’zucisxxFpvdhqLWm’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 9, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100006, ‘n_sa_in’: 1, ‘sa_in’: [6]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 10, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100007, ‘n_sa_in’: 1, ‘sa_in’: [7]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=9)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=10)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=9,flags=1)
sw_interface_set_flags(sw_if_index=10,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x06’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 9, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x07’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 10, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-1t2c-ethip4ipsec8tnlswasync-scheduler- 
ip4base-int-aes128gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x06x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x07x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’LNqdLIHllXfdulcR’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’LNqdLIHllXfdulcR’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’jkwkfpdkElJGhSyf’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’jkwkfpdkElJGhSyf’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100006, ‘spi’: 200006, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’vshWDLsLEkpyFiau’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 6, ‘spi’: 100006, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’vshWDLsLEkpyFiau’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100007, ‘spi’: 200007, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’LOJVLDtdrckmCZQw’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 7, ‘spi’: 100007, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’LOJVLDtdrckmCZQw’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 9, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100006, ‘n_sa_in’: 1, ‘sa_in’: [6]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 10, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100007, ‘n_sa_in’: 1, ‘sa_in’: [7]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=9)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=10)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=9,flags=1)
sw_interface_set_flags(sw_if_index=10,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x06’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 9, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x07’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 10, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-1t4c-ethip4ipsec8tnlswasync-scheduler- 
ip4base-int-aes128gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x06x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x07x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’ZRNDlpIMhJhrZTLX’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’ZRNDlpIMhJhrZTLX’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’LOlhsqOGlQAiMztf’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’LOlhsqOGlQAiMztf’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100006, ‘spi’: 200006, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’cywdMvpaqIMWJukE’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 6, ‘spi’: 100006, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’cywdMvpaqIMWJukE’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100007, ‘spi’: 200007, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’AqlKaWtPiwAXwTZP’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 7, ‘spi’: 100007, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’AqlKaWtPiwAXwTZP’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 9, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100006, ‘n_sa_in’: 1, ‘sa_in’: [6]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 10, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100007, ‘n_sa_in’: 1, ‘sa_in’: [7]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=9)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=10)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=9,flags=1)
sw_interface_set_flags(sw_if_index=10,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x06’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 9, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x07’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 10, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

10ge2p1x553-ethip4ipsec8tnlswasync-scheduler-ip4base-int-aes256gcm-ndrpdr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular opology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them, run with IPsec async mode and use crypto sw scheduler engine to schedule crypto work to crypto cores. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG verification: TG finds and reports throughput NDR (Non Drop Rate) with zero packet loss tolerance and throughput PDR (Partial Drop Rate) with non-zero packet loss tolerance (LT) expressed in percentage of packets transmitted. NDR and PDR are discovered for different Ethernet L2 frame sizes using MLRsearch library.

Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to umber of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG ode interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 64b-1t2c-ethip4ipsec8tnlswasync-scheduler- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x06x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x07x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’RRirahKxVXjtbrNwmIgUMoOcVyHsuDDW’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’RRirahKxVXjtbrNwmIgUMoOcVyHsuDDW’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’mbPkRnZvbAmAVerlvmwDVxUIXrrjxmoV’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’mbPkRnZvbAmAVerlvmwDVxUIXrrjxmoV’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100006, ‘spi’: 200006, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’LIWhYFUmdLyaBtrkAARXqlFLuSWjrpOl’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 6, ‘spi’: 100006, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’LIWhYFUmdLyaBtrkAARXqlFLuSWjrpOl’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100007, ‘spi’: 200007, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’eKZfOxgmcmgnDbFSVpbymEqhpiXHQWCM’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 7, ‘spi’: 100007, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’eKZfOxgmcmgnDbFSVpbymEqhpiXHQWCM’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 9, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100006, ‘n_sa_in’: 1, ‘sa_in’: [6]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 10, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100007, ‘n_sa_in’: 1, ‘sa_in’: [7]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=9)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=10)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=9,flags=1)
sw_interface_set_flags(sw_if_index=10,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x06’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 9, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x07’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 10, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 64b-1t4c-ethip4ipsec8tnlswasync-scheduler- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x06x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x07x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’UsRjsTYAecibfboEkixbhUsSAhcMLfei’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’UsRjsTYAecibfboEkixbhUsSAhcMLfei’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’UENMEoFAZIlSmTOWtJNwcecpNeuGIMfr’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’UENMEoFAZIlSmTOWtJNwcecpNeuGIMfr’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100006, ‘spi’: 200006, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’tOsjTjOAcMVnXjFQsGMiGjyjbKqwXGTN’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 6, ‘spi’: 100006, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’tOsjTjOAcMVnXjFQsGMiGjyjbKqwXGTN’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100007, ‘spi’: 200007, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’ljIatbKQgagGsysvpBcnUbAtONSavAPv’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 7, ‘spi’: 100007, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’ljIatbKQgagGsysvpBcnUbAtONSavAPv’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 9, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100006, ‘n_sa_in’: 1, ‘sa_in’: [6]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 10, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100007, ‘n_sa_in’: 1, ‘sa_in’: [7]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=9)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=10)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=9,flags=1)
sw_interface_set_flags(sw_if_index=10,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x06’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 9, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x07’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 10, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-1t2c-ethip4ipsec8tnlswasync-scheduler- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x06x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x07x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’dIbKNvwHGEfhKJGOwfxXDkoUjCoxvHXO’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’dIbKNvwHGEfhKJGOwfxXDkoUjCoxvHXO’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’ydZmhoeEcuwTFBWWmOdONBCrNmwwbAVv’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’ydZmhoeEcuwTFBWWmOdONBCrNmwwbAVv’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100006, ‘spi’: 200006, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’LItbBjZsmovdhKEUIqVqOLqHgbouIwaH’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 6, ‘spi’: 100006, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’LItbBjZsmovdhKEUIqVqOLqHgbouIwaH’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100007, ‘spi’: 200007, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’luZVgJflMEppykdTbYvOJsySlqrUZxQq’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 7, ‘spi’: 100007, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’luZVgJflMEppykdTbYvOJsySlqrUZxQq’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 9, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100006, ‘n_sa_in’: 1, ‘sa_in’: [6]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 10, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100007, ‘n_sa_in’: 1, ‘sa_in’: [7]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=9)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=10)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=9,flags=1)
sw_interface_set_flags(sw_if_index=10,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x06’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 9, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x07’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 10, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})