3n-dnv-x553

10ge2p1x553-ethip4ipsec1000tnlsw-ip4base-int-aes128cbc-hmac512sha-ndrpdr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular topology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG verification: TG finds and reports throughput NDR (Non Drop Rate) with zero packet loss tolerance and throughput PDR (Partial Drop Rate) with non-zero packet loss tolerance (LT) expressed in percentage of packets transmitted. NDR and PDR are discovered for different Ethernet L2 frame sizes using MLRsearch library.

Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to number of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG node interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 64b-4t4c-ethip4ipsec1000tnlsw-ip4base- 
int-aes128cbc-hmac512sha-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-1t1c-ethip4ipsec1000tnlsw-ip4base- 
int-aes128cbc-hmac512sha-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-2t2c-ethip4ipsec1000tnlsw-ip4base- 
int-aes128cbc-hmac512sha-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-2t2c-ethip4ipsec1000tnlsw-ip4base- 
int-aes128cbc-hmac512sha-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

10ge2p1x553-ethip4ipsec1000tnlsw-ip4base-int-aes128gcm-ndrpdr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular topology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG verification: TG finds and reports throughput NDR (Non Drop Rate) with zero packet loss tolerance and throughput PDR (Partial Drop Rate) with non-zero packet loss tolerance (LT) expressed in percentage of packets transmitted. NDR and PDR are discovered for different Ethernet L2 frame sizes using MLRsearch library.

Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to number of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG node interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 64b-1t1c-ethip4ipsec1000tnlsw- 
ip4base-int-aes128gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 64b-2t2c-ethip4ipsec1000tnlsw- 
ip4base-int-aes128gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 64b-4t4c-ethip4ipsec1000tnlsw- 
ip4base-int-aes128gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-1t1c-ethip4ipsec1000tnlsw- 
ip4base-int-aes128gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-2t2c-ethip4ipsec1000tnlsw- 
ip4base-int-aes128gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

10ge2p1x553-ethip4ipsec1000tnlsw-ip4base-int-aes256gcm-ndrpdr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular topology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG verification: TG finds and reports throughput NDR (Non Drop Rate) with zero packet loss tolerance and throughput PDR (Partial Drop Rate) with non-zero packet loss tolerance (LT) expressed in percentage of packets transmitted. NDR and PDR are discovered for different Ethernet L2 frame sizes using MLRsearch library.

Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to number of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG node interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 64b-2t2c-ethip4ipsec1000tnlsw- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-2t2c-ethip4ipsec1000tnlsw- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-1t1c-ethip4ipsec1000tnlsw- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-2t2c-ethip4ipsec1000tnlsw- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-4t4c-ethip4ipsec1000tnlsw- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

10ge2p1x553-ethip4ipsec1000tnlsw-ip4base-policy-aes256gcm-ndrpdr

IPv4 IPsec tunnel mode performance test suite.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular topology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG verification: TG finds and reports throughput NDR (Non Drop Rate) with zero packet loss tolerance and throughput PDR (Partial Drop Rate) with non-zero packet loss tolerance (LT) expressed in percentage of packets transmitted. NDR and PDR are discovered for different Ethernet L2 frame sizes using MLRsearch library.

Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to number of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG node interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

10ge2p1x553-ethip4ipsec1tnlsw-ip4base-int-aes128cbc-hmac512sha-ndrpdr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular topology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG verification: TG finds and reports throughput NDR (Non Drop Rate) with zero packet loss tolerance and throughput PDR (Partial Drop Rate) with non-zero packet loss tolerance (LT) expressed in percentage of packets transmitted. NDR and PDR are discovered for different Ethernet L2 frame sizes using MLRsearch library.

Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to number of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG node interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 64b-2t2c-ethip4ipsec1tnlsw-ip4base- 
int-aes128cbc-hmac512sha-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00e’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 1, ‘flags’: 1, ‘mac_address’: ‘ac:1f:6b:57:57:fe’, ‘ip_address’: ‘200.0.0.102’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’OwlccdSGlnVBQLZg’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’udJqhUjzZXfClZVIuwoSkrZmQSITqFoJRoVJwqwjgHqhpUzgzxRegvsKApViWTEy’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’OwlccdSGlnVBQLZg’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’udJqhUjzZXfClZVIuwoSkrZmQSITqFoJRoVJwqwjgHqhpUzgzxRegvsKApViWTEy’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_flags(sw_if_index=4,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’OwlccdSGlnVBQLZg’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’udJqhUjzZXfClZVIuwoSkrZmQSITqFoJRoVJwqwjgHqhpUzgzxRegvsKApViWTEy’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’OwlccdSGlnVBQLZg’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’udJqhUjzZXfClZVIuwoSkrZmQSITqFoJRoVJwqwjgHqhpUzgzxRegvsKApViWTEy’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_flags(sw_if_index=3,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 64b-4t4c-ethip4ipsec1tnlsw-ip4base- 
int-aes128cbc-hmac512sha-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00e’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 1, ‘flags’: 1, ‘mac_address’: ‘ac:1f:6b:57:57:fe’, ‘ip_address’: ‘200.0.0.102’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’ZivjuXlGZYRzxfsR’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’kNLrzaIAdiJphvRzLUyLitwWUUWYfWGMyIErcCWEpPqLVJTPwpASnTfPOyVspzEK’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’ZivjuXlGZYRzxfsR’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’kNLrzaIAdiJphvRzLUyLitwWUUWYfWGMyIErcCWEpPqLVJTPwpASnTfPOyVspzEK’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_flags(sw_if_index=4,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’ZivjuXlGZYRzxfsR’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’kNLrzaIAdiJphvRzLUyLitwWUUWYfWGMyIErcCWEpPqLVJTPwpASnTfPOyVspzEK’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’ZivjuXlGZYRzxfsR’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’kNLrzaIAdiJphvRzLUyLitwWUUWYfWGMyIErcCWEpPqLVJTPwpASnTfPOyVspzEK’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_flags(sw_if_index=3,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-1t1c-ethip4ipsec1tnlsw-ip4base- 
int-aes128cbc-hmac512sha-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00e’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 1, ‘flags’: 1, ‘mac_address’: ‘ac:1f:6b:57:57:fe’, ‘ip_address’: ‘200.0.0.102’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’XUDukHRssMdVIZKZ’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’dubCQsSmGoyyQAdLDtaBTwQDRqLJeLnMjLPOEjSVOaBfaLYDESYljLIZqHKYMPiX’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’XUDukHRssMdVIZKZ’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’dubCQsSmGoyyQAdLDtaBTwQDRqLJeLnMjLPOEjSVOaBfaLYDESYljLIZqHKYMPiX’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_flags(sw_if_index=4,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’XUDukHRssMdVIZKZ’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’dubCQsSmGoyyQAdLDtaBTwQDRqLJeLnMjLPOEjSVOaBfaLYDESYljLIZqHKYMPiX’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’XUDukHRssMdVIZKZ’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’dubCQsSmGoyyQAdLDtaBTwQDRqLJeLnMjLPOEjSVOaBfaLYDESYljLIZqHKYMPiX’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_flags(sw_if_index=3,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-4t4c-ethip4ipsec1tnlsw-ip4base- 
int-aes128cbc-hmac512sha-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00e’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 1, ‘flags’: 1, ‘mac_address’: ‘ac:1f:6b:57:57:fe’, ‘ip_address’: ‘200.0.0.102’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’kcXHVHkSBuyhQgLR’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’RQwmzGXYIaEiKwoOjbZShDDyskldSquixySgngBDrodyudtRVvJdbVtILZHFmVEp’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’kcXHVHkSBuyhQgLR’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’RQwmzGXYIaEiKwoOjbZShDDyskldSquixySgngBDrodyudtRVvJdbVtILZHFmVEp’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_flags(sw_if_index=4,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’kcXHVHkSBuyhQgLR’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’RQwmzGXYIaEiKwoOjbZShDDyskldSquixySgngBDrodyudtRVvJdbVtILZHFmVEp’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’kcXHVHkSBuyhQgLR’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’RQwmzGXYIaEiKwoOjbZShDDyskldSquixySgngBDrodyudtRVvJdbVtILZHFmVEp’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_flags(sw_if_index=3,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

10ge2p1x553-ethip4ipsec1tnlsw-ip4base-int-aes128gcm-ndrpdr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular topology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG verification: TG finds and reports throughput NDR (Non Drop Rate) with zero packet loss tolerance and throughput PDR (Partial Drop Rate) with non-zero packet loss tolerance (LT) expressed in percentage of packets transmitted. NDR and PDR are discovered for different Ethernet L2 frame sizes using MLRsearch library.

Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to number of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG node interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 64b-1t1c-ethip4ipsec1tnlsw- 
ip4base-int-aes128gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00e’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 1, ‘flags’: 1, ‘mac_address’: ‘ac:1f:6b:57:57:fe’, ‘ip_address’: ‘200.0.0.102’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’gLNeBydZDXkzGmWa’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’gLNeBydZDXkzGmWa’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_flags(sw_if_index=4,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’gLNeBydZDXkzGmWa’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’gLNeBydZDXkzGmWa’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_flags(sw_if_index=3,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 64b-2t2c-ethip4ipsec1tnlsw- 
ip4base-int-aes128gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00e’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 1, ‘flags’: 1, ‘mac_address’: ‘ac:1f:6b:57:57:fe’, ‘ip_address’: ‘200.0.0.102’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’rFxRqvkmSAKGlGZu’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’rFxRqvkmSAKGlGZu’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_flags(sw_if_index=4,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’rFxRqvkmSAKGlGZu’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’rFxRqvkmSAKGlGZu’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_flags(sw_if_index=3,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-2t2c-ethip4ipsec1tnlsw- 
ip4base-int-aes128gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00e’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 1, ‘flags’: 1, ‘mac_address’: ‘ac:1f:6b:57:57:fe’, ‘ip_address’: ‘200.0.0.102’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’EBSlyNspouMjqUAO’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’EBSlyNspouMjqUAO’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_flags(sw_if_index=4,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’EBSlyNspouMjqUAO’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’EBSlyNspouMjqUAO’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_flags(sw_if_index=3,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-2t2c-ethip4ipsec1tnlsw- 
ip4base-int-aes128gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00e’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 1, ‘flags’: 1, ‘mac_address’: ‘ac:1f:6b:57:57:fe’, ‘ip_address’: ‘200.0.0.102’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’ZzUoLtBAkKnlXkzN’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’ZzUoLtBAkKnlXkzN’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_flags(sw_if_index=4,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’ZzUoLtBAkKnlXkzN’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’ZzUoLtBAkKnlXkzN’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_flags(sw_if_index=3,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

10ge2p1x553-ethip4ipsec1tnlsw-ip4base-int-aes256gcm-ndrpdr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular topology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG verification: TG finds and reports throughput NDR (Non Drop Rate) with zero packet loss tolerance and throughput PDR (Partial Drop Rate) with non-zero packet loss tolerance (LT) expressed in percentage of packets transmitted. NDR and PDR are discovered for different Ethernet L2 frame sizes using MLRsearch library.

Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to number of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG node interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 64b-1t1c-ethip4ipsec1tnlsw- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00e’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 1, ‘flags’: 1, ‘mac_address’: ‘ac:1f:6b:57:57:fe’, ‘ip_address’: ‘200.0.0.102’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’uhqhHmtIEzGiAFbkFyKccWWCgvGJYbqP’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’uhqhHmtIEzGiAFbkFyKccWWCgvGJYbqP’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_flags(sw_if_index=4,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’uhqhHmtIEzGiAFbkFyKccWWCgvGJYbqP’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’uhqhHmtIEzGiAFbkFyKccWWCgvGJYbqP’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_flags(sw_if_index=3,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 64b-2t2c-ethip4ipsec1tnlsw- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00e’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 1, ‘flags’: 1, ‘mac_address’: ‘ac:1f:6b:57:57:fe’, ‘ip_address’: ‘200.0.0.102’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’cdUeLDvejwiAbFHTZpHiYODVDIoCoHkI’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’cdUeLDvejwiAbFHTZpHiYODVDIoCoHkI’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_flags(sw_if_index=4,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’cdUeLDvejwiAbFHTZpHiYODVDIoCoHkI’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’cdUeLDvejwiAbFHTZpHiYODVDIoCoHkI’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_flags(sw_if_index=3,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 64b-4t4c-ethip4ipsec1tnlsw- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00e’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 1, ‘flags’: 1, ‘mac_address’: ‘ac:1f:6b:57:57:fe’, ‘ip_address’: ‘200.0.0.102’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’OlWDNrkwhtYfiGPVWEzTLscfAhUCFZGk’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’OlWDNrkwhtYfiGPVWEzTLscfAhUCFZGk’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_flags(sw_if_index=4,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’OlWDNrkwhtYfiGPVWEzTLscfAhUCFZGk’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’OlWDNrkwhtYfiGPVWEzTLscfAhUCFZGk’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_flags(sw_if_index=3,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-1t1c-ethip4ipsec1tnlsw- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00e’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 1, ‘flags’: 1, ‘mac_address’: ‘ac:1f:6b:57:57:fe’, ‘ip_address’: ‘200.0.0.102’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’YYRcnlsHhqSPgWDlCDuEWcVXihEzJcwc’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’YYRcnlsHhqSPgWDlCDuEWcVXihEzJcwc’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_flags(sw_if_index=4,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’YYRcnlsHhqSPgWDlCDuEWcVXihEzJcwc’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’YYRcnlsHhqSPgWDlCDuEWcVXihEzJcwc’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_flags(sw_if_index=3,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-4t4c-ethip4ipsec1tnlsw- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00e’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 1, ‘flags’: 1, ‘mac_address’: ‘ac:1f:6b:57:57:fe’, ‘ip_address’: ‘200.0.0.102’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’PVTWWdBQUTXjreFkkkppWloxyBExXaFh’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’PVTWWdBQUTXjreFkkkppWloxyBExXaFh’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_flags(sw_if_index=4,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’PVTWWdBQUTXjreFkkkppWloxyBExXaFh’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’PVTWWdBQUTXjreFkkkppWloxyBExXaFh’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_flags(sw_if_index=3,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

10ge2p1x553-ethip4ipsec1tnlsw-ip4base-policy-aes256gcm-ndrpdr

IPv4 IPsec tunnel mode performance test suite.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular topology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG verification: TG finds and reports throughput NDR (Non Drop Rate) with zero packet loss tolerance and throughput PDR (Partial Drop Rate) with non-zero packet loss tolerance (LT) expressed in percentage of packets transmitted. NDR and PDR are discovered for different Ethernet L2 frame sizes using MLRsearch library.

Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to number of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG node interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 64b-1t1c-ethip4ipsec1tnlsw- 
ip4base-policy-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00f’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00f’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘ac:1f:6b:57:57:fe’, ‘ip_address’: IPv4Address(‘200.0.0.102’)})
ipsec_spd_add_del(is_add=True,spd_id=1)
ipsec_interface_add_del_spd(is_add=True,sw_if_index=1,spd_id=1)
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 100, ‘is_outbound’: True, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 50, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8xffxffxff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’dxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 100, ‘is_outbound’: False, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 50, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’dxffxffxff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8xffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 300000, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’FKgFVonNZtFWIDbFmljpMtoIkPesetQf’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: 0}, ‘flags’: 4, ‘tunnel’: {‘src’: ‘100.0.0.1’, ‘dst’: ‘200.0.0.102’, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘protocol’: 50, ‘udp_src_port’: 4500, ‘udp_dst_port’: 4500})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 10, ‘is_outbound’: True, ‘sa_id’: 100000, ‘policy’: 3, ‘protocol’: 0, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x00x00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xffxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 200000, ‘spi’: 400000, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’FKgFVonNZtFWIDbFmljpMtoIkPesetQf’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: 0}, ‘flags’: 4, ‘tunnel’: {‘src’: ‘200.0.0.102’, ‘dst’: ‘100.0.0.1’, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘protocol’: 50, ‘udp_src_port’: 4500, ‘udp_dst_port’: 4500})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 10, ‘is_outbound’: False, ‘sa_id’: 200000, ‘policy’: 3, ‘protocol’: 0, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x00x00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xffxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’dx00x00x01’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’dx00x00x01’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘ac:1f:6b:57:56:c6’, ‘ip_address’: IPv4Address(‘100.0.0.1’)})
ipsec_spd_add_del(is_add=True,spd_id=1)
ipsec_interface_add_del_spd(is_add=True,sw_if_index=1,spd_id=1)
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 100, ‘is_outbound’: True, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 50, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’dxffxffxff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8xffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 100, ‘is_outbound’: False, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 50, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8xffxffxff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’dxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 300000, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’FKgFVonNZtFWIDbFmljpMtoIkPesetQf’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: 0}, ‘flags’: 4, ‘tunnel’: {‘src’: ‘100.0.0.1’, ‘dst’: ‘200.0.0.102’, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘protocol’: 50, ‘udp_src_port’: 4500, ‘udp_dst_port’: 4500})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 10, ‘is_outbound’: False, ‘sa_id’: 100000, ‘policy’: 3, ‘protocol’: 0, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x00x00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xffxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 200000, ‘spi’: 400000, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’FKgFVonNZtFWIDbFmljpMtoIkPesetQf’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: 0}, ‘flags’: 4, ‘tunnel’: {‘src’: ‘200.0.0.102’, ‘dst’: ‘100.0.0.1’, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘protocol’: 50, ‘udp_src_port’: 4500, ‘udp_dst_port’: 4500})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 10, ‘is_outbound’: True, ‘sa_id’: 200000, ‘policy’: 3, ‘protocol’: 0, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x00x00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xffxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})

 64b-2t2c-ethip4ipsec1tnlsw- 
ip4base-policy-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00f’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00f’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘ac:1f:6b:57:57:fe’, ‘ip_address’: IPv4Address(‘200.0.0.102’)})
ipsec_spd_add_del(is_add=True,spd_id=1)
ipsec_interface_add_del_spd(is_add=True,sw_if_index=1,spd_id=1)
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 100, ‘is_outbound’: True, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 50, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8xffxffxff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’dxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 100, ‘is_outbound’: False, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 50, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’dxffxffxff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8xffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 300000, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’uzisxfRLqXBnvtvrLLYbrffkiUrDsUWn’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: 0}, ‘flags’: 4, ‘tunnel’: {‘src’: ‘100.0.0.1’, ‘dst’: ‘200.0.0.102’, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘protocol’: 50, ‘udp_src_port’: 4500, ‘udp_dst_port’: 4500})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 10, ‘is_outbound’: True, ‘sa_id’: 100000, ‘policy’: 3, ‘protocol’: 0, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x00x00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xffxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 200000, ‘spi’: 400000, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’uzisxfRLqXBnvtvrLLYbrffkiUrDsUWn’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: 0}, ‘flags’: 4, ‘tunnel’: {‘src’: ‘200.0.0.102’, ‘dst’: ‘100.0.0.1’, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘protocol’: 50, ‘udp_src_port’: 4500, ‘udp_dst_port’: 4500})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 10, ‘is_outbound’: False, ‘sa_id’: 200000, ‘policy’: 3, ‘protocol’: 0, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x00x00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xffxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’dx00x00x01’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’dx00x00x01’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘ac:1f:6b:57:56:c6’, ‘ip_address’: IPv4Address(‘100.0.0.1’)})
ipsec_spd_add_del(is_add=True,spd_id=1)
ipsec_interface_add_del_spd(is_add=True,sw_if_index=1,spd_id=1)
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 100, ‘is_outbound’: True, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 50, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’dxffxffxff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8xffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 100, ‘is_outbound’: False, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 50, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8xffxffxff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’dxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 300000, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’uzisxfRLqXBnvtvrLLYbrffkiUrDsUWn’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: 0}, ‘flags’: 4, ‘tunnel’: {‘src’: ‘100.0.0.1’, ‘dst’: ‘200.0.0.102’, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘protocol’: 50, ‘udp_src_port’: 4500, ‘udp_dst_port’: 4500})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 10, ‘is_outbound’: False, ‘sa_id’: 100000, ‘policy’: 3, ‘protocol’: 0, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x00x00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xffxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 200000, ‘spi’: 400000, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’uzisxfRLqXBnvtvrLLYbrffkiUrDsUWn’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: 0}, ‘flags’: 4, ‘tunnel’: {‘src’: ‘200.0.0.102’, ‘dst’: ‘100.0.0.1’, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘protocol’: 50, ‘udp_src_port’: 4500, ‘udp_dst_port’: 4500})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 10, ‘is_outbound’: True, ‘sa_id’: 200000, ‘policy’: 3, ‘protocol’: 0, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x00x00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xffxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})

 64b-4t4c-ethip4ipsec1tnlsw- 
ip4base-policy-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00f’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00f’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘ac:1f:6b:57:57:fe’, ‘ip_address’: IPv4Address(‘200.0.0.102’)})
ipsec_spd_add_del(is_add=True,spd_id=1)
ipsec_interface_add_del_spd(is_add=True,sw_if_index=1,spd_id=1)
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 100, ‘is_outbound’: True, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 50, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8xffxffxff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’dxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 100, ‘is_outbound’: False, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 50, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’dxffxffxff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8xffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 300000, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’ylNKMlroIrFDykzMJnZvSQkJwjSorDWM’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: 0}, ‘flags’: 4, ‘tunnel’: {‘src’: ‘100.0.0.1’, ‘dst’: ‘200.0.0.102’, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘protocol’: 50, ‘udp_src_port’: 4500, ‘udp_dst_port’: 4500})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 10, ‘is_outbound’: True, ‘sa_id’: 100000, ‘policy’: 3, ‘protocol’: 0, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x00x00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xffxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 200000, ‘spi’: 400000, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’ylNKMlroIrFDykzMJnZvSQkJwjSorDWM’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: 0}, ‘flags’: 4, ‘tunnel’: {‘src’: ‘200.0.0.102’, ‘dst’: ‘100.0.0.1’, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘protocol’: 50, ‘udp_src_port’: 4500, ‘udp_dst_port’: 4500})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 10, ‘is_outbound’: False, ‘sa_id’: 200000, ‘policy’: 3, ‘protocol’: 0, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x00x00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xffxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’dx00x00x01’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’dx00x00x01’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘ac:1f:6b:57:56:c6’, ‘ip_address’: IPv4Address(‘100.0.0.1’)})
ipsec_spd_add_del(is_add=True,spd_id=1)
ipsec_interface_add_del_spd(is_add=True,sw_if_index=1,spd_id=1)
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 100, ‘is_outbound’: True, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 50, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’dxffxffxff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8xffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 100, ‘is_outbound’: False, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 50, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8xffxffxff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’dxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 300000, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’ylNKMlroIrFDykzMJnZvSQkJwjSorDWM’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: 0}, ‘flags’: 4, ‘tunnel’: {‘src’: ‘100.0.0.1’, ‘dst’: ‘200.0.0.102’, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘protocol’: 50, ‘udp_src_port’: 4500, ‘udp_dst_port’: 4500})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 10, ‘is_outbound’: False, ‘sa_id’: 100000, ‘policy’: 3, ‘protocol’: 0, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x00x00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xffxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 200000, ‘spi’: 400000, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’ylNKMlroIrFDykzMJnZvSQkJwjSorDWM’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: 0}, ‘flags’: 4, ‘tunnel’: {‘src’: ‘200.0.0.102’, ‘dst’: ‘100.0.0.1’, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘protocol’: 50, ‘udp_src_port’: 4500, ‘udp_dst_port’: 4500})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 10, ‘is_outbound’: True, ‘sa_id’: 200000, ‘policy’: 3, ‘protocol’: 0, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x00x00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xffxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})

 1518b-1t1c-ethip4ipsec1tnlsw- 
ip4base-policy-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00f’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00f’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘ac:1f:6b:57:57:fe’, ‘ip_address’: IPv4Address(‘200.0.0.102’)})
ipsec_spd_add_del(is_add=True,spd_id=1)
ipsec_interface_add_del_spd(is_add=True,sw_if_index=1,spd_id=1)
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 100, ‘is_outbound’: True, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 50, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8xffxffxff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’dxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 100, ‘is_outbound’: False, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 50, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’dxffxffxff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8xffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 300000, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’IqQgtcWekhfVXZjcvlQGubiXmoyhdNAw’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: 0}, ‘flags’: 4, ‘tunnel’: {‘src’: ‘100.0.0.1’, ‘dst’: ‘200.0.0.102’, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘protocol’: 50, ‘udp_src_port’: 4500, ‘udp_dst_port’: 4500})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 10, ‘is_outbound’: True, ‘sa_id’: 100000, ‘policy’: 3, ‘protocol’: 0, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x00x00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xffxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 200000, ‘spi’: 400000, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’IqQgtcWekhfVXZjcvlQGubiXmoyhdNAw’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: 0}, ‘flags’: 4, ‘tunnel’: {‘src’: ‘200.0.0.102’, ‘dst’: ‘100.0.0.1’, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘protocol’: 50, ‘udp_src_port’: 4500, ‘udp_dst_port’: 4500})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 10, ‘is_outbound’: False, ‘sa_id’: 200000, ‘policy’: 3, ‘protocol’: 0, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x00x00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xffxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’dx00x00x01’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’dx00x00x01’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘ac:1f:6b:57:56:c6’, ‘ip_address’: IPv4Address(‘100.0.0.1’)})
ipsec_spd_add_del(is_add=True,spd_id=1)
ipsec_interface_add_del_spd(is_add=True,sw_if_index=1,spd_id=1)
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 100, ‘is_outbound’: True, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 50, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’dxffxffxff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8xffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 100, ‘is_outbound’: False, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 50, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8xffxffxff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’dxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 300000, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’IqQgtcWekhfVXZjcvlQGubiXmoyhdNAw’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: 0}, ‘flags’: 4, ‘tunnel’: {‘src’: ‘100.0.0.1’, ‘dst’: ‘200.0.0.102’, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘protocol’: 50, ‘udp_src_port’: 4500, ‘udp_dst_port’: 4500})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 10, ‘is_outbound’: False, ‘sa_id’: 100000, ‘policy’: 3, ‘protocol’: 0, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x00x00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xffxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 200000, ‘spi’: 400000, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’IqQgtcWekhfVXZjcvlQGubiXmoyhdNAw’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: 0}, ‘flags’: 4, ‘tunnel’: {‘src’: ‘200.0.0.102’, ‘dst’: ‘100.0.0.1’, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘protocol’: 50, ‘udp_src_port’: 4500, ‘udp_dst_port’: 4500})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 10, ‘is_outbound’: True, ‘sa_id’: 200000, ‘policy’: 3, ‘protocol’: 0, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x00x00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xffxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})

 imix-1t1c-ethip4ipsec1tnlsw- 
ip4base-policy-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00f’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00f’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘ac:1f:6b:57:57:fe’, ‘ip_address’: IPv4Address(‘200.0.0.102’)})
ipsec_spd_add_del(is_add=True,spd_id=1)
ipsec_interface_add_del_spd(is_add=True,sw_if_index=1,spd_id=1)
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 100, ‘is_outbound’: True, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 50, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8xffxffxff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’dxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 100, ‘is_outbound’: False, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 50, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’dxffxffxff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8xffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 300000, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’GxTenJsukVvoOqvXhXCrwKEUJJJjHIqW’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: 0}, ‘flags’: 4, ‘tunnel’: {‘src’: ‘100.0.0.1’, ‘dst’: ‘200.0.0.102’, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘protocol’: 50, ‘udp_src_port’: 4500, ‘udp_dst_port’: 4500})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 10, ‘is_outbound’: True, ‘sa_id’: 100000, ‘policy’: 3, ‘protocol’: 0, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x00x00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xffxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 200000, ‘spi’: 400000, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’GxTenJsukVvoOqvXhXCrwKEUJJJjHIqW’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: 0}, ‘flags’: 4, ‘tunnel’: {‘src’: ‘200.0.0.102’, ‘dst’: ‘100.0.0.1’, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘protocol’: 50, ‘udp_src_port’: 4500, ‘udp_dst_port’: 4500})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 10, ‘is_outbound’: False, ‘sa_id’: 200000, ‘policy’: 3, ‘protocol’: 0, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x00x00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xffxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’dx00x00x01’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’dx00x00x01’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘ac:1f:6b:57:56:c6’, ‘ip_address’: IPv4Address(‘100.0.0.1’)})
ipsec_spd_add_del(is_add=True,spd_id=1)
ipsec_interface_add_del_spd(is_add=True,sw_if_index=1,spd_id=1)
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 100, ‘is_outbound’: True, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 50, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’dxffxffxff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8xffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 100, ‘is_outbound’: False, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 50, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8xffxffxff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’dxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 300000, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’GxTenJsukVvoOqvXhXCrwKEUJJJjHIqW’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: 0}, ‘flags’: 4, ‘tunnel’: {‘src’: ‘100.0.0.1’, ‘dst’: ‘200.0.0.102’, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘protocol’: 50, ‘udp_src_port’: 4500, ‘udp_dst_port’: 4500})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 10, ‘is_outbound’: False, ‘sa_id’: 100000, ‘policy’: 3, ‘protocol’: 0, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x00x00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xffxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 200000, ‘spi’: 400000, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’GxTenJsukVvoOqvXhXCrwKEUJJJjHIqW’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: 0}, ‘flags’: 4, ‘tunnel’: {‘src’: ‘200.0.0.102’, ‘dst’: ‘100.0.0.1’, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘protocol’: 50, ‘udp_src_port’: 4500, ‘udp_dst_port’: 4500})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 10, ‘is_outbound’: True, ‘sa_id’: 200000, ‘policy’: 3, ‘protocol’: 0, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x00x00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xffxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})

 imix-2t2c-ethip4ipsec1tnlsw- 
ip4base-policy-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00f’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00f’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘ac:1f:6b:57:57:fe’, ‘ip_address’: IPv4Address(‘200.0.0.102’)})
ipsec_spd_add_del(is_add=True,spd_id=1)
ipsec_interface_add_del_spd(is_add=True,sw_if_index=1,spd_id=1)
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 100, ‘is_outbound’: True, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 50, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8xffxffxff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’dxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 100, ‘is_outbound’: False, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 50, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’dxffxffxff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8xffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 300000, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’QrJXVqyIqVxtZDkHvZAwUOjUFrGfYasA’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: 0}, ‘flags’: 4, ‘tunnel’: {‘src’: ‘100.0.0.1’, ‘dst’: ‘200.0.0.102’, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘protocol’: 50, ‘udp_src_port’: 4500, ‘udp_dst_port’: 4500})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 10, ‘is_outbound’: True, ‘sa_id’: 100000, ‘policy’: 3, ‘protocol’: 0, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x00x00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xffxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 200000, ‘spi’: 400000, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’QrJXVqyIqVxtZDkHvZAwUOjUFrGfYasA’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: 0}, ‘flags’: 4, ‘tunnel’: {‘src’: ‘200.0.0.102’, ‘dst’: ‘100.0.0.1’, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘protocol’: 50, ‘udp_src_port’: 4500, ‘udp_dst_port’: 4500})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 10, ‘is_outbound’: False, ‘sa_id’: 200000, ‘policy’: 3, ‘protocol’: 0, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x00x00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xffxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’dx00x00x01’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’dx00x00x01’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘ac:1f:6b:57:56:c6’, ‘ip_address’: IPv4Address(‘100.0.0.1’)})
ipsec_spd_add_del(is_add=True,spd_id=1)
ipsec_interface_add_del_spd(is_add=True,sw_if_index=1,spd_id=1)
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 100, ‘is_outbound’: True, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 50, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’dxffxffxff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8xffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 100, ‘is_outbound’: False, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 50, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8xffxffxff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’dxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 300000, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’QrJXVqyIqVxtZDkHvZAwUOjUFrGfYasA’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: 0}, ‘flags’: 4, ‘tunnel’: {‘src’: ‘100.0.0.1’, ‘dst’: ‘200.0.0.102’, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘protocol’: 50, ‘udp_src_port’: 4500, ‘udp_dst_port’: 4500})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 10, ‘is_outbound’: False, ‘sa_id’: 100000, ‘policy’: 3, ‘protocol’: 0, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x00x00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xffxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 200000, ‘spi’: 400000, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’QrJXVqyIqVxtZDkHvZAwUOjUFrGfYasA’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: 0}, ‘flags’: 4, ‘tunnel’: {‘src’: ‘200.0.0.102’, ‘dst’: ‘100.0.0.1’, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘protocol’: 50, ‘udp_src_port’: 4500, ‘udp_dst_port’: 4500})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 10, ‘is_outbound’: True, ‘sa_id’: 200000, ‘policy’: 3, ‘protocol’: 0, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x00x00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xffxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})

 imix-4t4c-ethip4ipsec1tnlsw- 
ip4base-policy-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00f’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00f’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘ac:1f:6b:57:57:fe’, ‘ip_address’: IPv4Address(‘200.0.0.102’)})
ipsec_spd_add_del(is_add=True,spd_id=1)
ipsec_interface_add_del_spd(is_add=True,sw_if_index=1,spd_id=1)
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 100, ‘is_outbound’: True, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 50, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8xffxffxff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’dxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 100, ‘is_outbound’: False, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 50, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’dxffxffxff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8xffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 300000, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’lXsKjpiVbBgBRkdMAFXXTXONkZOxbIzl’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: 0}, ‘flags’: 4, ‘tunnel’: {‘src’: ‘100.0.0.1’, ‘dst’: ‘200.0.0.102’, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘protocol’: 50, ‘udp_src_port’: 4500, ‘udp_dst_port’: 4500})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 10, ‘is_outbound’: True, ‘sa_id’: 100000, ‘policy’: 3, ‘protocol’: 0, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x00x00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xffxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 200000, ‘spi’: 400000, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’lXsKjpiVbBgBRkdMAFXXTXONkZOxbIzl’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: 0}, ‘flags’: 4, ‘tunnel’: {‘src’: ‘200.0.0.102’, ‘dst’: ‘100.0.0.1’, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘protocol’: 50, ‘udp_src_port’: 4500, ‘udp_dst_port’: 4500})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 10, ‘is_outbound’: False, ‘sa_id’: 200000, ‘policy’: 3, ‘protocol’: 0, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x00x00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xffxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’dx00x00x01’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’dx00x00x01’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘ac:1f:6b:57:56:c6’, ‘ip_address’: IPv4Address(‘100.0.0.1’)})
ipsec_spd_add_del(is_add=True,spd_id=1)
ipsec_interface_add_del_spd(is_add=True,sw_if_index=1,spd_id=1)
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 100, ‘is_outbound’: True, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 50, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’dxffxffxff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8xffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 100, ‘is_outbound’: False, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 50, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8xffxffxff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’dxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 300000, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’lXsKjpiVbBgBRkdMAFXXTXONkZOxbIzl’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: 0}, ‘flags’: 4, ‘tunnel’: {‘src’: ‘100.0.0.1’, ‘dst’: ‘200.0.0.102’, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘protocol’: 50, ‘udp_src_port’: 4500, ‘udp_dst_port’: 4500})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 10, ‘is_outbound’: False, ‘sa_id’: 100000, ‘policy’: 3, ‘protocol’: 0, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x00x00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xffxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 200000, ‘spi’: 400000, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’lXsKjpiVbBgBRkdMAFXXTXONkZOxbIzl’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: 0}, ‘flags’: 4, ‘tunnel’: {‘src’: ‘200.0.0.102’, ‘dst’: ‘100.0.0.1’, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘protocol’: 50, ‘udp_src_port’: 4500, ‘udp_dst_port’: 4500})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 10, ‘is_outbound’: True, ‘sa_id’: 200000, ‘policy’: 3, ‘protocol’: 0, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x00x00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xffxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})

10ge2p1x553-ethip4ipsec1tnlswasync-scheduler-ip4base-int-aes128cbc-hmac512sha-ndrpdr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular topology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them, run with IPsec async mode and use crypto sw scheduler engine to schedule crypto work to crypto cores. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG verification: TG finds and reports throughput NDR (Non Drop Rate) with zero packet loss tolerance and throughput PDR (Partial Drop Rate) with non-zero packet loss tolerance (LT) expressed in percentage of packets transmitted. NDR and PDR are discovered for different Ethernet L2 frame sizes using MLRsearch library.

Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to number of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG node interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 64b-1t2c-ethip4ipsec1tnlswasync-scheduler- 
ip4base-int-aes128cbc-hmac512sha-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00e’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 1, ‘flags’: 1, ‘mac_address’: ‘ac:1f:6b:57:57:fe’, ‘ip_address’: ‘200.0.0.102’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’wdHgpuIrAsBADJTu’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’glsNcnCReGCsgQMvqAeMWlCHiHgEWEmxDPvwnrivYbVnNiMmqKHSFaZzHxjoHiGD’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’wdHgpuIrAsBADJTu’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’glsNcnCReGCsgQMvqAeMWlCHiHgEWEmxDPvwnrivYbVnNiMmqKHSFaZzHxjoHiGD’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_flags(sw_if_index=4,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’wdHgpuIrAsBADJTu’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’glsNcnCReGCsgQMvqAeMWlCHiHgEWEmxDPvwnrivYbVnNiMmqKHSFaZzHxjoHiGD’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’wdHgpuIrAsBADJTu’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’glsNcnCReGCsgQMvqAeMWlCHiHgEWEmxDPvwnrivYbVnNiMmqKHSFaZzHxjoHiGD’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_flags(sw_if_index=3,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 64b-1t4c-ethip4ipsec1tnlswasync-scheduler- 
ip4base-int-aes128cbc-hmac512sha-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00e’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 1, ‘flags’: 1, ‘mac_address’: ‘ac:1f:6b:57:57:fe’, ‘ip_address’: ‘200.0.0.102’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’KgFkEtQmFsuqxiFb’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’BSpdcZcWfxXZUMACytmIwrjXXQRsJYhHZVmGwVdWyMlPRSwWkrUloJgZrCTBINfL’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’KgFkEtQmFsuqxiFb’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’BSpdcZcWfxXZUMACytmIwrjXXQRsJYhHZVmGwVdWyMlPRSwWkrUloJgZrCTBINfL’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_flags(sw_if_index=4,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’KgFkEtQmFsuqxiFb’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’BSpdcZcWfxXZUMACytmIwrjXXQRsJYhHZVmGwVdWyMlPRSwWkrUloJgZrCTBINfL’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’KgFkEtQmFsuqxiFb’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’BSpdcZcWfxXZUMACytmIwrjXXQRsJYhHZVmGwVdWyMlPRSwWkrUloJgZrCTBINfL’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_flags(sw_if_index=3,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-1t2c-ethip4ipsec1tnlswasync-scheduler- 
ip4base-int-aes128cbc-hmac512sha-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00e’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 1, ‘flags’: 1, ‘mac_address’: ‘ac:1f:6b:57:57:fe’, ‘ip_address’: ‘200.0.0.102’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’sBhjxGIUjusMBzfm’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’TjvEFNwyuxrUEfUQGiXhEUVgGRgkPIveaoTsBDDcOnkBuCWRibHcazXzwQmvmYXZ’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’sBhjxGIUjusMBzfm’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’TjvEFNwyuxrUEfUQGiXhEUVgGRgkPIveaoTsBDDcOnkBuCWRibHcazXzwQmvmYXZ’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_flags(sw_if_index=4,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’sBhjxGIUjusMBzfm’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’TjvEFNwyuxrUEfUQGiXhEUVgGRgkPIveaoTsBDDcOnkBuCWRibHcazXzwQmvmYXZ’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’sBhjxGIUjusMBzfm’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’TjvEFNwyuxrUEfUQGiXhEUVgGRgkPIveaoTsBDDcOnkBuCWRibHcazXzwQmvmYXZ’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_flags(sw_if_index=3,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-1t4c-ethip4ipsec1tnlswasync-scheduler- 
ip4base-int-aes128cbc-hmac512sha-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00e’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 1, ‘flags’: 1, ‘mac_address’: ‘ac:1f:6b:57:57:fe’, ‘ip_address’: ‘200.0.0.102’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’UduZhVWmpaKgoKED’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’MdAyqpPLuuPUlYRNGydBRjfDvsKYIcZfWzowdEfKuOXiPIIFUnBtpwGCOnnRmTcb’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’UduZhVWmpaKgoKED’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’MdAyqpPLuuPUlYRNGydBRjfDvsKYIcZfWzowdEfKuOXiPIIFUnBtpwGCOnnRmTcb’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_flags(sw_if_index=4,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’UduZhVWmpaKgoKED’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’MdAyqpPLuuPUlYRNGydBRjfDvsKYIcZfWzowdEfKuOXiPIIFUnBtpwGCOnnRmTcb’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’UduZhVWmpaKgoKED’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’MdAyqpPLuuPUlYRNGydBRjfDvsKYIcZfWzowdEfKuOXiPIIFUnBtpwGCOnnRmTcb’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_flags(sw_if_index=3,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

10ge2p1x553-ethip4ipsec1tnlswasync-scheduler-ip4base-int-aes128gcm-ndrpdr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular topology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them, run with IPsec async mode and use crypto sw scheduler engine to schedule crypto work to crypto cores. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG verification: TG finds and reports throughput NDR (Non Drop Rate) with zero packet loss tolerance and throughput PDR (Partial Drop Rate) with non-zero packet loss tolerance (LT) expressed in percentage of packets transmitted. NDR and PDR are discovered for different Ethernet L2 frame sizes using MLRsearch library.

Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to number of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG node interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 64b-1t2c-ethip4ipsec1tnlswasync-scheduler- 
ip4base-int-aes128gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00e’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 1, ‘flags’: 1, ‘mac_address’: ‘ac:1f:6b:57:57:fe’, ‘ip_address’: ‘200.0.0.102’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’pBsYcmxmKWZUqhZJ’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’pBsYcmxmKWZUqhZJ’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_flags(sw_if_index=4,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’pBsYcmxmKWZUqhZJ’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’pBsYcmxmKWZUqhZJ’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_flags(sw_if_index=3,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 64b-1t4c-ethip4ipsec1tnlswasync-scheduler- 
ip4base-int-aes128gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00e’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 1, ‘flags’: 1, ‘mac_address’: ‘ac:1f:6b:57:57:fe’, ‘ip_address’: ‘200.0.0.102’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’uOXiNBIjufJjzXhH’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’uOXiNBIjufJjzXhH’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_flags(sw_if_index=4,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’uOXiNBIjufJjzXhH’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’uOXiNBIjufJjzXhH’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_flags(sw_if_index=3,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-1t2c-ethip4ipsec1tnlswasync-scheduler- 
ip4base-int-aes128gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00e’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 1, ‘flags’: 1, ‘mac_address’: ‘ac:1f:6b:57:57:fe’, ‘ip_address’: ‘200.0.0.102’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’flhAFVdbYXAzgSjM’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’flhAFVdbYXAzgSjM’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_flags(sw_if_index=4,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’flhAFVdbYXAzgSjM’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’flhAFVdbYXAzgSjM’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_flags(sw_if_index=3,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-1t4c-ethip4ipsec1tnlswasync-scheduler- 
ip4base-int-aes128gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00e’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 1, ‘flags’: 1, ‘mac_address’: ‘ac:1f:6b:57:57:fe’, ‘ip_address’: ‘200.0.0.102’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’kiJICsYLnUCeLaMB’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’kiJICsYLnUCeLaMB’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_flags(sw_if_index=4,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’kiJICsYLnUCeLaMB’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’kiJICsYLnUCeLaMB’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_flags(sw_if_index=3,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

10ge2p1x553-ethip4ipsec1tnlswasync-scheduler-ip4base-int-aes256gcm-ndrpdr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular topology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them, run with IPsec async mode and use crypto sw scheduler engine to schedule crypto work to crypto cores. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG verification: TG finds and reports throughput NDR (Non Drop Rate) with zero packet loss tolerance and throughput PDR (Partial Drop Rate) with non-zero packet loss tolerance (LT) expressed in percentage of packets transmitted. NDR and PDR are discovered for different Ethernet L2 frame sizes using MLRsearch library.

Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to number of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG node interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 64b-1t4c-ethip4ipsec1tnlswasync-scheduler- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00e’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 1, ‘flags’: 1, ‘mac_address’: ‘ac:1f:6b:57:57:fe’, ‘ip_address’: ‘200.0.0.102’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’uDeVitbVLerIGqmICscenOxunrVtLcdo’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’uDeVitbVLerIGqmICscenOxunrVtLcdo’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_flags(sw_if_index=4,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’uDeVitbVLerIGqmICscenOxunrVtLcdo’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’uDeVitbVLerIGqmICscenOxunrVtLcdo’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_flags(sw_if_index=3,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-1t2c-ethip4ipsec1tnlswasync-scheduler- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00e’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 1, ‘flags’: 1, ‘mac_address’: ‘ac:1f:6b:57:57:fe’, ‘ip_address’: ‘200.0.0.102’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’qJKOGBiRmXJXBMnEmvucaDfPEsJrtQCL’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’qJKOGBiRmXJXBMnEmvucaDfPEsJrtQCL’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_flags(sw_if_index=4,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’qJKOGBiRmXJXBMnEmvucaDfPEsJrtQCL’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’qJKOGBiRmXJXBMnEmvucaDfPEsJrtQCL’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_flags(sw_if_index=3,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-1t4c-ethip4ipsec1tnlswasync-scheduler- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00e’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 1, ‘flags’: 1, ‘mac_address’: ‘ac:1f:6b:57:57:fe’, ‘ip_address’: ‘200.0.0.102’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’IZBkYrKhxunRRWdyhefeWwJWGFWIkmey’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’IZBkYrKhxunRRWdyhefeWwJWGFWIkmey’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_flags(sw_if_index=4,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’IZBkYrKhxunRRWdyhefeWwJWGFWIkmey’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’IZBkYrKhxunRRWdyhefeWwJWGFWIkmey’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_flags(sw_if_index=3,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

10ge2p1x553-ethip4ipsec2tnlswasync-scheduler-ip4base-int-aes128cbc-hmac512sha-ndrpdr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular topology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them, run with IPsec async mode and use crypto sw scheduler engine to schedule crypto work to crypto cores. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG verification: TG finds and reports throughput NDR (Non Drop Rate) with zero packet loss tolerance and throughput PDR (Partial Drop Rate) with non-zero packet loss tolerance (LT) expressed in percentage of packets transmitted. NDR and PDR are discovered for different Ethernet L2 frame sizes using MLRsearch library.

Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to number of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG node interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 64b-1t2c-ethip4ipsec2tnlswasync-scheduler- 
ip4base-int-aes128cbc-hmac512sha-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00e’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 1, ‘flags’: 1, ‘mac_address’: ‘ac:1f:6b:57:57:fe’, ‘ip_address’: ‘200.0.0.102’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’AsEIYemYMDPKCYHO’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’zEkWrNsrdDIKjQEszrdIwWdADGSkBLshdhRJKFpzdsmePrxPQKWrUbfaVCXbwGlz’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’AsEIYemYMDPKCYHO’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’zEkWrNsrdDIKjQEszrdIwWdADGSkBLshdhRJKFpzdsmePrxPQKWrUbfaVCXbwGlz’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’ADEOkXCcXuDyUNVt’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’dZRpXjGfBHiVONEmtYVnxmyKottqfEhiuuGCjZycwMVOpIPEHYVEPifDzXYecEte’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’ADEOkXCcXuDyUNVt’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’dZRpXjGfBHiVONEmtYVnxmyKottqfEhiuuGCjZycwMVOpIPEHYVEPifDzXYecEte’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 1, ‘n_sa_in’: 1, ‘sa_in’: [100001]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’AsEIYemYMDPKCYHO’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’zEkWrNsrdDIKjQEszrdIwWdADGSkBLshdhRJKFpzdsmePrxPQKWrUbfaVCXbwGlz’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’AsEIYemYMDPKCYHO’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’zEkWrNsrdDIKjQEszrdIwWdADGSkBLshdhRJKFpzdsmePrxPQKWrUbfaVCXbwGlz’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’ADEOkXCcXuDyUNVt’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’dZRpXjGfBHiVONEmtYVnxmyKottqfEhiuuGCjZycwMVOpIPEHYVEPifDzXYecEte’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’ADEOkXCcXuDyUNVt’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’dZRpXjGfBHiVONEmtYVnxmyKottqfEhiuuGCjZycwMVOpIPEHYVEPifDzXYecEte’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-1t2c-ethip4ipsec2tnlswasync-scheduler- 
ip4base-int-aes128cbc-hmac512sha-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00e’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 1, ‘flags’: 1, ‘mac_address’: ‘ac:1f:6b:57:57:fe’, ‘ip_address’: ‘200.0.0.102’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’bCPBDCUDEbboeDRC’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’vtVeHNeYmGnGWIFVNCRWjJGrIASyfDeILnItSyluGKSfgOaZPkDeIsbtbPGkUXaX’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’bCPBDCUDEbboeDRC’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’vtVeHNeYmGnGWIFVNCRWjJGrIASyfDeILnItSyluGKSfgOaZPkDeIsbtbPGkUXaX’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’IKBjMRdRGbRlxVTo’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’mSQcwwiDuxdURmofslLFuEpQzUQXCNzkPrgwnGPsUTAirdhrJHFHWRMcqQPyYQRJ’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’IKBjMRdRGbRlxVTo’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’mSQcwwiDuxdURmofslLFuEpQzUQXCNzkPrgwnGPsUTAirdhrJHFHWRMcqQPyYQRJ’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 1, ‘n_sa_in’: 1, ‘sa_in’: [100001]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’bCPBDCUDEbboeDRC’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’vtVeHNeYmGnGWIFVNCRWjJGrIASyfDeILnItSyluGKSfgOaZPkDeIsbtbPGkUXaX’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’bCPBDCUDEbboeDRC’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’vtVeHNeYmGnGWIFVNCRWjJGrIASyfDeILnItSyluGKSfgOaZPkDeIsbtbPGkUXaX’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’IKBjMRdRGbRlxVTo’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’mSQcwwiDuxdURmofslLFuEpQzUQXCNzkPrgwnGPsUTAirdhrJHFHWRMcqQPyYQRJ’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’IKBjMRdRGbRlxVTo’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’mSQcwwiDuxdURmofslLFuEpQzUQXCNzkPrgwnGPsUTAirdhrJHFHWRMcqQPyYQRJ’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

10ge2p1x553-ethip4ipsec2tnlswasync-scheduler-ip4base-int-aes128gcm-ndrpdr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular topology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them, run with IPsec async mode and use crypto sw scheduler engine to schedule crypto work to crypto cores. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG verification: TG finds and reports throughput NDR (Non Drop Rate) with zero packet loss tolerance and throughput PDR (Partial Drop Rate) with non-zero packet loss tolerance (LT) expressed in percentage of packets transmitted. NDR and PDR are discovered for different Ethernet L2 frame sizes using MLRsearch library.

Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to number of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG node interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 64b-1t4c-ethip4ipsec2tnlswasync-scheduler- 
ip4base-int-aes128gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00e’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 1, ‘flags’: 1, ‘mac_address’: ‘ac:1f:6b:57:57:fe’, ‘ip_address’: ‘200.0.0.102’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’HWvuoTVLzOnKaPqI’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’HWvuoTVLzOnKaPqI’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’EScrXoacEWnhYJQK’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’EScrXoacEWnhYJQK’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 1, ‘n_sa_in’: 1, ‘sa_in’: [100001]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’HWvuoTVLzOnKaPqI’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’HWvuoTVLzOnKaPqI’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’EScrXoacEWnhYJQK’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’EScrXoacEWnhYJQK’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-1t2c-ethip4ipsec2tnlswasync-scheduler- 
ip4base-int-aes128gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00e’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 1, ‘flags’: 1, ‘mac_address’: ‘ac:1f:6b:57:57:fe’, ‘ip_address’: ‘200.0.0.102’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’LUbSOEUskJegpfTc’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’LUbSOEUskJegpfTc’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’WcnUhhJUTGHQRAIb’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’WcnUhhJUTGHQRAIb’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 1, ‘n_sa_in’: 1, ‘sa_in’: [100001]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’LUbSOEUskJegpfTc’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’LUbSOEUskJegpfTc’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’WcnUhhJUTGHQRAIb’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’WcnUhhJUTGHQRAIb’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

10ge2p1x553-ethip4ipsec2tnlswasync-scheduler-ip4base-int-aes256gcm-ndrpdr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular topology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them, run with IPsec async mode and use crypto sw scheduler engine to schedule crypto work to crypto cores. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG verification: TG finds and reports throughput NDR (Non Drop Rate) with zero packet loss tolerance and throughput PDR (Partial Drop Rate) with non-zero packet loss tolerance (LT) expressed in percentage of packets transmitted. NDR and PDR are discovered for different Ethernet L2 frame sizes using MLRsearch library.

Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to number of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG node interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 64b-1t2c-ethip4ipsec2tnlswasync-scheduler- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00e’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 1, ‘flags’: 1, ‘mac_address’: ‘ac:1f:6b:57:57:fe’, ‘ip_address’: ‘200.0.0.102’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’lvqvGGYyIyFrjNyFWVgisvQkJPLHQaKW’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’lvqvGGYyIyFrjNyFWVgisvQkJPLHQaKW’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’JOtbzYSteGMhCcpDMxLwLxsvIFlLnCxD’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’JOtbzYSteGMhCcpDMxLwLxsvIFlLnCxD’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 1, ‘n_sa_in’: 1, ‘sa_in’: [100001]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’lvqvGGYyIyFrjNyFWVgisvQkJPLHQaKW’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’lvqvGGYyIyFrjNyFWVgisvQkJPLHQaKW’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’JOtbzYSteGMhCcpDMxLwLxsvIFlLnCxD’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’JOtbzYSteGMhCcpDMxLwLxsvIFlLnCxD’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 64b-1t4c-ethip4ipsec2tnlswasync-scheduler- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00e’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 1, ‘flags’: 1, ‘mac_address’: ‘ac:1f:6b:57:57:fe’, ‘ip_address’: ‘200.0.0.102’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’ukxRZgqRZgYjBZcrfjsACmsCiicevBgY’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’ukxRZgqRZgYjBZcrfjsACmsCiicevBgY’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’XyxwxwdnkjyUrmwdOsXjBpRPLyEWXOPg’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’XyxwxwdnkjyUrmwdOsXjBpRPLyEWXOPg’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 1, ‘n_sa_in’: 1, ‘sa_in’: [100001]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’ukxRZgqRZgYjBZcrfjsACmsCiicevBgY’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’ukxRZgqRZgYjBZcrfjsACmsCiicevBgY’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’XyxwxwdnkjyUrmwdOsXjBpRPLyEWXOPg’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’XyxwxwdnkjyUrmwdOsXjBpRPLyEWXOPg’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-1t2c-ethip4ipsec2tnlswasync-scheduler- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00e’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 1, ‘flags’: 1, ‘mac_address’: ‘ac:1f:6b:57:57:fe’, ‘ip_address’: ‘200.0.0.102’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’TRmdXtqedpMTKnUPVbsgtXnWmWUYIWKU’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’TRmdXtqedpMTKnUPVbsgtXnWmWUYIWKU’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’BGvUUlvqzUsrOiRYIZGEGqzEvwvMWEis’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’BGvUUlvqzUsrOiRYIZGEGqzEvwvMWEis’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 1, ‘n_sa_in’: 1, ‘sa_in’: [100001]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’TRmdXtqedpMTKnUPVbsgtXnWmWUYIWKU’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’TRmdXtqedpMTKnUPVbsgtXnWmWUYIWKU’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’BGvUUlvqzUsrOiRYIZGEGqzEvwvMWEis’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’BGvUUlvqzUsrOiRYIZGEGqzEvwvMWEis’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-1t2c-ethip4ipsec2tnlswasync-scheduler- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00e’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 1, ‘flags’: 1, ‘mac_address’: ‘ac:1f:6b:57:57:fe’, ‘ip_address’: ‘200.0.0.102’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’oDGGyijTMlDByqfLUZpkoRgrNjtPiWEe’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’oDGGyijTMlDByqfLUZpkoRgrNjtPiWEe’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’QIDhcdCufFpGNuFdSrHRHuAPsMGAqZBt’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’QIDhcdCufFpGNuFdSrHRHuAPsMGAqZBt’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 1, ‘n_sa_in’: 1, ‘sa_in’: [100001]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’oDGGyijTMlDByqfLUZpkoRgrNjtPiWEe’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’oDGGyijTMlDByqfLUZpkoRgrNjtPiWEe’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’QIDhcdCufFpGNuFdSrHRHuAPsMGAqZBt’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’QIDhcdCufFpGNuFdSrHRHuAPsMGAqZBt’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-1t4c-ethip4ipsec2tnlswasync-scheduler- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00e’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 1, ‘flags’: 1, ‘mac_address’: ‘ac:1f:6b:57:57:fe’, ‘ip_address’: ‘200.0.0.102’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’iAwWamRIfXOZLjFpcDbHXLUngyjAnNlV’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’iAwWamRIfXOZLjFpcDbHXLUngyjAnNlV’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’NcHnIejVaLytsRLzJnnRBMbNQWViLCoO’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’NcHnIejVaLytsRLzJnnRBMbNQWViLCoO’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 1, ‘n_sa_in’: 1, ‘sa_in’: [100001]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’iAwWamRIfXOZLjFpcDbHXLUngyjAnNlV’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’iAwWamRIfXOZLjFpcDbHXLUngyjAnNlV’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’NcHnIejVaLytsRLzJnnRBMbNQWViLCoO’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’NcHnIejVaLytsRLzJnnRBMbNQWViLCoO’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

10ge2p1x553-ethip4ipsec40tnlsw-ip4base-int-aes128cbc-hmac512sha-ndrpdr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular topology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG verification: TG finds and reports throughput NDR (Non Drop Rate) with zero packet loss tolerance and throughput PDR (Partial Drop Rate) with non-zero packet loss tolerance (LT) expressed in percentage of packets transmitted. NDR and PDR are discovered for different Ethernet L2 frame sizes using MLRsearch library.

Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to number of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG node interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 64b-1t1c-ethip4ipsec40tnlsw-ip4base- 
int-aes128cbc-hmac512sha-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec create loopback interface
exec set interface state loop0 up
exec set interface ip address TenGigabitEthernet8/0/0 200.0.0.101/24
exec set ip neighbor TenGigabitEthernet8/0/0 200.0.0.102 ac:1f:6b:57:57:fe static
exec set interface ip address loop0 100.0.0.1/32
exec create ipip tunnel src 100.0.0.1 dst 200.0.0.102 p2p
exec ipsec sa add 0 spi 100000 crypto-alg aes-cbc-128 crypto-key 6a454c5746785442507276796978566f integ-alg sha-512-256 integ-key 51447a645a545a6f74696e576a6575464b636c4f726751654d514d597a467176487a75546779795a707776547a52706e47746c415950767961616a746e764562 esp
exec ipsec sa add 100000 spi 200000 crypto-alg aes-cbc-128 crypto-key 6a454c5746785442507276796978566f integ-alg sha-512-256 integ-key 51447a645a545a6f74696e576a6575464b636c4f726751654d514d597a467176487a75546779795a707776547a52706e47746c415950767961616a746e764562 esp
exec ipsec tunnel protect ipip0 sa-out 0 sa-in 100000 add
exec set interface ip address loop0 100.0.1.1/32
exec create ipip tunnel src 100.0.1.1 dst 200.0.0.102 p2p
exec ipsec sa add 1 spi 100001 crypto-alg aes-cbc-128 crypto-key 7047444250465a476a514b534b70714d integ-alg sha-512-256 integ-key 617543787073764b7374585051484a637869726f78695347724657776559524c48784a5675784a4579446b5762794a4f6e5077796e4f74614b75694f4b746d73 esp
exec ipsec sa add 100001 spi 200001 crypto-alg aes-cbc-128 crypto-key 7047444250465a476a514b534b70714d integ-alg sha-512-256 integ-key 617543787073764b7374585051484a637869726f78695347724657776559524c48784a5675784a4579446b5762794a4f6e5077796e4f74614b75694f4b746d73 esp
exec ipsec tunnel protect ipip1 sa-out 1 sa-in 100001 add
exec set interface ip address loop0 100.0.2.1/32
exec create ipip tunnel src 100.0.2.1 dst 200.0.0.102 p2p
exec ipsec sa add 2 spi 100002 crypto-alg aes-cbc-128 crypto-key 74427953554e504b684763466c574478 integ-alg sha-512-256 integ-key 5374414870526f76546a54544e4458534f536f684a576149676e5173786b747463726a785a7156507561697a50467a704b6b7366614c6b5247774b434b436542 esp
exec ipsec sa add 100002 spi 200002 crypto-alg aes-cbc-128 crypto-key 74427953554e504b684763466c574478 integ-alg sha-512-256 integ-key 5374414870526f76546a54544e4458534f536f684a576149676e5173786b747463726a785a7156507561697a50467a704b6b7366614c6b5247774b434b436542 esp
exec ipsec tunnel protect ipip2 sa-out 2 sa-in 100002 add
exec set interface ip address loop0 100.0.3.1/32
exec create ipip tunnel src 100.0.3.1 dst 200.0.0.102 p2p
exec ipsec sa add 3 spi 100003 crypto-alg aes-cbc-128 crypto-key 5447447361424f4a687a527744636269 integ-alg sha-512-256 integ-key 5359756b456757765973555646796853707550594448494c63434f4e466d6e684e636e68594269594f536c677147754d4e576a527577674c5155536d71734359 esp
exec ipsec sa add 100003 spi 200003 crypto-alg aes-cbc-128 crypto-key 5447447361424f4a687a527744636269 integ-alg sha-512-256 integ-key 5359756b456757765973555646796853707550594448494c63434f4e466d6e684e636e68594269594f536c677147754d4e576a527577674c5155536d71734359 esp
exec ipsec tunnel protect ipip3 sa-out 3 sa-in 100003 add
exec set interface ip address loop0 100.0.4.1/32
exec create ipip tunnel src 100.0.4.1 dst 200.0.0.102 p2p
exec ipsec sa add 4 spi 100004 crypto-alg aes-cbc-128 crypto-key 416764564164734977576e6e79575a4c integ-alg sha-512-256 integ-key 764c67715641736c6f504370565a794a6c774868736647666b4444457a5149734856716562436c42454f6550714d594347645855506861566c414556756a5a49 esp
exec ipsec sa add 100004 spi 200004 crypto-alg aes-cbc-128 crypto-key 416764564164734977576e6e79575a4c integ-alg sha-512-256 integ-key 764c67715641736c6f504370565a794a6c774868736647666b4444457a5149734856716562436c42454f6550714d594347645855506861566c414556756a5a49 esp
exec ipsec tunnel protect ipip4 sa-out 4 sa-in 100004 add
exec set interface ip address loop0 100.0.5.1/32
exec create ipip tunnel src 100.0.5.1 dst 200.0.0.102 p2p
exec ipsec sa add 5 spi 100005 crypto-alg aes-cbc-128 crypto-key 76727845724a43636275636866664754 integ-alg sha-512-256 integ-key 7447477a6f434f6647614669504a727a6a665a447253597164646e436b53776f6556634443734272614b56416146454d4873744a797847684d7553766e6a4a76 esp
exec ipsec sa add 100005 spi 200005 crypto-alg aes-cbc-128 crypto-key 76727845724a43636275636866664754 integ-alg sha-512-256 integ-key 7447477a6f434f6647614669504a727a6a665a447253597164646e436b53776f6556634443734272614b56416146454d4873744a797847684d7553766e6a4a76 esp
exec ipsec tunnel protect ipip5 sa-out 5 sa-in 100005 add
exec set interface ip address loop0 100.0.6.1/32
exec create ipip tunnel src 100.0.6.1 dst 200.0.0.102 p2p
exec ipsec sa add 6 spi 100006 crypto-alg aes-cbc-128 crypto-key 7a6a4b56644444484c45534e5863656e integ-alg sha-512-256 integ-key 4a5a6c414569706b6d514e687a664746787a4b6b4f725a637a484845534e6567434847526173676f6e627843794665426748434676424f43784448586f766a6d esp
exec ipsec sa add 100006 spi 200006 crypto-alg aes-cbc-128 crypto-key 7a6a4b56644444484c45534e5863656e integ-alg sha-512-256 integ-key 4a5a6c414569706b6d514e687a664746787a4b6b4f725a637a484845534e6567434847526173676f6e627843794665426748434676424f43784448586f766a6d esp
exec ipsec tunnel protect ipip6 sa-out 6 sa-in 100006 add
exec set interface ip address loop0 100.0.7.1/32
exec create ipip tunnel src 100.0.7.1 dst 200.0.0.102 p2p
exec ipsec sa add 7 spi 100007 crypto-alg aes-cbc-128 crypto-key 4e524270706f564279536e73574b534f integ-alg sha-512-256 integ-key 616e576e66524c64624b6761426a6959784a5a42716270486b4f4174495a5161595a7765496e6e45534a755a566348776d416643547a766669474b76704a496e esp
exec ipsec sa add 100007 spi 200007 crypto-alg aes-cbc-128 crypto-key 4e524270706f564279536e73574b534f integ-alg sha-512-256 integ-key 616e576e66524c64624b6761426a6959784a5a42716270486b4f4174495a5161595a7765496e6e45534a755a566348776d416643547a766669474b76704a496e esp
exec ipsec tunnel protect ipip7 sa-out 7 sa-in 100007 add
exec set interface ip address loop0 100.0.8.1/32
exec create ipip tunnel src 100.0.8.1 dst 200.0.0.102 p2p
exec ipsec sa add 8 spi 100008 crypto-alg aes-cbc-128 crypto-key 4e426a7262494d51425154724475686c integ-alg sha-512-256 integ-key 547873517158536d59505456656576417374556d54695a5156726f57694c46756d4c66786f646957546a49694273794752485a786f6c4871707546646a55774c esp
exec ipsec sa add 100008 spi 200008 crypto-alg aes-cbc-128 crypto-key 4e426a7262494d51425154724475686c integ-alg sha-512-256 integ-key 547873517158536d59505456656576417374556d54695a5156726f57694c46756d4c66786f646957546a49694273794752485a786f6c4871707546646a55774c esp
exec ipsec tunnel protect ipip8 sa-out 8 sa-in 100008 add
exec set interface ip address loop0 100.0.9.1/32
exec create ipip tunnel src 100.0.9.1 dst 200.0.0.102 p2p
exec ipsec sa add 9 spi 100009 crypto-alg aes-cbc-128 crypto-key 4f4c514b6e43676866464a6e4a4e4b55 integ-alg sha-512-256 integ-key 50496163526359775a4d615458514d5859435576414e537550714171504e73504b725847574a6b4b6a784a7850435779556c557747704a685069577153584469 esp
exec ipsec sa add 100009 spi 200009 crypto-alg aes-cbc-128 crypto-key 4f4c514b6e43676866464a6e4a4e4b55 integ-alg sha-512-256 integ-key 50496163526359775a4d615458514d5859435576414e537550714171504e73504b725847574a6b4b6a784a7850435779556c557747704a685069577153584469 esp
exec ipsec tunnel protect ipip9 sa-out 9 sa-in 100009 add
exec set interface ip address loop0 100.0.10.1/32
exec create ipip tunnel src 100.0.10.1 dst 200.0.0.102 p2p
exec ipsec sa add 10 spi 100010 crypto-alg aes-cbc-128 crypto-key 4a52735a674b6c4c43654549724c4878 integ-alg sha-512-256 integ-key 554f5855795a4947417568644b4d6b764c4d664d4944554c664474456c744d426f58644152484f775751666642634f76785670484441556f7071545242667965 esp
exec ipsec sa add 100010 spi 200010 crypto-alg aes-cbc-128 crypto-key 4a52735a674b6c4c43654549724c4878 integ-alg sha-512-256 integ-key 554f5855795a4947417568644b4d6b764c4d664d4944554c664474456c744d426f58644152484f775751666642634f76785670484441556f7071545242667965 esp
exec ipsec tunnel protect ipip10 sa-out 10 sa-in 100010 add
exec set interface ip address loop0 100.0.11.1/32
exec create ipip tunnel src 100.0.11.1 dst 200.0.0.102 p2p
exec ipsec sa add 11 spi 100011 crypto-alg aes-cbc-128 crypto-key 7a464d51746a47454d566962487a6d78 integ-alg sha-512-256 integ-key 63425774554554767850676a61634c7578754773586d58646a556149724b6e796855456271474a717956586a57787a6948484c746e54594e7962726255434d4f esp
exec ipsec sa add 100011 spi 200011 crypto-alg aes-cbc-128 crypto-key 7a464d51746a47454d566962487a6d78 integ-alg sha-512-256 integ-key 63425774554554767850676a61634c7578754773586d58646a556149724b6e796855456271474a717956586a57787a6948484c746e54594e7962726255434d4f esp
exec ipsec tunnel protect ipip11 sa-out 11 sa-in 100011 add
exec set interface ip address loop0 100.0.12.1/32
exec create ipip tunnel src 100.0.12.1 dst 200.0.0.102 p2p
exec ipsec sa add 12 spi 100012 crypto-alg aes-cbc-128 crypto-key 4b434f676e63545a4875457243726e77 integ-alg sha-512-256 integ-key 52485644754e746364774b46584a72575161674a656c72746e67786f764d6166754277694a6459694561624347736c57494574785247434d65735a4b4a6d7457 esp
exec ipsec sa add 100012 spi 200012 crypto-alg aes-cbc-128 crypto-key 4b434f676e63545a4875457243726e77 integ-alg sha-512-256 integ-key 52485644754e746364774b46584a72575161674a656c72746e67786f764d6166754277694a6459694561624347736c57494574785247434d65735a4b4a6d7457 esp
exec ipsec tunnel protect ipip12 sa-out 12 sa-in 100012 add
exec set interface ip address loop0 100.0.13.1/32
exec create ipip tunnel src 100.0.13.1 dst 200.0.0.102 p2p
exec ipsec sa add 13 spi 100013 crypto-alg aes-cbc-128 crypto-key 4d42545267746268417977414a695458 integ-alg sha-512-256 integ-key 4c56594a5a676d48586857556e4d544466797955555641647348684350507679504c7155666c646847684768594c4a61634b5a7943474b6c4270587146714559 esp
exec ipsec sa add 100013 spi 200013 crypto-alg aes-cbc-128 crypto-key 4d42545267746268417977414a695458 integ-alg sha-512-256 integ-key 4c56594a5a676d48586857556e4d544466797955555641647348684350507679504c7155666c646847684768594c4a61634b5a7943474b6c4270587146714559 esp
exec ipsec tunnel protect ipip13 sa-out 13 sa-in 100013 add
exec set interface ip address loop0 100.0.14.1/32
exec create ipip tunnel src 100.0.14.1 dst 200.0.0.102 p2p
exec ipsec sa add 14 spi 100014 crypto-alg aes-cbc-128 crypto-key 7442796b564f70474a44434d61554f59 integ-alg sha-512-256 integ-key 6d4b76637659636b76724679444956694a52644a6876574953595775484f4f5251644157457277484d6c505174754777416255714a534a576d43487968634c65 esp
exec ipsec sa add 100014 spi 200014 crypto-alg aes-cbc-128 crypto-key 7442796b564f70474a44434d61554f59 integ-alg sha-512-256 integ-key 6d4b76637659636b76724679444956694a52644a6876574953595775484f4f5251644157457277484d6c505174754777416255714a534a576d43487968634c65 esp
exec ipsec tunnel protect ipip14 sa-out 14 sa-in 100014 add
exec set interface ip address loop0 100.0.15.1/32
exec create ipip tunnel src 100.0.15.1 dst 200.0.0.102 p2p
exec ipsec sa add 15 spi 100015 crypto-alg aes-cbc-128 crypto-key 554b4a486a6e655769565278666b614b integ-alg sha-512-256 integ-key 6e654c617661786f53417a46506f6f6a686f52556449416a647a4f6953624f736c52685a5563554e644e45654b706d6d7378754757447079696554484c485745 esp
exec ipsec sa add 100015 spi 200015 crypto-alg aes-cbc-128 crypto-key 554b4a486a6e655769565278666b614b integ-alg sha-512-256 integ-key 6e654c617661786f53417a46506f6f6a686f52556449416a647a4f6953624f736c52685a5563554e644e45654b706d6d7378754757447079696554484c485745 esp
exec ipsec tunnel protect ipip15 sa-out 15 sa-in 100015 add
exec set interface ip address loop0 100.0.16.1/32
exec create ipip tunnel src 100.0.16.1 dst 200.0.0.102 p2p
exec ipsec sa add 16 spi 100016 crypto-alg aes-cbc-128 crypto-key 55635479637773477864497a75674e59 integ-alg sha-512-256 integ-key 4e65425a775446567a695167704d41737373454e6e4c506c576848514f4c5070586a795556776161736b6371436b49796e69645941714d506b79684c527a4753 esp
exec ipsec sa add 100016 spi 200016 crypto-alg aes-cbc-128 crypto-key 55635479637773477864497a75674e59 integ-alg sha-512-256 integ-key 4e65425a775446567a695167704d41737373454e6e4c506c576848514f4c5070586a795556776161736b6371436b49796e69645941714d506b79684c527a4753 esp
exec ipsec tunnel protect ipip16 sa-out 16 sa-in 100016 add
exec set interface ip address loop0 100.0.17.1/32
exec create ipip tunnel src 100.0.17.1 dst 200.0.0.102 p2p
exec ipsec sa add 17 spi 100017 crypto-alg aes-cbc-128 crypto-key 5074724179594d75454d65456a555651 integ-alg sha-512-256 integ-key 705a63764b78734344785a584b436b497077584546455148624c5570564c6d776944527772744f574b485166626c46454d7067487a516e77526479775049786d esp
exec ipsec sa add 100017 spi 200017 crypto-alg aes-cbc-128 crypto-key 5074724179594d75454d65456a555651 integ-alg sha-512-256 integ-key 705a63764b78734344785a584b436b497077584546455148624c5570564c6d776944527772744f574b485166626c46454d7067487a516e77526479775049786d esp
exec ipsec tunnel protect ipip17 sa-out 17 sa-in 100017 add
exec set interface ip address loop0 100.0.18.1/32
exec create ipip tunnel src 100.0.18.1 dst 200.0.0.102 p2p
exec ipsec sa add 18 spi 100018 crypto-alg aes-cbc-128 crypto-key 62675443594a52524550644274504d75 integ-alg sha-512-256 integ-key 7342766f5a507a7a4b7671536345665261435643434f456661517279595561797a4576646348786e697a6c634e4171597a5858504c6c7a654943784a4b65546d esp
exec ipsec sa add 100018 spi 200018 crypto-alg aes-cbc-128 crypto-key 62675443594a52524550644274504d75 integ-alg sha-512-256 integ-key 7342766f5a507a7a4b7671536345665261435643434f456661517279595561797a4576646348786e697a6c634e4171597a5858504c6c7a654943784a4b65546d esp
exec ipsec tunnel protect ipip18 sa-out 18 sa-in 100018 add
exec set interface ip address loop0 100.0.19.1/32
exec create ipip tunnel src 100.0.19.1 dst 200.0.0.102 p2p
exec ipsec sa add 19 spi 100019 crypto-alg aes-cbc-128 crypto-key 734473727a62525847736170415a7341 integ-alg sha-512-256 integ-key 514d44746c6d4259436a4465614159466d4951736b6e7072534f636863676d5550617047737648555356735269505a564a464a766445616c54544b684f614261 esp
exec ipsec sa add 100019 spi 200019 crypto-alg aes-cbc-128 crypto-key 734473727a62525847736170415a7341 integ-alg sha-512-256 integ-key 514d44746c6d4259436a4465614159466d4951736b6e7072534f636863676d5550617047737648555356735269505a564a464a766445616c54544b684f614261 esp
exec ipsec tunnel protect ipip19 sa-out 19 sa-in 100019 add
exec set interface ip address loop0 100.0.20.1/32
exec create ipip tunnel src 100.0.20.1 dst 200.0.0.102 p2p
exec ipsec sa add 20 spi 100020 crypto-alg aes-cbc-128 crypto-key 4766684b7356736d56615a537041455a integ-alg sha-512-256 integ-key 4e4e424f6c476346764f63784e57744c56557969557662626e64754b76516b54516d43475651756551594356644268726a6b57774c6b794c6562747465625179 esp
exec ipsec sa add 100020 spi 200020 crypto-alg aes-cbc-128 crypto-key 4766684b7356736d56615a537041455a integ-alg sha-512-256 integ-key 4e4e424f6c476346764f63784e57744c56557969557662626e64754b76516b54516d43475651756551594356644268726a6b57774c6b794c6562747465625179 esp
exec ipsec tunnel protect ipip20 sa-out 20 sa-in 100020 add
exec set interface ip address loop0 100.0.21.1/32
exec create ipip tunnel src 100.0.21.1 dst 200.0.0.102 p2p
exec ipsec sa add 21 spi 100021 crypto-alg aes-cbc-128 crypto-key 6459786678454c6e55446b4c4b504441 integ-alg sha-512-256 integ-key 7246536d7773797842485a50475558616d4c6573567041636955614a71646d7441544b6f6c6e55504a4645517a63506f4b584a6c71757457427a664a63486b4d esp
exec ipsec sa add 100021 spi 200021 crypto-alg aes-cbc-128 crypto-key 6459786678454c6e55446b4c4b504441 integ-alg sha-512-256 integ-key 7246536d7773797842485a50475558616d4c6573567041636955614a71646d7441544b6f6c6e55504a4645517a63506f4b584a6c71757457427a664a63486b4d esp
exec ipsec tunnel protect ipip21 sa-out 21 sa-in 100021 add
exec set interface ip address loop0 100.0.22.1/32
exec create ipip tunnel src 100.0.22.1 dst 200.0.0.102 p2p
exec ipsec sa add 22 spi 100022 crypto-alg aes-cbc-128 crypto-key 41556771694d4d6f4b4461706a587374 integ-alg sha-512-256 integ-key 4f616470646376684d704d58504e674e6f477a67474b567a4179484c6859417566474b426e4e5763597665735245797943424a7570486e6c75645050464a5067 esp
exec ipsec sa add 100022 spi 200022 crypto-alg aes-cbc-128 crypto-key 41556771694d4d6f4b4461706a587374 integ-alg sha-512-256 integ-key 4f616470646376684d704d58504e674e6f477a67474b567a4179484c6859417566474b426e4e5763597665735245797943424a7570486e6c75645050464a5067 esp
exec ipsec tunnel protect ipip22 sa-out 22 sa-in 100022 add
exec set interface ip address loop0 100.0.23.1/32
exec create ipip tunnel src 100.0.23.1 dst 200.0.0.102 p2p
exec ipsec sa add 23 spi 100023 crypto-alg aes-cbc-128 crypto-key 41687645596e7345737665684c6c7444 integ-alg sha-512-256 integ-key 6d6f6e4b54524f457a70494e714c4f7a616a445345457742515273695141727370797a4a4b427649736b544e6c45545259447a4f475143624955514f55727a74 esp
exec ipsec sa add 100023 spi 200023 crypto-alg aes-cbc-128 crypto-key 41687645596e7345737665684c6c7444 integ-alg sha-512-256 integ-key 6d6f6e4b54524f457a70494e714c4f7a616a445345457742515273695141727370797a4a4b427649736b544e6c45545259447a4f475143624955514f55727a74 esp
exec ipsec tunnel protect ipip23 sa-out 23 sa-in 100023 add
exec set interface ip address loop0 100.0.24.1/32
exec create ipip tunnel src 100.0.24.1 dst 200.0.0.102 p2p
exec ipsec sa add 24 spi 100024 crypto-alg aes-cbc-128 crypto-key 594e43476167765253614f5046436965 integ-alg sha-512-256 integ-key 424949647a787176784a69664e7343464a527957534f7a566643774342504c634c554475416b456447434e705a4d4d564d794552774b5251794d697767427272 esp
exec ipsec sa add 100024 spi 200024 crypto-alg aes-cbc-128 crypto-key 594e43476167765253614f5046436965 integ-alg sha-512-256 integ-key 424949647a787176784a69664e7343464a527957534f7a566643774342504c634c554475416b456447434e705a4d4d564d794552774b5251794d697767427272 esp
exec ipsec tunnel protect ipip24 sa-out 24 sa-in 100024 add
exec set interface ip address loop0 100.0.25.1/32
exec create ipip tunnel src 100.0.25.1 dst 200.0.0.102 p2p
exec ipsec sa add 25 spi 100025 crypto-alg aes-cbc-128 crypto-key 534f6674497a7a746542746742666a4a integ-alg sha-512-256 integ-key 615a7471596767756c6972497747724c547741724242627a5859456a507a53595971706963507a5873647378674377674c4469746e74724a58594f6c6a4c5a67 esp
exec ipsec sa add 100025 spi 200025 crypto-alg aes-cbc-128 crypto-key 534f6674497a7a746542746742666a4a integ-alg sha-512-256 integ-key 615a7471596767756c6972497747724c547741724242627a5859456a507a53595971706963507a5873647378674377674c4469746e74724a58594f6c6a4c5a67 esp
exec ipsec tunnel protect ipip25 sa-out 25 sa-in 100025 add
exec set interface ip address loop0 100.0.26.1/32
exec create ipip tunnel src 100.0.26.1 dst 200.0.0.102 p2p
exec ipsec sa add 26 spi 100026 crypto-alg aes-cbc-128 crypto-key 417a566a5a534878664c66626f454e51 integ-alg sha-512-256 integ-key 4665424876756564475a77736745767762624773765255644d58486f456f52444f5a714d635562514e447669576f444a4a4876634f6c6e6e4f77595265536d4c esp
exec ipsec sa add 100026 spi 200026 crypto-alg aes-cbc-128 crypto-key 417a566a5a534878664c66626f454e51 integ-alg sha-512-256 integ-key 4665424876756564475a77736745767762624773765255644d58486f456f52444f5a714d635562514e447669576f444a4a4876634f6c6e6e4f77595265536d4c esp
exec ipsec tunnel protect ipip26 sa-out 26 sa-in 100026 add
exec set interface ip address loop0 100.0.27.1/32
exec create ipip tunnel src 100.0.27.1 dst 200.0.0.102 p2p
exec ipsec sa add 27 spi 100027 crypto-alg aes-cbc-128 crypto-key 474d43504b65756f7768656561576844 integ-alg sha-512-256 integ-key 49464a6a6251546d746673724262784b6b4550556e4b4a546e5347454e65474b77634c4b69705a6a67595272564663706a6a4a794a786376786b435a67506370 esp
exec ipsec sa add 100027 spi 200027 crypto-alg aes-cbc-128 crypto-key 474d43504b65756f7768656561576844 integ-alg sha-512-256 integ-key 49464a6a6251546d746673724262784b6b4550556e4b4a546e5347454e65474b77634c4b69705a6a67595272564663706a6a4a794a786376786b435a67506370 esp
exec ipsec tunnel protect ipip27 sa-out 27 sa-in 100027 add
exec set interface ip address loop0 100.0.28.1/32
exec create ipip tunnel src 100.0.28.1 dst 200.0.0.102 p2p
exec ipsec sa add 28 spi 100028 crypto-alg aes-cbc-128 crypto-key 7258596e4c794b727656585156414967 integ-alg sha-512-256 integ-key 6b7048525877485358656f73627951476e697a546f4c4e44546d775877694755746d737a4e5549746b73556561684a4d656448784a4d52717670565764625548 esp
exec ipsec sa add 100028 spi 200028 crypto-alg aes-cbc-128 crypto-key 7258596e4c794b727656585156414967 integ-alg sha-512-256 integ-key 6b7048525877485358656f73627951476e697a546f4c4e44546d775877694755746d737a4e5549746b73556561684a4d656448784a4d52717670565764625548 esp
exec ipsec tunnel protect ipip28 sa-out 28 sa-in 100028 add
exec set interface ip address loop0 100.0.29.1/32
exec create ipip tunnel src 100.0.29.1 dst 200.0.0.102 p2p
exec ipsec sa add 29 spi 100029 crypto-alg aes-cbc-128 crypto-key 706e7a75476877584d647a6265556657 integ-alg sha-512-256 integ-key 4e7a5a4a7273634468485a4b63476c6f516150617643436b6a79536b544244507759504c5a724c786b42656a6553764d4a59756851424c634a696f687664776b esp
exec ipsec sa add 100029 spi 200029 crypto-alg aes-cbc-128 crypto-key 706e7a75476877584d647a6265556657 integ-alg sha-512-256 integ-key 4e7a5a4a7273634468485a4b63476c6f516150617643436b6a79536b544244507759504c5a724c786b42656a6553764d4a59756851424c634a696f687664776b esp
exec ipsec tunnel protect ipip29 sa-out 29 sa-in 100029 add
exec set interface ip address loop0 100.0.30.1/32
exec create ipip tunnel src 100.0.30.1 dst 200.0.0.102 p2p
exec ipsec sa add 30 spi 100030 crypto-alg aes-cbc-128 crypto-key 464f4d716b7758567079435052547449 integ-alg sha-512-256 integ-key 566e6e7753537175444551494e6f4a4b5443694e4443695754584d675861596e787471626959697a774d47635868564f6a496f52676f5549677754634158596d esp
exec ipsec sa add 100030 spi 200030 crypto-alg aes-cbc-128 crypto-key 464f4d716b7758567079435052547449 integ-alg sha-512-256 integ-key 566e6e7753537175444551494e6f4a4b5443694e4443695754584d675861596e787471626959697a774d47635868564f6a496f52676f5549677754634158596d esp
exec ipsec tunnel protect ipip30 sa-out 30 sa-in 100030 add
exec set interface ip address loop0 100.0.31.1/32
exec create ipip tunnel src 100.0.31.1 dst 200.0.0.102 p2p
exec ipsec sa add 31 spi 100031 crypto-alg aes-cbc-128 crypto-key 79726c4878724f4b6c446c6f734a5441 integ-alg sha-512-256 integ-key 55734f44784a6751726b46526b72704b6b51466f73755a4c77454673544e4a524d7a64496c61456f6b546842567271647367616f46447374504f424a794b7849 esp
exec ipsec sa add 100031 spi 200031 crypto-alg aes-cbc-128 crypto-key 79726c4878724f4b6c446c6f734a5441 integ-alg sha-512-256 integ-key 55734f44784a6751726b46526b72704b6b51466f73755a4c77454673544e4a524d7a64496c61456f6b546842567271647367616f46447374504f424a794b7849 esp
exec ipsec tunnel protect ipip31 sa-out 31 sa-in 100031 add
exec set interface ip address loop0 100.0.32.1/32
exec create ipip tunnel src 100.0.32.1 dst 200.0.0.102 p2p
exec ipsec sa add 32 spi 100032 crypto-alg aes-cbc-128 crypto-key 6c6b41676a47667a45437a48716a4b4d integ-alg sha-512-256 integ-key 415a52554b4c4b6e506d734349744e7459787a786e79704d6a525969687a6447465166797574724877625a697548737573486266657162716d7a435175537778 esp
exec ipsec sa add 100032 spi 200032 crypto-alg aes-cbc-128 crypto-key 6c6b41676a47667a45437a48716a4b4d integ-alg sha-512-256 integ-key 415a52554b4c4b6e506d734349744e7459787a786e79704d6a525969687a6447465166797574724877625a697548737573486266657162716d7a435175537778 esp
exec ipsec tunnel protect ipip32 sa-out 32 sa-in 100032 add
exec set interface ip address loop0 100.0.33.1/32
exec create ipip tunnel src 100.0.33.1 dst 200.0.0.102 p2p
exec ipsec sa add 33 spi 100033 crypto-alg aes-cbc-128 crypto-key 4964616969467976625650707a414552 integ-alg sha-512-256 integ-key 494f79436774664a665354507044496a4d6b79527455736755494e536a4d58736653624b73454958564a466e786b64455a56414a5376576147615572517a4a45 esp
exec ipsec sa add 100033 spi 200033 crypto-alg aes-cbc-128 crypto-key 4964616969467976625650707a414552 integ-alg sha-512-256 integ-key 494f79436774664a665354507044496a4d6b79527455736755494e536a4d58736653624b73454958564a466e786b64455a56414a5376576147615572517a4a45 esp
exec ipsec tunnel protect ipip33 sa-out 33 sa-in 100033 add
exec set interface ip address loop0 100.0.34.1/32
exec create ipip tunnel src 100.0.34.1 dst 200.0.0.102 p2p
exec ipsec sa add 34 spi 100034 crypto-alg aes-cbc-128 crypto-key 536351796f584969596f547264474958 integ-alg sha-512-256 integ-key 6f6556475943446c68675a51584f75775048744a61706f786c457a737146454c7145546f42686f67634f567050676875725346494c4d4b63655868586a627459 esp
exec ipsec sa add 100034 spi 200034 crypto-alg aes-cbc-128 crypto-key 536351796f584969596f547264474958 integ-alg sha-512-256 integ-key 6f6556475943446c68675a51584f75775048744a61706f786c457a737146454c7145546f42686f67634f567050676875725346494c4d4b63655868586a627459 esp
exec ipsec tunnel protect ipip34 sa-out 34 sa-in 100034 add
exec set interface ip address loop0 100.0.35.1/32
exec create ipip tunnel src 100.0.35.1 dst 200.0.0.102 p2p
exec ipsec sa add 35 spi 100035 crypto-alg aes-cbc-128 crypto-key 67454b5a426a43506c4671684e714761 integ-alg sha-512-256 integ-key 794951687663754b4a7349636667557444567369714f486379646b4d595a594a5a6c586e696f4e4a6579495069746359456d467074754e5a464f6f5973624756 esp
exec ipsec sa add 100035 spi 200035 crypto-alg aes-cbc-128 crypto-key 67454b5a426a43506c4671684e714761 integ-alg sha-512-256 integ-key 794951687663754b4a7349636667557444567369714f486379646b4d595a594a5a6c586e696f4e4a6579495069746359456d467074754e5a464f6f5973624756 esp
exec ipsec tunnel protect ipip35 sa-out 35 sa-in 100035 add
exec set interface ip address loop0 100.0.36.1/32
exec create ipip tunnel src 100.0.36.1 dst 200.0.0.102 p2p
exec ipsec sa add 36 spi 100036 crypto-alg aes-cbc-128 crypto-key 68495764794777715552754668536f47 integ-alg sha-512-256 integ-key 6a4465484a7a584f755153455055726455547973474e58444c574f44794d416d7746476b6c6d506c6f6b6842476c68667a6c7a4e54625456594361424d72686c esp
exec ipsec sa add 100036 spi 200036 crypto-alg aes-cbc-128 crypto-key 68495764794777715552754668536f47 integ-alg sha-512-256 integ-key 6a4465484a7a584f755153455055726455547973474e58444c574f44794d416d7746476b6c6d506c6f6b6842476c68667a6c7a4e54625456594361424d72686c esp
exec ipsec tunnel protect ipip36 sa-out 36 sa-in 100036 add
exec set interface ip address loop0 100.0.37.1/32
exec create ipip tunnel src 100.0.37.1 dst 200.0.0.102 p2p
exec ipsec sa add 37 spi 100037 crypto-alg aes-cbc-128 crypto-key 75466e4d714e4648556e6a506b675344 integ-alg sha-512-256 integ-key 536f5578726e534a414d514277626f6a5852685a707546656e6a736d45727472696d544369776358506c564c51796f4e7168704b6c504861766e514652644a6b esp
exec ipsec sa add 100037 spi 200037 crypto-alg aes-cbc-128 crypto-key 75466e4d714e4648556e6a506b675344 integ-alg sha-512-256 integ-key 536f5578726e534a414d514277626f6a5852685a707546656e6a736d45727472696d544369776358506c564c51796f4e7168704b6c504861766e514652644a6b esp
exec ipsec tunnel protect ipip37 sa-out 37 sa-in 100037 add
exec set interface ip address loop0 100.0.38.1/32
exec create ipip tunnel src 100.0.38.1 dst 200.0.0.102 p2p
exec ipsec sa add 38 spi 100038 crypto-alg aes-cbc-128 crypto-key 64704143527558464c4f5673546d5577 integ-alg sha-512-256 integ-key 44584c42527a637642414769764d5969754d597a6f49765950734c55514d4e6361554261514b4764706f525446587579756f555368435174445956414f49424a esp
exec ipsec sa add 100038 spi 200038 crypto-alg aes-cbc-128 crypto-key 64704143527558464c4f5673546d5577 integ-alg sha-512-256 integ-key 44584c42527a637642414769764d5969754d597a6f49765950734c55514d4e6361554261514b4764706f525446587579756f555368435174445956414f49424a esp
exec ipsec tunnel protect ipip38 sa-out 38 sa-in 100038 add
exec set interface ip address loop0 100.0.39.1/32
exec create ipip tunnel src 100.0.39.1 dst 200.0.0.102 p2p
exec ipsec sa add 39 spi 100039 crypto-alg aes-cbc-128 crypto-key 7758587a414c7a4c68496e735558456e integ-alg sha-512-256 integ-key 7a52734b6b734b6849486e6d52656a6670494b6f474b6c6b4f4d714142755767426c4a50616e7345565274466e52727953684d53585768786a79486f73724b65 esp
exec ipsec sa add 100039 spi 200039 crypto-alg aes-cbc-128 crypto-key 7758587a414c7a4c68496e735558456e integ-alg sha-512-256 integ-key 7a52734b6b734b6849486e6d52656a6670494b6f474b6c6b4f4d714142755767426c4a50616e7345565274466e52727953684d53585768786a79486f73724b65 esp
exec ipsec tunnel protect ipip39 sa-out 39 sa-in 100039 add
exec set interface unnumbered ipip0 use TenGigabitEthernet8/0/0
exec set interface state ipip0 up
exec ip route add 20.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use TenGigabitEthernet8/0/0
exec set interface state ipip1 up
exec ip route add 20.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use TenGigabitEthernet8/0/0
exec set interface state ipip2 up
exec ip route add 20.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use TenGigabitEthernet8/0/0
exec set interface state ipip3 up
exec ip route add 20.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use TenGigabitEthernet8/0/0
exec set interface state ipip4 up
exec ip route add 20.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use TenGigabitEthernet8/0/0
exec set interface state ipip5 up
exec ip route add 20.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use TenGigabitEthernet8/0/0
exec set interface state ipip6 up
exec ip route add 20.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use TenGigabitEthernet8/0/0
exec set interface state ipip7 up
exec ip route add 20.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use TenGigabitEthernet8/0/0
exec set interface state ipip8 up
exec ip route add 20.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use TenGigabitEthernet8/0/0
exec set interface state ipip9 up
exec ip route add 20.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use TenGigabitEthernet8/0/0
exec set interface state ipip10 up
exec ip route add 20.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use TenGigabitEthernet8/0/0
exec set interface state ipip11 up
exec ip route add 20.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use TenGigabitEthernet8/0/0
exec set interface state ipip12 up
exec ip route add 20.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use TenGigabitEthernet8/0/0
exec set interface state ipip13 up
exec ip route add 20.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use TenGigabitEthernet8/0/0
exec set interface state ipip14 up
exec ip route add 20.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use TenGigabitEthernet8/0/0
exec set interface state ipip15 up
exec ip route add 20.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use TenGigabitEthernet8/0/0
exec set interface state ipip16 up
exec ip route add 20.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use TenGigabitEthernet8/0/0
exec set interface state ipip17 up
exec ip route add 20.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use TenGigabitEthernet8/0/0
exec set interface state ipip18 up
exec ip route add 20.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use TenGigabitEthernet8/0/0
exec set interface state ipip19 up
exec ip route add 20.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use TenGigabitEthernet8/0/0
exec set interface state ipip20 up
exec ip route add 20.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use TenGigabitEthernet8/0/0
exec set interface state ipip21 up
exec ip route add 20.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use TenGigabitEthernet8/0/0
exec set interface state ipip22 up
exec ip route add 20.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use TenGigabitEthernet8/0/0
exec set interface state ipip23 up
exec ip route add 20.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use TenGigabitEthernet8/0/0
exec set interface state ipip24 up
exec ip route add 20.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use TenGigabitEthernet8/0/0
exec set interface state ipip25 up
exec ip route add 20.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use TenGigabitEthernet8/0/0
exec set interface state ipip26 up
exec ip route add 20.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use TenGigabitEthernet8/0/0
exec set interface state ipip27 up
exec ip route add 20.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use TenGigabitEthernet8/0/0
exec set interface state ipip28 up
exec ip route add 20.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use TenGigabitEthernet8/0/0
exec set interface state ipip29 up
exec ip route add 20.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use TenGigabitEthernet8/0/0
exec set interface state ipip30 up
exec ip route add 20.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use TenGigabitEthernet8/0/0
exec set interface state ipip31 up
exec ip route add 20.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use TenGigabitEthernet8/0/0
exec set interface state ipip32 up
exec ip route add 20.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use TenGigabitEthernet8/0/0
exec set interface state ipip33 up
exec ip route add 20.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use TenGigabitEthernet8/0/0
exec set interface state ipip34 up
exec ip route add 20.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use TenGigabitEthernet8/0/0
exec set interface state ipip35 up
exec ip route add 20.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use TenGigabitEthernet8/0/0
exec set interface state ipip36 up
exec ip route add 20.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use TenGigabitEthernet8/0/0
exec set interface state ipip37 up
exec ip route add 20.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use TenGigabitEthernet8/0/0
exec set interface state ipip38 up
exec ip route add 20.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use TenGigabitEthernet8/0/0
exec set interface state ipip39 up
exec ip route add 20.0.0.39/32 via ipip39
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec set interface ip address TenGigabitEthernet8/0/0 200.0.0.102/24.0
exec create ipip tunnel src 200.0.0.102 dst 100.0.0.1 p2p
exec ipsec sa add 100000 spi 200000 crypto-alg aes-cbc-128 crypto-key 6a454c5746785442507276796978566f integ-alg sha-512-256 integ-key 51447a645a545a6f74696e576a6575464b636c4f726751654d514d597a467176487a75546779795a707776547a52706e47746c415950767961616a746e764562 esp
exec ipsec sa add 0 spi 100000 crypto-alg aes-cbc-128 crypto-key 6a454c5746785442507276796978566f integ-alg sha-512-256 integ-key 51447a645a545a6f74696e576a6575464b636c4f726751654d514d597a467176487a75546779795a707776547a52706e47746c415950767961616a746e764562 esp
exec ipsec tunnel protect ipip0 sa-out 100000 sa-in 0 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.1.1 p2p
exec ipsec sa add 100001 spi 200001 crypto-alg aes-cbc-128 crypto-key 7047444250465a476a514b534b70714d integ-alg sha-512-256 integ-key 617543787073764b7374585051484a637869726f78695347724657776559524c48784a5675784a4579446b5762794a4f6e5077796e4f74614b75694f4b746d73 esp
exec ipsec sa add 1 spi 100001 crypto-alg aes-cbc-128 crypto-key 7047444250465a476a514b534b70714d integ-alg sha-512-256 integ-key 617543787073764b7374585051484a637869726f78695347724657776559524c48784a5675784a4579446b5762794a4f6e5077796e4f74614b75694f4b746d73 esp
exec ipsec tunnel protect ipip1 sa-out 100001 sa-in 1 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.2.1 p2p
exec ipsec sa add 100002 spi 200002 crypto-alg aes-cbc-128 crypto-key 74427953554e504b684763466c574478 integ-alg sha-512-256 integ-key 5374414870526f76546a54544e4458534f536f684a576149676e5173786b747463726a785a7156507561697a50467a704b6b7366614c6b5247774b434b436542 esp
exec ipsec sa add 2 spi 100002 crypto-alg aes-cbc-128 crypto-key 74427953554e504b684763466c574478 integ-alg sha-512-256 integ-key 5374414870526f76546a54544e4458534f536f684a576149676e5173786b747463726a785a7156507561697a50467a704b6b7366614c6b5247774b434b436542 esp
exec ipsec tunnel protect ipip2 sa-out 100002 sa-in 2 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.3.1 p2p
exec ipsec sa add 100003 spi 200003 crypto-alg aes-cbc-128 crypto-key 5447447361424f4a687a527744636269 integ-alg sha-512-256 integ-key 5359756b456757765973555646796853707550594448494c63434f4e466d6e684e636e68594269594f536c677147754d4e576a527577674c5155536d71734359 esp
exec ipsec sa add 3 spi 100003 crypto-alg aes-cbc-128 crypto-key 5447447361424f4a687a527744636269 integ-alg sha-512-256 integ-key 5359756b456757765973555646796853707550594448494c63434f4e466d6e684e636e68594269594f536c677147754d4e576a527577674c5155536d71734359 esp
exec ipsec tunnel protect ipip3 sa-out 100003 sa-in 3 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.4.1 p2p
exec ipsec sa add 100004 spi 200004 crypto-alg aes-cbc-128 crypto-key 416764564164734977576e6e79575a4c integ-alg sha-512-256 integ-key 764c67715641736c6f504370565a794a6c774868736647666b4444457a5149734856716562436c42454f6550714d594347645855506861566c414556756a5a49 esp
exec ipsec sa add 4 spi 100004 crypto-alg aes-cbc-128 crypto-key 416764564164734977576e6e79575a4c integ-alg sha-512-256 integ-key 764c67715641736c6f504370565a794a6c774868736647666b4444457a5149734856716562436c42454f6550714d594347645855506861566c414556756a5a49 esp
exec ipsec tunnel protect ipip4 sa-out 100004 sa-in 4 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.5.1 p2p
exec ipsec sa add 100005 spi 200005 crypto-alg aes-cbc-128 crypto-key 76727845724a43636275636866664754 integ-alg sha-512-256 integ-key 7447477a6f434f6647614669504a727a6a665a447253597164646e436b53776f6556634443734272614b56416146454d4873744a797847684d7553766e6a4a76 esp
exec ipsec sa add 5 spi 100005 crypto-alg aes-cbc-128 crypto-key 76727845724a43636275636866664754 integ-alg sha-512-256 integ-key 7447477a6f434f6647614669504a727a6a665a447253597164646e436b53776f6556634443734272614b56416146454d4873744a797847684d7553766e6a4a76 esp
exec ipsec tunnel protect ipip5 sa-out 100005 sa-in 5 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.6.1 p2p
exec ipsec sa add 100006 spi 200006 crypto-alg aes-cbc-128 crypto-key 7a6a4b56644444484c45534e5863656e integ-alg sha-512-256 integ-key 4a5a6c414569706b6d514e687a664746787a4b6b4f725a637a484845534e6567434847526173676f6e627843794665426748434676424f43784448586f766a6d esp
exec ipsec sa add 6 spi 100006 crypto-alg aes-cbc-128 crypto-key 7a6a4b56644444484c45534e5863656e integ-alg sha-512-256 integ-key 4a5a6c414569706b6d514e687a664746787a4b6b4f725a637a484845534e6567434847526173676f6e627843794665426748434676424f43784448586f766a6d esp
exec ipsec tunnel protect ipip6 sa-out 100006 sa-in 6 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.7.1 p2p
exec ipsec sa add 100007 spi 200007 crypto-alg aes-cbc-128 crypto-key 4e524270706f564279536e73574b534f integ-alg sha-512-256 integ-key 616e576e66524c64624b6761426a6959784a5a42716270486b4f4174495a5161595a7765496e6e45534a755a566348776d416643547a766669474b76704a496e esp
exec ipsec sa add 7 spi 100007 crypto-alg aes-cbc-128 crypto-key 4e524270706f564279536e73574b534f integ-alg sha-512-256 integ-key 616e576e66524c64624b6761426a6959784a5a42716270486b4f4174495a5161595a7765496e6e45534a755a566348776d416643547a766669474b76704a496e esp
exec ipsec tunnel protect ipip7 sa-out 100007 sa-in 7 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.8.1 p2p
exec ipsec sa add 100008 spi 200008 crypto-alg aes-cbc-128 crypto-key 4e426a7262494d51425154724475686c integ-alg sha-512-256 integ-key 547873517158536d59505456656576417374556d54695a5156726f57694c46756d4c66786f646957546a49694273794752485a786f6c4871707546646a55774c esp
exec ipsec sa add 8 spi 100008 crypto-alg aes-cbc-128 crypto-key 4e426a7262494d51425154724475686c integ-alg sha-512-256 integ-key 547873517158536d59505456656576417374556d54695a5156726f57694c46756d4c66786f646957546a49694273794752485a786f6c4871707546646a55774c esp
exec ipsec tunnel protect ipip8 sa-out 100008 sa-in 8 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.9.1 p2p
exec ipsec sa add 100009 spi 200009 crypto-alg aes-cbc-128 crypto-key 4f4c514b6e43676866464a6e4a4e4b55 integ-alg sha-512-256 integ-key 50496163526359775a4d615458514d5859435576414e537550714171504e73504b725847574a6b4b6a784a7850435779556c557747704a685069577153584469 esp
exec ipsec sa add 9 spi 100009 crypto-alg aes-cbc-128 crypto-key 4f4c514b6e43676866464a6e4a4e4b55 integ-alg sha-512-256 integ-key 50496163526359775a4d615458514d5859435576414e537550714171504e73504b725847574a6b4b6a784a7850435779556c557747704a685069577153584469 esp
exec ipsec tunnel protect ipip9 sa-out 100009 sa-in 9 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.10.1 p2p
exec ipsec sa add 100010 spi 200010 crypto-alg aes-cbc-128 crypto-key 4a52735a674b6c4c43654549724c4878 integ-alg sha-512-256 integ-key 554f5855795a4947417568644b4d6b764c4d664d4944554c664474456c744d426f58644152484f775751666642634f76785670484441556f7071545242667965 esp
exec ipsec sa add 10 spi 100010 crypto-alg aes-cbc-128 crypto-key 4a52735a674b6c4c43654549724c4878 integ-alg sha-512-256 integ-key 554f5855795a4947417568644b4d6b764c4d664d4944554c664474456c744d426f58644152484f775751666642634f76785670484441556f7071545242667965 esp
exec ipsec tunnel protect ipip10 sa-out 100010 sa-in 10 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.11.1 p2p
exec ipsec sa add 100011 spi 200011 crypto-alg aes-cbc-128 crypto-key 7a464d51746a47454d566962487a6d78 integ-alg sha-512-256 integ-key 63425774554554767850676a61634c7578754773586d58646a556149724b6e796855456271474a717956586a57787a6948484c746e54594e7962726255434d4f esp
exec ipsec sa add 11 spi 100011 crypto-alg aes-cbc-128 crypto-key 7a464d51746a47454d566962487a6d78 integ-alg sha-512-256 integ-key 63425774554554767850676a61634c7578754773586d58646a556149724b6e796855456271474a717956586a57787a6948484c746e54594e7962726255434d4f esp
exec ipsec tunnel protect ipip11 sa-out 100011 sa-in 11 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.12.1 p2p
exec ipsec sa add 100012 spi 200012 crypto-alg aes-cbc-128 crypto-key 4b434f676e63545a4875457243726e77 integ-alg sha-512-256 integ-key 52485644754e746364774b46584a72575161674a656c72746e67786f764d6166754277694a6459694561624347736c57494574785247434d65735a4b4a6d7457 esp
exec ipsec sa add 12 spi 100012 crypto-alg aes-cbc-128 crypto-key 4b434f676e63545a4875457243726e77 integ-alg sha-512-256 integ-key 52485644754e746364774b46584a72575161674a656c72746e67786f764d6166754277694a6459694561624347736c57494574785247434d65735a4b4a6d7457 esp
exec ipsec tunnel protect ipip12 sa-out 100012 sa-in 12 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.13.1 p2p
exec ipsec sa add 100013 spi 200013 crypto-alg aes-cbc-128 crypto-key 4d42545267746268417977414a695458 integ-alg sha-512-256 integ-key 4c56594a5a676d48586857556e4d544466797955555641647348684350507679504c7155666c646847684768594c4a61634b5a7943474b6c4270587146714559 esp
exec ipsec sa add 13 spi 100013 crypto-alg aes-cbc-128 crypto-key 4d42545267746268417977414a695458 integ-alg sha-512-256 integ-key 4c56594a5a676d48586857556e4d544466797955555641647348684350507679504c7155666c646847684768594c4a61634b5a7943474b6c4270587146714559 esp
exec ipsec tunnel protect ipip13 sa-out 100013 sa-in 13 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.14.1 p2p
exec ipsec sa add 100014 spi 200014 crypto-alg aes-cbc-128 crypto-key 7442796b564f70474a44434d61554f59 integ-alg sha-512-256 integ-key 6d4b76637659636b76724679444956694a52644a6876574953595775484f4f5251644157457277484d6c505174754777416255714a534a576d43487968634c65 esp
exec ipsec sa add 14 spi 100014 crypto-alg aes-cbc-128 crypto-key 7442796b564f70474a44434d61554f59 integ-alg sha-512-256 integ-key 6d4b76637659636b76724679444956694a52644a6876574953595775484f4f5251644157457277484d6c505174754777416255714a534a576d43487968634c65 esp
exec ipsec tunnel protect ipip14 sa-out 100014 sa-in 14 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.15.1 p2p
exec ipsec sa add 100015 spi 200015 crypto-alg aes-cbc-128 crypto-key 554b4a486a6e655769565278666b614b integ-alg sha-512-256 integ-key 6e654c617661786f53417a46506f6f6a686f52556449416a647a4f6953624f736c52685a5563554e644e45654b706d6d7378754757447079696554484c485745 esp
exec ipsec sa add 15 spi 100015 crypto-alg aes-cbc-128 crypto-key 554b4a486a6e655769565278666b614b integ-alg sha-512-256 integ-key 6e654c617661786f53417a46506f6f6a686f52556449416a647a4f6953624f736c52685a5563554e644e45654b706d6d7378754757447079696554484c485745 esp
exec ipsec tunnel protect ipip15 sa-out 100015 sa-in 15 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.16.1 p2p
exec ipsec sa add 100016 spi 200016 crypto-alg aes-cbc-128 crypto-key 55635479637773477864497a75674e59 integ-alg sha-512-256 integ-key 4e65425a775446567a695167704d41737373454e6e4c506c576848514f4c5070586a795556776161736b6371436b49796e69645941714d506b79684c527a4753 esp
exec ipsec sa add 16 spi 100016 crypto-alg aes-cbc-128 crypto-key 55635479637773477864497a75674e59 integ-alg sha-512-256 integ-key 4e65425a775446567a695167704d41737373454e6e4c506c576848514f4c5070586a795556776161736b6371436b49796e69645941714d506b79684c527a4753 esp
exec ipsec tunnel protect ipip16 sa-out 100016 sa-in 16 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.17.1 p2p
exec ipsec sa add 100017 spi 200017 crypto-alg aes-cbc-128 crypto-key 5074724179594d75454d65456a555651 integ-alg sha-512-256 integ-key 705a63764b78734344785a584b436b497077584546455148624c5570564c6d776944527772744f574b485166626c46454d7067487a516e77526479775049786d esp
exec ipsec sa add 17 spi 100017 crypto-alg aes-cbc-128 crypto-key 5074724179594d75454d65456a555651 integ-alg sha-512-256 integ-key 705a63764b78734344785a584b436b497077584546455148624c5570564c6d776944527772744f574b485166626c46454d7067487a516e77526479775049786d esp
exec ipsec tunnel protect ipip17 sa-out 100017 sa-in 17 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.18.1 p2p
exec ipsec sa add 100018 spi 200018 crypto-alg aes-cbc-128 crypto-key 62675443594a52524550644274504d75 integ-alg sha-512-256 integ-key 7342766f5a507a7a4b7671536345665261435643434f456661517279595561797a4576646348786e697a6c634e4171597a5858504c6c7a654943784a4b65546d esp
exec ipsec sa add 18 spi 100018 crypto-alg aes-cbc-128 crypto-key 62675443594a52524550644274504d75 integ-alg sha-512-256 integ-key 7342766f5a507a7a4b7671536345665261435643434f456661517279595561797a4576646348786e697a6c634e4171597a5858504c6c7a654943784a4b65546d esp
exec ipsec tunnel protect ipip18 sa-out 100018 sa-in 18 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.19.1 p2p
exec ipsec sa add 100019 spi 200019 crypto-alg aes-cbc-128 crypto-key 734473727a62525847736170415a7341 integ-alg sha-512-256 integ-key 514d44746c6d4259436a4465614159466d4951736b6e7072534f636863676d5550617047737648555356735269505a564a464a766445616c54544b684f614261 esp
exec ipsec sa add 19 spi 100019 crypto-alg aes-cbc-128 crypto-key 734473727a62525847736170415a7341 integ-alg sha-512-256 integ-key 514d44746c6d4259436a4465614159466d4951736b6e7072534f636863676d5550617047737648555356735269505a564a464a766445616c54544b684f614261 esp
exec ipsec tunnel protect ipip19 sa-out 100019 sa-in 19 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.20.1 p2p
exec ipsec sa add 100020 spi 200020 crypto-alg aes-cbc-128 crypto-key 4766684b7356736d56615a537041455a integ-alg sha-512-256 integ-key 4e4e424f6c476346764f63784e57744c56557969557662626e64754b76516b54516d43475651756551594356644268726a6b57774c6b794c6562747465625179 esp
exec ipsec sa add 20 spi 100020 crypto-alg aes-cbc-128 crypto-key 4766684b7356736d56615a537041455a integ-alg sha-512-256 integ-key 4e4e424f6c476346764f63784e57744c56557969557662626e64754b76516b54516d43475651756551594356644268726a6b57774c6b794c6562747465625179 esp
exec ipsec tunnel protect ipip20 sa-out 100020 sa-in 20 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.21.1 p2p
exec ipsec sa add 100021 spi 200021 crypto-alg aes-cbc-128 crypto-key 6459786678454c6e55446b4c4b504441 integ-alg sha-512-256 integ-key 7246536d7773797842485a50475558616d4c6573567041636955614a71646d7441544b6f6c6e55504a4645517a63506f4b584a6c71757457427a664a63486b4d esp
exec ipsec sa add 21 spi 100021 crypto-alg aes-cbc-128 crypto-key 6459786678454c6e55446b4c4b504441 integ-alg sha-512-256 integ-key 7246536d7773797842485a50475558616d4c6573567041636955614a71646d7441544b6f6c6e55504a4645517a63506f4b584a6c71757457427a664a63486b4d esp
exec ipsec tunnel protect ipip21 sa-out 100021 sa-in 21 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.22.1 p2p
exec ipsec sa add 100022 spi 200022 crypto-alg aes-cbc-128 crypto-key 41556771694d4d6f4b4461706a587374 integ-alg sha-512-256 integ-key 4f616470646376684d704d58504e674e6f477a67474b567a4179484c6859417566474b426e4e5763597665735245797943424a7570486e6c75645050464a5067 esp
exec ipsec sa add 22 spi 100022 crypto-alg aes-cbc-128 crypto-key 41556771694d4d6f4b4461706a587374 integ-alg sha-512-256 integ-key 4f616470646376684d704d58504e674e6f477a67474b567a4179484c6859417566474b426e4e5763597665735245797943424a7570486e6c75645050464a5067 esp
exec ipsec tunnel protect ipip22 sa-out 100022 sa-in 22 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.23.1 p2p
exec ipsec sa add 100023 spi 200023 crypto-alg aes-cbc-128 crypto-key 41687645596e7345737665684c6c7444 integ-alg sha-512-256 integ-key 6d6f6e4b54524f457a70494e714c4f7a616a445345457742515273695141727370797a4a4b427649736b544e6c45545259447a4f475143624955514f55727a74 esp
exec ipsec sa add 23 spi 100023 crypto-alg aes-cbc-128 crypto-key 41687645596e7345737665684c6c7444 integ-alg sha-512-256 integ-key 6d6f6e4b54524f457a70494e714c4f7a616a445345457742515273695141727370797a4a4b427649736b544e6c45545259447a4f475143624955514f55727a74 esp
exec ipsec tunnel protect ipip23 sa-out 100023 sa-in 23 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.24.1 p2p
exec ipsec sa add 100024 spi 200024 crypto-alg aes-cbc-128 crypto-key 594e43476167765253614f5046436965 integ-alg sha-512-256 integ-key 424949647a787176784a69664e7343464a527957534f7a566643774342504c634c554475416b456447434e705a4d4d564d794552774b5251794d697767427272 esp
exec ipsec sa add 24 spi 100024 crypto-alg aes-cbc-128 crypto-key 594e43476167765253614f5046436965 integ-alg sha-512-256 integ-key 424949647a787176784a69664e7343464a527957534f7a566643774342504c634c554475416b456447434e705a4d4d564d794552774b5251794d697767427272 esp
exec ipsec tunnel protect ipip24 sa-out 100024 sa-in 24 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.25.1 p2p
exec ipsec sa add 100025 spi 200025 crypto-alg aes-cbc-128 crypto-key 534f6674497a7a746542746742666a4a integ-alg sha-512-256 integ-key 615a7471596767756c6972497747724c547741724242627a5859456a507a53595971706963507a5873647378674377674c4469746e74724a58594f6c6a4c5a67 esp
exec ipsec sa add 25 spi 100025 crypto-alg aes-cbc-128 crypto-key 534f6674497a7a746542746742666a4a integ-alg sha-512-256 integ-key 615a7471596767756c6972497747724c547741724242627a5859456a507a53595971706963507a5873647378674377674c4469746e74724a58594f6c6a4c5a67 esp
exec ipsec tunnel protect ipip25 sa-out 100025 sa-in 25 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.26.1 p2p
exec ipsec sa add 100026 spi 200026 crypto-alg aes-cbc-128 crypto-key 417a566a5a534878664c66626f454e51 integ-alg sha-512-256 integ-key 4665424876756564475a77736745767762624773765255644d58486f456f52444f5a714d635562514e447669576f444a4a4876634f6c6e6e4f77595265536d4c esp
exec ipsec sa add 26 spi 100026 crypto-alg aes-cbc-128 crypto-key 417a566a5a534878664c66626f454e51 integ-alg sha-512-256 integ-key 4665424876756564475a77736745767762624773765255644d58486f456f52444f5a714d635562514e447669576f444a4a4876634f6c6e6e4f77595265536d4c esp
exec ipsec tunnel protect ipip26 sa-out 100026 sa-in 26 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.27.1 p2p
exec ipsec sa add 100027 spi 200027 crypto-alg aes-cbc-128 crypto-key 474d43504b65756f7768656561576844 integ-alg sha-512-256 integ-key 49464a6a6251546d746673724262784b6b4550556e4b4a546e5347454e65474b77634c4b69705a6a67595272564663706a6a4a794a786376786b435a67506370 esp
exec ipsec sa add 27 spi 100027 crypto-alg aes-cbc-128 crypto-key 474d43504b65756f7768656561576844 integ-alg sha-512-256 integ-key 49464a6a6251546d746673724262784b6b4550556e4b4a546e5347454e65474b77634c4b69705a6a67595272564663706a6a4a794a786376786b435a67506370 esp
exec ipsec tunnel protect ipip27 sa-out 100027 sa-in 27 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.28.1 p2p
exec ipsec sa add 100028 spi 200028 crypto-alg aes-cbc-128 crypto-key 7258596e4c794b727656585156414967 integ-alg sha-512-256 integ-key 6b7048525877485358656f73627951476e697a546f4c4e44546d775877694755746d737a4e5549746b73556561684a4d656448784a4d52717670565764625548 esp
exec ipsec sa add 28 spi 100028 crypto-alg aes-cbc-128 crypto-key 7258596e4c794b727656585156414967 integ-alg sha-512-256 integ-key 6b7048525877485358656f73627951476e697a546f4c4e44546d775877694755746d737a4e5549746b73556561684a4d656448784a4d52717670565764625548 esp
exec ipsec tunnel protect ipip28 sa-out 100028 sa-in 28 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.29.1 p2p
exec ipsec sa add 100029 spi 200029 crypto-alg aes-cbc-128 crypto-key 706e7a75476877584d647a6265556657 integ-alg sha-512-256 integ-key 4e7a5a4a7273634468485a4b63476c6f516150617643436b6a79536b544244507759504c5a724c786b42656a6553764d4a59756851424c634a696f687664776b esp
exec ipsec sa add 29 spi 100029 crypto-alg aes-cbc-128 crypto-key 706e7a75476877584d647a6265556657 integ-alg sha-512-256 integ-key 4e7a5a4a7273634468485a4b63476c6f516150617643436b6a79536b544244507759504c5a724c786b42656a6553764d4a59756851424c634a696f687664776b esp
exec ipsec tunnel protect ipip29 sa-out 100029 sa-in 29 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.30.1 p2p
exec ipsec sa add 100030 spi 200030 crypto-alg aes-cbc-128 crypto-key 464f4d716b7758567079435052547449 integ-alg sha-512-256 integ-key 566e6e7753537175444551494e6f4a4b5443694e4443695754584d675861596e787471626959697a774d47635868564f6a496f52676f5549677754634158596d esp
exec ipsec sa add 30 spi 100030 crypto-alg aes-cbc-128 crypto-key 464f4d716b7758567079435052547449 integ-alg sha-512-256 integ-key 566e6e7753537175444551494e6f4a4b5443694e4443695754584d675861596e787471626959697a774d47635868564f6a496f52676f5549677754634158596d esp
exec ipsec tunnel protect ipip30 sa-out 100030 sa-in 30 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.31.1 p2p
exec ipsec sa add 100031 spi 200031 crypto-alg aes-cbc-128 crypto-key 79726c4878724f4b6c446c6f734a5441 integ-alg sha-512-256 integ-key 55734f44784a6751726b46526b72704b6b51466f73755a4c77454673544e4a524d7a64496c61456f6b546842567271647367616f46447374504f424a794b7849 esp
exec ipsec sa add 31 spi 100031 crypto-alg aes-cbc-128 crypto-key 79726c4878724f4b6c446c6f734a5441 integ-alg sha-512-256 integ-key 55734f44784a6751726b46526b72704b6b51466f73755a4c77454673544e4a524d7a64496c61456f6b546842567271647367616f46447374504f424a794b7849 esp
exec ipsec tunnel protect ipip31 sa-out 100031 sa-in 31 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.32.1 p2p
exec ipsec sa add 100032 spi 200032 crypto-alg aes-cbc-128 crypto-key 6c6b41676a47667a45437a48716a4b4d integ-alg sha-512-256 integ-key 415a52554b4c4b6e506d734349744e7459787a786e79704d6a525969687a6447465166797574724877625a697548737573486266657162716d7a435175537778 esp
exec ipsec sa add 32 spi 100032 crypto-alg aes-cbc-128 crypto-key 6c6b41676a47667a45437a48716a4b4d integ-alg sha-512-256 integ-key 415a52554b4c4b6e506d734349744e7459787a786e79704d6a525969687a6447465166797574724877625a697548737573486266657162716d7a435175537778 esp
exec ipsec tunnel protect ipip32 sa-out 100032 sa-in 32 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.33.1 p2p
exec ipsec sa add 100033 spi 200033 crypto-alg aes-cbc-128 crypto-key 4964616969467976625650707a414552 integ-alg sha-512-256 integ-key 494f79436774664a665354507044496a4d6b79527455736755494e536a4d58736653624b73454958564a466e786b64455a56414a5376576147615572517a4a45 esp
exec ipsec sa add 33 spi 100033 crypto-alg aes-cbc-128 crypto-key 4964616969467976625650707a414552 integ-alg sha-512-256 integ-key 494f79436774664a665354507044496a4d6b79527455736755494e536a4d58736653624b73454958564a466e786b64455a56414a5376576147615572517a4a45 esp
exec ipsec tunnel protect ipip33 sa-out 100033 sa-in 33 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.34.1 p2p
exec ipsec sa add 100034 spi 200034 crypto-alg aes-cbc-128 crypto-key 536351796f584969596f547264474958 integ-alg sha-512-256 integ-key 6f6556475943446c68675a51584f75775048744a61706f786c457a737146454c7145546f42686f67634f567050676875725346494c4d4b63655868586a627459 esp
exec ipsec sa add 34 spi 100034 crypto-alg aes-cbc-128 crypto-key 536351796f584969596f547264474958 integ-alg sha-512-256 integ-key 6f6556475943446c68675a51584f75775048744a61706f786c457a737146454c7145546f42686f67634f567050676875725346494c4d4b63655868586a627459 esp
exec ipsec tunnel protect ipip34 sa-out 100034 sa-in 34 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.35.1 p2p
exec ipsec sa add 100035 spi 200035 crypto-alg aes-cbc-128 crypto-key 67454b5a426a43506c4671684e714761 integ-alg sha-512-256 integ-key 794951687663754b4a7349636667557444567369714f486379646b4d595a594a5a6c586e696f4e4a6579495069746359456d467074754e5a464f6f5973624756 esp
exec ipsec sa add 35 spi 100035 crypto-alg aes-cbc-128 crypto-key 67454b5a426a43506c4671684e714761 integ-alg sha-512-256 integ-key 794951687663754b4a7349636667557444567369714f486379646b4d595a594a5a6c586e696f4e4a6579495069746359456d467074754e5a464f6f5973624756 esp
exec ipsec tunnel protect ipip35 sa-out 100035 sa-in 35 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.36.1 p2p
exec ipsec sa add 100036 spi 200036 crypto-alg aes-cbc-128 crypto-key 68495764794777715552754668536f47 integ-alg sha-512-256 integ-key 6a4465484a7a584f755153455055726455547973474e58444c574f44794d416d7746476b6c6d506c6f6b6842476c68667a6c7a4e54625456594361424d72686c esp
exec ipsec sa add 36 spi 100036 crypto-alg aes-cbc-128 crypto-key 68495764794777715552754668536f47 integ-alg sha-512-256 integ-key 6a4465484a7a584f755153455055726455547973474e58444c574f44794d416d7746476b6c6d506c6f6b6842476c68667a6c7a4e54625456594361424d72686c esp
exec ipsec tunnel protect ipip36 sa-out 100036 sa-in 36 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.37.1 p2p
exec ipsec sa add 100037 spi 200037 crypto-alg aes-cbc-128 crypto-key 75466e4d714e4648556e6a506b675344 integ-alg sha-512-256 integ-key 536f5578726e534a414d514277626f6a5852685a707546656e6a736d45727472696d544369776358506c564c51796f4e7168704b6c504861766e514652644a6b esp
exec ipsec sa add 37 spi 100037 crypto-alg aes-cbc-128 crypto-key 75466e4d714e4648556e6a506b675344 integ-alg sha-512-256 integ-key 536f5578726e534a414d514277626f6a5852685a707546656e6a736d45727472696d544369776358506c564c51796f4e7168704b6c504861766e514652644a6b esp
exec ipsec tunnel protect ipip37 sa-out 100037 sa-in 37 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.38.1 p2p
exec ipsec sa add 100038 spi 200038 crypto-alg aes-cbc-128 crypto-key 64704143527558464c4f5673546d5577 integ-alg sha-512-256 integ-key 44584c42527a637642414769764d5969754d597a6f49765950734c55514d4e6361554261514b4764706f525446587579756f555368435174445956414f49424a esp
exec ipsec sa add 38 spi 100038 crypto-alg aes-cbc-128 crypto-key 64704143527558464c4f5673546d5577 integ-alg sha-512-256 integ-key 44584c42527a637642414769764d5969754d597a6f49765950734c55514d4e6361554261514b4764706f525446587579756f555368435174445956414f49424a esp
exec ipsec tunnel protect ipip38 sa-out 100038 sa-in 38 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.39.1 p2p
exec ipsec sa add 100039 spi 200039 crypto-alg aes-cbc-128 crypto-key 7758587a414c7a4c68496e735558456e integ-alg sha-512-256 integ-key 7a52734b6b734b6849486e6d52656a6670494b6f474b6c6b4f4d714142755767426c4a50616e7345565274466e52727953684d53585768786a79486f73724b65 esp
exec ipsec sa add 39 spi 100039 crypto-alg aes-cbc-128 crypto-key 7758587a414c7a4c68496e735558456e integ-alg sha-512-256 integ-key 7a52734b6b734b6849486e6d52656a6670494b6f474b6c6b4f4d714142755767426c4a50616e7345565274466e52727953684d53585768786a79486f73724b65 esp
exec ipsec tunnel protect ipip39 sa-out 100039 sa-in 39 add
exec ip route add 100.0.0.1/8 via 200.0.0.101 TenGigabitEthernet8/0/0
exec set interface unnumbered ipip0 use TenGigabitEthernet8/0/0
exec set interface state ipip0 up
exec ip route add 10.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use TenGigabitEthernet8/0/0
exec set interface state ipip1 up
exec ip route add 10.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use TenGigabitEthernet8/0/0
exec set interface state ipip2 up
exec ip route add 10.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use TenGigabitEthernet8/0/0
exec set interface state ipip3 up
exec ip route add 10.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use TenGigabitEthernet8/0/0
exec set interface state ipip4 up
exec ip route add 10.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use TenGigabitEthernet8/0/0
exec set interface state ipip5 up
exec ip route add 10.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use TenGigabitEthernet8/0/0
exec set interface state ipip6 up
exec ip route add 10.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use TenGigabitEthernet8/0/0
exec set interface state ipip7 up
exec ip route add 10.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use TenGigabitEthernet8/0/0
exec set interface state ipip8 up
exec ip route add 10.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use TenGigabitEthernet8/0/0
exec set interface state ipip9 up
exec ip route add 10.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use TenGigabitEthernet8/0/0
exec set interface state ipip10 up
exec ip route add 10.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use TenGigabitEthernet8/0/0
exec set interface state ipip11 up
exec ip route add 10.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use TenGigabitEthernet8/0/0
exec set interface state ipip12 up
exec ip route add 10.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use TenGigabitEthernet8/0/0
exec set interface state ipip13 up
exec ip route add 10.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use TenGigabitEthernet8/0/0
exec set interface state ipip14 up
exec ip route add 10.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use TenGigabitEthernet8/0/0
exec set interface state ipip15 up
exec ip route add 10.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use TenGigabitEthernet8/0/0
exec set interface state ipip16 up
exec ip route add 10.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use TenGigabitEthernet8/0/0
exec set interface state ipip17 up
exec ip route add 10.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use TenGigabitEthernet8/0/0
exec set interface state ipip18 up
exec ip route add 10.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use TenGigabitEthernet8/0/0
exec set interface state ipip19 up
exec ip route add 10.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use TenGigabitEthernet8/0/0
exec set interface state ipip20 up
exec ip route add 10.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use TenGigabitEthernet8/0/0
exec set interface state ipip21 up
exec ip route add 10.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use TenGigabitEthernet8/0/0
exec set interface state ipip22 up
exec ip route add 10.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use TenGigabitEthernet8/0/0
exec set interface state ipip23 up
exec ip route add 10.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use TenGigabitEthernet8/0/0
exec set interface state ipip24 up
exec ip route add 10.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use TenGigabitEthernet8/0/0
exec set interface state ipip25 up
exec ip route add 10.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use TenGigabitEthernet8/0/0
exec set interface state ipip26 up
exec ip route add 10.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use TenGigabitEthernet8/0/0
exec set interface state ipip27 up
exec ip route add 10.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use TenGigabitEthernet8/0/0
exec set interface state ipip28 up
exec ip route add 10.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use TenGigabitEthernet8/0/0
exec set interface state ipip29 up
exec ip route add 10.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use TenGigabitEthernet8/0/0
exec set interface state ipip30 up
exec ip route add 10.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use TenGigabitEthernet8/0/0
exec set interface state ipip31 up
exec ip route add 10.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use TenGigabitEthernet8/0/0
exec set interface state ipip32 up
exec ip route add 10.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use TenGigabitEthernet8/0/0
exec set interface state ipip33 up
exec ip route add 10.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use TenGigabitEthernet8/0/0
exec set interface state ipip34 up
exec ip route add 10.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use TenGigabitEthernet8/0/0
exec set interface state ipip35 up
exec ip route add 10.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use TenGigabitEthernet8/0/0
exec set interface state ipip36 up
exec ip route add 10.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use TenGigabitEthernet8/0/0
exec set interface state ipip37 up
exec ip route add 10.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use TenGigabitEthernet8/0/0
exec set interface state ipip38 up
exec ip route add 10.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use TenGigabitEthernet8/0/0
exec set interface state ipip39 up
exec ip route add 10.0.0.39/32 via ipip39

 1518b-1t1c-ethip4ipsec40tnlsw-ip4base- 
int-aes128cbc-hmac512sha-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec create loopback interface
exec set interface state loop0 up
exec set interface ip address TenGigabitEthernet8/0/0 200.0.0.101/24
exec set ip neighbor TenGigabitEthernet8/0/0 200.0.0.102 ac:1f:6b:57:57:fe static
exec set interface ip address loop0 100.0.0.1/32
exec create ipip tunnel src 100.0.0.1 dst 200.0.0.102 p2p
exec ipsec sa add 0 spi 100000 crypto-alg aes-cbc-128 crypto-key 5255575450586b544c67455370735247 integ-alg sha-512-256 integ-key 58676c614e5844576a596f6f5751654d71796c7a7a456f6d696c507671485162754c5a466f4e426d5648666d4b4c5272416776414e556b4e6a6e79617a57534b esp
exec ipsec sa add 100000 spi 200000 crypto-alg aes-cbc-128 crypto-key 5255575450586b544c67455370735247 integ-alg sha-512-256 integ-key 58676c614e5844576a596f6f5751654d71796c7a7a456f6d696c507671485162754c5a466f4e426d5648666d4b4c5272416776414e556b4e6a6e79617a57534b esp
exec ipsec tunnel protect ipip0 sa-out 0 sa-in 100000 add
exec set interface ip address loop0 100.0.1.1/32
exec create ipip tunnel src 100.0.1.1 dst 200.0.0.102 p2p
exec ipsec sa add 1 spi 100001 crypto-alg aes-cbc-128 crypto-key 5663454a4c696e674e4c4b6d48514e4f integ-alg sha-512-256 integ-key 6b5446757a4a694b6d5a4b73444a7977586c564c45664b467950574d5867706572584f524e457a6b6c626d72796d516a627271466868507050667a6a436c534f esp
exec ipsec sa add 100001 spi 200001 crypto-alg aes-cbc-128 crypto-key 5663454a4c696e674e4c4b6d48514e4f integ-alg sha-512-256 integ-key 6b5446757a4a694b6d5a4b73444a7977586c564c45664b467950574d5867706572584f524e457a6b6c626d72796d516a627271466868507050667a6a436c534f esp
exec ipsec tunnel protect ipip1 sa-out 1 sa-in 100001 add
exec set interface ip address loop0 100.0.2.1/32
exec create ipip tunnel src 100.0.2.1 dst 200.0.0.102 p2p
exec ipsec sa add 2 spi 100002 crypto-alg aes-cbc-128 crypto-key 794c62506e736f564b5867636263474c integ-alg sha-512-256 integ-key 435774656245446f42496a4b7a625a4b6172774d77546c665057776a63456374465776487756565a67615a694c6c447348434f7671715a7964616e756b4e6769 esp
exec ipsec sa add 100002 spi 200002 crypto-alg aes-cbc-128 crypto-key 794c62506e736f564b5867636263474c integ-alg sha-512-256 integ-key 435774656245446f42496a4b7a625a4b6172774d77546c665057776a63456374465776487756565a67615a694c6c447348434f7671715a7964616e756b4e6769 esp
exec ipsec tunnel protect ipip2 sa-out 2 sa-in 100002 add
exec set interface ip address loop0 100.0.3.1/32
exec create ipip tunnel src 100.0.3.1 dst 200.0.0.102 p2p
exec ipsec sa add 3 spi 100003 crypto-alg aes-cbc-128 crypto-key 4375546a4161554c6d7357775570726e integ-alg sha-512-256 integ-key 74424455665258565864736272575963526f66547743517051516f686a4661497058464558676647766a4e736c436242586c545347476579745763587a4d6a54 esp
exec ipsec sa add 100003 spi 200003 crypto-alg aes-cbc-128 crypto-key 4375546a4161554c6d7357775570726e integ-alg sha-512-256 integ-key 74424455665258565864736272575963526f66547743517051516f686a4661497058464558676647766a4e736c436242586c545347476579745763587a4d6a54 esp
exec ipsec tunnel protect ipip3 sa-out 3 sa-in 100003 add
exec set interface ip address loop0 100.0.4.1/32
exec create ipip tunnel src 100.0.4.1 dst 200.0.0.102 p2p
exec ipsec sa add 4 spi 100004 crypto-alg aes-cbc-128 crypto-key 425578594d745251446c6a437a787256 integ-alg sha-512-256 integ-key 4d574f654472566853614e72645a48785450777371704959524c4272455874486874646a6c725269496d6a424b6f524c786a4a6f54557a4e7a6d485a7a784559 esp
exec ipsec sa add 100004 spi 200004 crypto-alg aes-cbc-128 crypto-key 425578594d745251446c6a437a787256 integ-alg sha-512-256 integ-key 4d574f654472566853614e72645a48785450777371704959524c4272455874486874646a6c725269496d6a424b6f524c786a4a6f54557a4e7a6d485a7a784559 esp
exec ipsec tunnel protect ipip4 sa-out 4 sa-in 100004 add
exec set interface ip address loop0 100.0.5.1/32
exec create ipip tunnel src 100.0.5.1 dst 200.0.0.102 p2p
exec ipsec sa add 5 spi 100005 crypto-alg aes-cbc-128 crypto-key 6f45636e52687a574f417a4a64546a53 integ-alg sha-512-256 integ-key 4770436848596e71624f757870624c545258434a5a6a4f75795641514b42614f4d55706a7349734966527271535a4e654e4f57445766426d6152636a57556b6b esp
exec ipsec sa add 100005 spi 200005 crypto-alg aes-cbc-128 crypto-key 6f45636e52687a574f417a4a64546a53 integ-alg sha-512-256 integ-key 4770436848596e71624f757870624c545258434a5a6a4f75795641514b42614f4d55706a7349734966527271535a4e654e4f57445766426d6152636a57556b6b esp
exec ipsec tunnel protect ipip5 sa-out 5 sa-in 100005 add
exec set interface ip address loop0 100.0.6.1/32
exec create ipip tunnel src 100.0.6.1 dst 200.0.0.102 p2p
exec ipsec sa add 6 spi 100006 crypto-alg aes-cbc-128 crypto-key 466d624a7250534a5155565645637074 integ-alg sha-512-256 integ-key 78677a7a414c4a6e597450734349775650696f6f535053744f755a476b5169484c4b494661645778434c477267755371774864446a4b73716e69435155654370 esp
exec ipsec sa add 100006 spi 200006 crypto-alg aes-cbc-128 crypto-key 466d624a7250534a5155565645637074 integ-alg sha-512-256 integ-key 78677a7a414c4a6e597450734349775650696f6f535053744f755a476b5169484c4b494661645778434c477267755371774864446a4b73716e69435155654370 esp
exec ipsec tunnel protect ipip6 sa-out 6 sa-in 100006 add
exec set interface ip address loop0 100.0.7.1/32
exec create ipip tunnel src 100.0.7.1 dst 200.0.0.102 p2p
exec ipsec sa add 7 spi 100007 crypto-alg aes-cbc-128 crypto-key 5944515a5a69695871624578714c6844 integ-alg sha-512-256 integ-key 614f5a4f67704f4559796f714453556b49574a494946764f4e584a6f5a446d676c5765566a595845646c61555a417642734e676f68526d7a6f6265417a524744 esp
exec ipsec sa add 100007 spi 200007 crypto-alg aes-cbc-128 crypto-key 5944515a5a69695871624578714c6844 integ-alg sha-512-256 integ-key 614f5a4f67704f4559796f714453556b49574a494946764f4e584a6f5a446d676c5765566a595845646c61555a417642734e676f68526d7a6f6265417a524744 esp
exec ipsec tunnel protect ipip7 sa-out 7 sa-in 100007 add
exec set interface ip address loop0 100.0.8.1/32
exec create ipip tunnel src 100.0.8.1 dst 200.0.0.102 p2p
exec ipsec sa add 8 spi 100008 crypto-alg aes-cbc-128 crypto-key 6c5279564b7a71767959727847547543 integ-alg sha-512-256 integ-key 516e4d616547746e5652454242575a6346684b43456d4a596548487941554e44676f7665576470435564774851647950726670554f596f6763564f4248744e66 esp
exec ipsec sa add 100008 spi 200008 crypto-alg aes-cbc-128 crypto-key 6c5279564b7a71767959727847547543 integ-alg sha-512-256 integ-key 516e4d616547746e5652454242575a6346684b43456d4a596548487941554e44676f7665576470435564774851647950726670554f596f6763564f4248744e66 esp
exec ipsec tunnel protect ipip8 sa-out 8 sa-in 100008 add
exec set interface ip address loop0 100.0.9.1/32
exec create ipip tunnel src 100.0.9.1 dst 200.0.0.102 p2p
exec ipsec sa add 9 spi 100009 crypto-alg aes-cbc-128 crypto-key 6a725253586171684e6a637245634873 integ-alg sha-512-256 integ-key 64644477576b5558584b6c624442475775505149427858526c68765368744d4264696a73754c576d705374784579584e5776455044574746456861786379705a esp
exec ipsec sa add 100009 spi 200009 crypto-alg aes-cbc-128 crypto-key 6a725253586171684e6a637245634873 integ-alg sha-512-256 integ-key 64644477576b5558584b6c624442475775505149427858526c68765368744d4264696a73754c576d705374784579584e5776455044574746456861786379705a esp
exec ipsec tunnel protect ipip9 sa-out 9 sa-in 100009 add
exec set interface ip address loop0 100.0.10.1/32
exec create ipip tunnel src 100.0.10.1 dst 200.0.0.102 p2p
exec ipsec sa add 10 spi 100010 crypto-alg aes-cbc-128 crypto-key 4b697868716d594b46516f4545696b77 integ-alg sha-512-256 integ-key 4d63684b444f7865586a4569534363594f4368704e545a4a4159797765756959674965504744474c56626f726a4c61625a446c5741626e4a69676c4379526446 esp
exec ipsec sa add 100010 spi 200010 crypto-alg aes-cbc-128 crypto-key 4b697868716d594b46516f4545696b77 integ-alg sha-512-256 integ-key 4d63684b444f7865586a4569534363594f4368704e545a4a4159797765756959674965504744474c56626f726a4c61625a446c5741626e4a69676c4379526446 esp
exec ipsec tunnel protect ipip10 sa-out 10 sa-in 100010 add
exec set interface ip address loop0 100.0.11.1/32
exec create ipip tunnel src 100.0.11.1 dst 200.0.0.102 p2p
exec ipsec sa add 11 spi 100011 crypto-alg aes-cbc-128 crypto-key 4a416374707553757848656967787761 integ-alg sha-512-256 integ-key 677a4a446d6348596c507359424378526a5358706e4a4a635a6241664558667a666654786977447669454b48516e7a7374466e4e7254576443544f7479537954 esp
exec ipsec sa add 100011 spi 200011 crypto-alg aes-cbc-128 crypto-key 4a416374707553757848656967787761 integ-alg sha-512-256 integ-key 677a4a446d6348596c507359424378526a5358706e4a4a635a6241664558667a666654786977447669454b48516e7a7374466e4e7254576443544f7479537954 esp
exec ipsec tunnel protect ipip11 sa-out 11 sa-in 100011 add
exec set interface ip address loop0 100.0.12.1/32
exec create ipip tunnel src 100.0.12.1 dst 200.0.0.102 p2p
exec ipsec sa add 12 spi 100012 crypto-alg aes-cbc-128 crypto-key 4c457762734a52764376704a59716172 integ-alg sha-512-256 integ-key 6569736d677a446252436751584e55487365494a6e6c666972754a594148566d74436975575648734c707a68615544747154664d4c4d4769564151474c624178 esp
exec ipsec sa add 100012 spi 200012 crypto-alg aes-cbc-128 crypto-key 4c457762734a52764376704a59716172 integ-alg sha-512-256 integ-key 6569736d677a446252436751584e55487365494a6e6c666972754a594148566d74436975575648734c707a68615544747154664d4c4d4769564151474c624178 esp
exec ipsec tunnel protect ipip12 sa-out 12 sa-in 100012 add
exec set interface ip address loop0 100.0.13.1/32
exec create ipip tunnel src 100.0.13.1 dst 200.0.0.102 p2p
exec ipsec sa add 13 spi 100013 crypto-alg aes-cbc-128 crypto-key 4c72596c706c7a69534265427151706f integ-alg sha-512-256 integ-key 7a444d594646754d4964426c645548577872416e57674a44714752664d676a5170786f4b6b73517256474f4661727174676d645a65796c597a57615a6267644c esp
exec ipsec sa add 100013 spi 200013 crypto-alg aes-cbc-128 crypto-key 4c72596c706c7a69534265427151706f integ-alg sha-512-256 integ-key 7a444d594646754d4964426c645548577872416e57674a44714752664d676a5170786f4b6b73517256474f4661727174676d645a65796c597a57615a6267644c esp
exec ipsec tunnel protect ipip13 sa-out 13 sa-in 100013 add
exec set interface ip address loop0 100.0.14.1/32
exec create ipip tunnel src 100.0.14.1 dst 200.0.0.102 p2p
exec ipsec sa add 14 spi 100014 crypto-alg aes-cbc-128 crypto-key 73424975587a4f65636c49794f677464 integ-alg sha-512-256 integ-key 4d644a6c4a48566d764c765a75766857746945525465506c4b6f6368567443756443756e465a6146476d6470666a58705a5954704457514763637a5a646d555a esp
exec ipsec sa add 100014 spi 200014 crypto-alg aes-cbc-128 crypto-key 73424975587a4f65636c49794f677464 integ-alg sha-512-256 integ-key 4d644a6c4a48566d764c765a75766857746945525465506c4b6f6368567443756443756e465a6146476d6470666a58705a5954704457514763637a5a646d555a esp
exec ipsec tunnel protect ipip14 sa-out 14 sa-in 100014 add
exec set interface ip address loop0 100.0.15.1/32
exec create ipip tunnel src 100.0.15.1 dst 200.0.0.102 p2p
exec ipsec sa add 15 spi 100015 crypto-alg aes-cbc-128 crypto-key 787571685a747654735a78706e566e71 integ-alg sha-512-256 integ-key 5851626a526e764f4d66447379527762686d71505a535a776a654d415a6462767461456471556966494a66784958424e4b7978625042556c794844764e487358 esp
exec ipsec sa add 100015 spi 200015 crypto-alg aes-cbc-128 crypto-key 787571685a747654735a78706e566e71 integ-alg sha-512-256 integ-key 5851626a526e764f4d66447379527762686d71505a535a776a654d415a6462767461456471556966494a66784958424e4b7978625042556c794844764e487358 esp
exec ipsec tunnel protect ipip15 sa-out 15 sa-in 100015 add
exec set interface ip address loop0 100.0.16.1/32
exec create ipip tunnel src 100.0.16.1 dst 200.0.0.102 p2p
exec ipsec sa add 16 spi 100016 crypto-alg aes-cbc-128 crypto-key 5772787959646f6c5a484e5741796567 integ-alg sha-512-256 integ-key 6e6e5272695266646541777669646d6f436c7248635a4b595277507952696b415448587244576c52747947655545525064755a7442484b53494e4b7574575570 esp
exec ipsec sa add 100016 spi 200016 crypto-alg aes-cbc-128 crypto-key 5772787959646f6c5a484e5741796567 integ-alg sha-512-256 integ-key 6e6e5272695266646541777669646d6f436c7248635a4b595277507952696b415448587244576c52747947655545525064755a7442484b53494e4b7574575570 esp
exec ipsec tunnel protect ipip16 sa-out 16 sa-in 100016 add
exec set interface ip address loop0 100.0.17.1/32
exec create ipip tunnel src 100.0.17.1 dst 200.0.0.102 p2p
exec ipsec sa add 17 spi 100017 crypto-alg aes-cbc-128 crypto-key 6c6b6c59654b704c59554d557a584f78 integ-alg sha-512-256 integ-key 6a675441506e4856536f4648725059537a4264794e45776a686a786d53427242426f594b744b7148566a716c56687744446c5a6278706779724c6b537a436474 esp
exec ipsec sa add 100017 spi 200017 crypto-alg aes-cbc-128 crypto-key 6c6b6c59654b704c59554d557a584f78 integ-alg sha-512-256 integ-key 6a675441506e4856536f4648725059537a4264794e45776a686a786d53427242426f594b744b7148566a716c56687744446c5a6278706779724c6b537a436474 esp
exec ipsec tunnel protect ipip17 sa-out 17 sa-in 100017 add
exec set interface ip address loop0 100.0.18.1/32
exec create ipip tunnel src 100.0.18.1 dst 200.0.0.102 p2p
exec ipsec sa add 18 spi 100018 crypto-alg aes-cbc-128 crypto-key 6a4d675476506b637a6a704c6b48746b integ-alg sha-512-256 integ-key 566c6a4b5a67674a726250467658687a424a645647484b5661764c6a454579475775444b4858527944625a6d71535947514d766c756974744554764a77627746 esp
exec ipsec sa add 100018 spi 200018 crypto-alg aes-cbc-128 crypto-key 6a4d675476506b637a6a704c6b48746b integ-alg sha-512-256 integ-key 566c6a4b5a67674a726250467658687a424a645647484b5661764c6a454579475775444b4858527944625a6d71535947514d766c756974744554764a77627746 esp
exec ipsec tunnel protect ipip18 sa-out 18 sa-in 100018 add
exec set interface ip address loop0 100.0.19.1/32
exec create ipip tunnel src 100.0.19.1 dst 200.0.0.102 p2p
exec ipsec sa add 19 spi 100019 crypto-alg aes-cbc-128 crypto-key 6d4c696a557859706e4d684d617a6b53 integ-alg sha-512-256 integ-key 6379454a4754474e6550567a4b63744c65715378574c4650445052724d6a55487968586c5a427152686e6767595070764b4d6652574a6c4a6a6346515361465a esp
exec ipsec sa add 100019 spi 200019 crypto-alg aes-cbc-128 crypto-key 6d4c696a557859706e4d684d617a6b53 integ-alg sha-512-256 integ-key 6379454a4754474e6550567a4b63744c65715378574c4650445052724d6a55487968586c5a427152686e6767595070764b4d6652574a6c4a6a6346515361465a esp
exec ipsec tunnel protect ipip19 sa-out 19 sa-in 100019 add
exec set interface ip address loop0 100.0.20.1/32
exec create ipip tunnel src 100.0.20.1 dst 200.0.0.102 p2p
exec ipsec sa add 20 spi 100020 crypto-alg aes-cbc-128 crypto-key 584c42524e6c5a7366584f58576a6d43 integ-alg sha-512-256 integ-key 696774597850416570666458745a6359794662596362454c63574d47744f705a4d7a765252554a4b675771775a566c744c736a5472714f776953707978724474 esp
exec ipsec sa add 100020 spi 200020 crypto-alg aes-cbc-128 crypto-key 584c42524e6c5a7366584f58576a6d43 integ-alg sha-512-256 integ-key 696774597850416570666458745a6359794662596362454c63574d47744f705a4d7a765252554a4b675771775a566c744c736a5472714f776953707978724474 esp
exec ipsec tunnel protect ipip20 sa-out 20 sa-in 100020 add
exec set interface ip address loop0 100.0.21.1/32
exec create ipip tunnel src 100.0.21.1 dst 200.0.0.102 p2p
exec ipsec sa add 21 spi 100021 crypto-alg aes-cbc-128 crypto-key 64716f42705156756f575863504a5448 integ-alg sha-512-256 integ-key 5a486a4763536578727167784d71536a586f464e706f4a42525956667157477073435776596a54616d6d757067665547796551415567624c59495144794e4247 esp
exec ipsec sa add 100021 spi 200021 crypto-alg aes-cbc-128 crypto-key 64716f42705156756f575863504a5448 integ-alg sha-512-256 integ-key 5a486a4763536578727167784d71536a586f464e706f4a42525956667157477073435776596a54616d6d757067665547796551415567624c59495144794e4247 esp
exec ipsec tunnel protect ipip21 sa-out 21 sa-in 100021 add
exec set interface ip address loop0 100.0.22.1/32
exec create ipip tunnel src 100.0.22.1 dst 200.0.0.102 p2p
exec ipsec sa add 22 spi 100022 crypto-alg aes-cbc-128 crypto-key 724e6279465868687575626349465553 integ-alg sha-512-256 integ-key 514e52446e4d65554c455a72436756486e537766427a5447514f654a594f504f6c6e41496a665164546876634d5a414c6a6962535569526d4b71764b4e465143 esp
exec ipsec sa add 100022 spi 200022 crypto-alg aes-cbc-128 crypto-key 724e6279465868687575626349465553 integ-alg sha-512-256 integ-key 514e52446e4d65554c455a72436756486e537766427a5447514f654a594f504f6c6e41496a665164546876634d5a414c6a6962535569526d4b71764b4e465143 esp
exec ipsec tunnel protect ipip22 sa-out 22 sa-in 100022 add
exec set interface ip address loop0 100.0.23.1/32
exec create ipip tunnel src 100.0.23.1 dst 200.0.0.102 p2p
exec ipsec sa add 23 spi 100023 crypto-alg aes-cbc-128 crypto-key 55786e6c484b697a476e647858726a45 integ-alg sha-512-256 integ-key 4f6879766364646f7846615946764d6f6648667575584c72786c6f69416e4a7754654370626c5561624d716341494168415574415a7a4f73415a675569716971 esp
exec ipsec sa add 100023 spi 200023 crypto-alg aes-cbc-128 crypto-key 55786e6c484b697a476e647858726a45 integ-alg sha-512-256 integ-key 4f6879766364646f7846615946764d6f6648667575584c72786c6f69416e4a7754654370626c5561624d716341494168415574415a7a4f73415a675569716971 esp
exec ipsec tunnel protect ipip23 sa-out 23 sa-in 100023 add
exec set interface ip address loop0 100.0.24.1/32
exec create ipip tunnel src 100.0.24.1 dst 200.0.0.102 p2p
exec ipsec sa add 24 spi 100024 crypto-alg aes-cbc-128 crypto-key 4257484762506f4a4276695346527a59 integ-alg sha-512-256 integ-key 63646b4f674e62554e634f527a486d4156706164544a6c6342456f506e41675065554a41474b536c7a4b556b4b494a5a51705a7357705a6d5a63667a654f4b7a esp
exec ipsec sa add 100024 spi 200024 crypto-alg aes-cbc-128 crypto-key 4257484762506f4a4276695346527a59 integ-alg sha-512-256 integ-key 63646b4f674e62554e634f527a486d4156706164544a6c6342456f506e41675065554a41474b536c7a4b556b4b494a5a51705a7357705a6d5a63667a654f4b7a esp
exec ipsec tunnel protect ipip24 sa-out 24 sa-in 100024 add
exec set interface ip address loop0 100.0.25.1/32
exec create ipip tunnel src 100.0.25.1 dst 200.0.0.102 p2p
exec ipsec sa add 25 spi 100025 crypto-alg aes-cbc-128 crypto-key 57506d6c6b5a4f654675634750744971 integ-alg sha-512-256 integ-key 736f6d6979634a657343526c71564a75466244424f6850446b70634b76647242694764436a6d4b6b59745844734242567063556545575a5163636767444e5173 esp
exec ipsec sa add 100025 spi 200025 crypto-alg aes-cbc-128 crypto-key 57506d6c6b5a4f654675634750744971 integ-alg sha-512-256 integ-key 736f6d6979634a657343526c71564a75466244424f6850446b70634b76647242694764436a6d4b6b59745844734242567063556545575a5163636767444e5173 esp
exec ipsec tunnel protect ipip25 sa-out 25 sa-in 100025 add
exec set interface ip address loop0 100.0.26.1/32
exec create ipip tunnel src 100.0.26.1 dst 200.0.0.102 p2p
exec ipsec sa add 26 spi 100026 crypto-alg aes-cbc-128 crypto-key 49724f634a65574b5867714479455063 integ-alg sha-512-256 integ-key 68646145735a674d6142696968494b436e79754f7a6f544e704276634e4372666b715377424e4575465158637863626a506f444f674646516f5a4e42776b6b4b esp
exec ipsec sa add 100026 spi 200026 crypto-alg aes-cbc-128 crypto-key 49724f634a65574b5867714479455063 integ-alg sha-512-256 integ-key 68646145735a674d6142696968494b436e79754f7a6f544e704276634e4372666b715377424e4575465158637863626a506f444f674646516f5a4e42776b6b4b esp
exec ipsec tunnel protect ipip26 sa-out 26 sa-in 100026 add
exec set interface ip address loop0 100.0.27.1/32
exec create ipip tunnel src 100.0.27.1 dst 200.0.0.102 p2p
exec ipsec sa add 27 spi 100027 crypto-alg aes-cbc-128 crypto-key 6179745478534a766f786b6f4d6e6a42 integ-alg sha-512-256 integ-key 4a4266744762754276706f4552454e6c564f444f6e6a434870524a57646e704466666d736a586a426a4c64625576457873765367664573726a52446b74596f74 esp
exec ipsec sa add 100027 spi 200027 crypto-alg aes-cbc-128 crypto-key 6179745478534a766f786b6f4d6e6a42 integ-alg sha-512-256 integ-key 4a4266744762754276706f4552454e6c564f444f6e6a434870524a57646e704466666d736a586a426a4c64625576457873765367664573726a52446b74596f74 esp
exec ipsec tunnel protect ipip27 sa-out 27 sa-in 100027 add
exec set interface ip address loop0 100.0.28.1/32
exec create ipip tunnel src 100.0.28.1 dst 200.0.0.102 p2p
exec ipsec sa add 28 spi 100028 crypto-alg aes-cbc-128 crypto-key 6d50487959457963456c47456b596b45 integ-alg sha-512-256 integ-key 6844556a784f47764477546a72577355716a4c634c4b634643704e476d58475953456a6576666858534d6362595749687043666f50726c6477544a475071434e esp
exec ipsec sa add 100028 spi 200028 crypto-alg aes-cbc-128 crypto-key 6d50487959457963456c47456b596b45 integ-alg sha-512-256 integ-key 6844556a784f47764477546a72577355716a4c634c4b634643704e476d58475953456a6576666858534d6362595749687043666f50726c6477544a475071434e esp
exec ipsec tunnel protect ipip28 sa-out 28 sa-in 100028 add
exec set interface ip address loop0 100.0.29.1/32
exec create ipip tunnel src 100.0.29.1 dst 200.0.0.102 p2p
exec ipsec sa add 29 spi 100029 crypto-alg aes-cbc-128 crypto-key 43455772706d61587a4950627672746a integ-alg sha-512-256 integ-key 495877794e797873596c55655a7a6f58537a4371755a535376525250656d4c55466d6f74734a49494d636a764a5665675a6749665566595567706b4666675750 esp
exec ipsec sa add 100029 spi 200029 crypto-alg aes-cbc-128 crypto-key 43455772706d61587a4950627672746a integ-alg sha-512-256 integ-key 495877794e797873596c55655a7a6f58537a4371755a535376525250656d4c55466d6f74734a49494d636a764a5665675a6749665566595567706b4666675750 esp
exec ipsec tunnel protect ipip29 sa-out 29 sa-in 100029 add
exec set interface ip address loop0 100.0.30.1/32
exec create ipip tunnel src 100.0.30.1 dst 200.0.0.102 p2p
exec ipsec sa add 30 spi 100030 crypto-alg aes-cbc-128 crypto-key 4e59424f62656f4c6e4f5675786f5350 integ-alg sha-512-256 integ-key 47516e496f445467696757646878774a446171786d546656714f487073584270677473516e576f56506948556c6668586a45496d4a6b45527365586c6d475978 esp
exec ipsec sa add 100030 spi 200030 crypto-alg aes-cbc-128 crypto-key 4e59424f62656f4c6e4f5675786f5350 integ-alg sha-512-256 integ-key 47516e496f445467696757646878774a446171786d546656714f487073584270677473516e576f56506948556c6668586a45496d4a6b45527365586c6d475978 esp
exec ipsec tunnel protect ipip30 sa-out 30 sa-in 100030 add
exec set interface ip address loop0 100.0.31.1/32
exec create ipip tunnel src 100.0.31.1 dst 200.0.0.102 p2p
exec ipsec sa add 31 spi 100031 crypto-alg aes-cbc-128 crypto-key 5a4261425a704367664a4c5675494e44 integ-alg sha-512-256 integ-key 4f486541616d4f71625a51644d624c4d466f786f5164705375435957594e477361417767576451675466756c474d494a4a7a4f44636f6d616644514176727050 esp
exec ipsec sa add 100031 spi 200031 crypto-alg aes-cbc-128 crypto-key 5a4261425a704367664a4c5675494e44 integ-alg sha-512-256 integ-key 4f486541616d4f71625a51644d624c4d466f786f5164705375435957594e477361417767576451675466756c474d494a4a7a4f44636f6d616644514176727050 esp
exec ipsec tunnel protect ipip31 sa-out 31 sa-in 100031 add
exec set interface ip address loop0 100.0.32.1/32
exec create ipip tunnel src 100.0.32.1 dst 200.0.0.102 p2p
exec ipsec sa add 32 spi 100032 crypto-alg aes-cbc-128 crypto-key 746a626c65775762497965584d464868 integ-alg sha-512-256 integ-key 6a716b67415750766e59444851624c594f42786158496d76756c784561504673446d414a7345474b49754750674252476e746a465651545857726867786d554d esp
exec ipsec sa add 100032 spi 200032 crypto-alg aes-cbc-128 crypto-key 746a626c65775762497965584d464868 integ-alg sha-512-256 integ-key 6a716b67415750766e59444851624c594f42786158496d76756c784561504673446d414a7345474b49754750674252476e746a465651545857726867786d554d esp
exec ipsec tunnel protect ipip32 sa-out 32 sa-in 100032 add
exec set interface ip address loop0 100.0.33.1/32
exec create ipip tunnel src 100.0.33.1 dst 200.0.0.102 p2p
exec ipsec sa add 33 spi 100033 crypto-alg aes-cbc-128 crypto-key 75657a57564d7948564c6e4a67465852 integ-alg sha-512-256 integ-key 63744a7758774f44706e517a4e4a784a6f545552674e7454794a4e456d6d4b7148527a7645686c7a705641557668514c65777a7478525862704355614655564d esp
exec ipsec sa add 100033 spi 200033 crypto-alg aes-cbc-128 crypto-key 75657a57564d7948564c6e4a67465852 integ-alg sha-512-256 integ-key 63744a7758774f44706e517a4e4a784a6f545552674e7454794a4e456d6d4b7148527a7645686c7a705641557668514c65777a7478525862704355614655564d esp
exec ipsec tunnel protect ipip33 sa-out 33 sa-in 100033 add
exec set interface ip address loop0 100.0.34.1/32
exec create ipip tunnel src 100.0.34.1 dst 200.0.0.102 p2p
exec ipsec sa add 34 spi 100034 crypto-alg aes-cbc-128 crypto-key 4e73684f536f7351654b497959756847 integ-alg sha-512-256 integ-key 6f496452764a64694779684555504a4261667472487951505861446d716b4677544a526756554d486f4558574f704e565a417a4e516842436a456f6f706b6462 esp
exec ipsec sa add 100034 spi 200034 crypto-alg aes-cbc-128 crypto-key 4e73684f536f7351654b497959756847 integ-alg sha-512-256 integ-key 6f496452764a64694779684555504a4261667472487951505861446d716b4677544a526756554d486f4558574f704e565a417a4e516842436a456f6f706b6462 esp
exec ipsec tunnel protect ipip34 sa-out 34 sa-in 100034 add
exec set interface ip address loop0 100.0.35.1/32
exec create ipip tunnel src 100.0.35.1 dst 200.0.0.102 p2p
exec ipsec sa add 35 spi 100035 crypto-alg aes-cbc-128 crypto-key 6a65677854514b704d4a414c66515545 integ-alg sha-512-256 integ-key 747969477968624e775662564b79574f6a5444675166496e5163676e4f76484450554e6c55497a5270535a5a4f455056524f58546c5146514977476c4f794943 esp
exec ipsec sa add 100035 spi 200035 crypto-alg aes-cbc-128 crypto-key 6a65677854514b704d4a414c66515545 integ-alg sha-512-256 integ-key 747969477968624e775662564b79574f6a5444675166496e5163676e4f76484450554e6c55497a5270535a5a4f455056524f58546c5146514977476c4f794943 esp
exec ipsec tunnel protect ipip35 sa-out 35 sa-in 100035 add
exec set interface ip address loop0 100.0.36.1/32
exec create ipip tunnel src 100.0.36.1 dst 200.0.0.102 p2p
exec ipsec sa add 36 spi 100036 crypto-alg aes-cbc-128 crypto-key 6d6d67705771474568594f524a695964 integ-alg sha-512-256 integ-key 4b4252644b666865436b4c7472534f44644871695065724c4b486d466f7a5561464e59436a736f6c416242546d4552744842566f70624a54626e777551686d43 esp
exec ipsec sa add 100036 spi 200036 crypto-alg aes-cbc-128 crypto-key 6d6d67705771474568594f524a695964 integ-alg sha-512-256 integ-key 4b4252644b666865436b4c7472534f44644871695065724c4b486d466f7a5561464e59436a736f6c416242546d4552744842566f70624a54626e777551686d43 esp
exec ipsec tunnel protect ipip36 sa-out 36 sa-in 100036 add
exec set interface ip address loop0 100.0.37.1/32
exec create ipip tunnel src 100.0.37.1 dst 200.0.0.102 p2p
exec ipsec sa add 37 spi 100037 crypto-alg aes-cbc-128 crypto-key 654867796d5274586b51784c52686955 integ-alg sha-512-256 integ-key 6c5243716f6653425a426e536d6b48696962576c764c5a5550734b49524b69767077424758546a6c61464d58616668714b55666f43454159465957574a787762 esp
exec ipsec sa add 100037 spi 200037 crypto-alg aes-cbc-128 crypto-key 654867796d5274586b51784c52686955 integ-alg sha-512-256 integ-key 6c5243716f6653425a426e536d6b48696962576c764c5a5550734b49524b69767077424758546a6c61464d58616668714b55666f43454159465957574a787762 esp
exec ipsec tunnel protect ipip37 sa-out 37 sa-in 100037 add
exec set interface ip address loop0 100.0.38.1/32
exec create ipip tunnel src 100.0.38.1 dst 200.0.0.102 p2p
exec ipsec sa add 38 spi 100038 crypto-alg aes-cbc-128 crypto-key 4a4b77625870446146596a696169467a integ-alg sha-512-256 integ-key 516f7778554f684450704c774f4d455343515055507970427858784c6465517a4e50554844436e75536e594a48556e6367676663507346554e4d535251536d68 esp
exec ipsec sa add 100038 spi 200038 crypto-alg aes-cbc-128 crypto-key 4a4b77625870446146596a696169467a integ-alg sha-512-256 integ-key 516f7778554f684450704c774f4d455343515055507970427858784c6465517a4e50554844436e75536e594a48556e6367676663507346554e4d535251536d68 esp
exec ipsec tunnel protect ipip38 sa-out 38 sa-in 100038 add
exec set interface ip address loop0 100.0.39.1/32
exec create ipip tunnel src 100.0.39.1 dst 200.0.0.102 p2p
exec ipsec sa add 39 spi 100039 crypto-alg aes-cbc-128 crypto-key 6b754e6a454d765964626a4d50734e71 integ-alg sha-512-256 integ-key 75696e4e476f756c6c4b4e50516f784e7a6e76666169555a6554684f6152634a4b486d595661576a7949686275716c725a5a7162714b71414a656f58784c4747 esp
exec ipsec sa add 100039 spi 200039 crypto-alg aes-cbc-128 crypto-key 6b754e6a454d765964626a4d50734e71 integ-alg sha-512-256 integ-key 75696e4e476f756c6c4b4e50516f784e7a6e76666169555a6554684f6152634a4b486d595661576a7949686275716c725a5a7162714b71414a656f58784c4747 esp
exec ipsec tunnel protect ipip39 sa-out 39 sa-in 100039 add
exec set interface unnumbered ipip0 use TenGigabitEthernet8/0/0
exec set interface state ipip0 up
exec ip route add 20.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use TenGigabitEthernet8/0/0
exec set interface state ipip1 up
exec ip route add 20.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use TenGigabitEthernet8/0/0
exec set interface state ipip2 up
exec ip route add 20.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use TenGigabitEthernet8/0/0
exec set interface state ipip3 up
exec ip route add 20.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use TenGigabitEthernet8/0/0
exec set interface state ipip4 up
exec ip route add 20.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use TenGigabitEthernet8/0/0
exec set interface state ipip5 up
exec ip route add 20.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use TenGigabitEthernet8/0/0
exec set interface state ipip6 up
exec ip route add 20.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use TenGigabitEthernet8/0/0
exec set interface state ipip7 up
exec ip route add 20.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use TenGigabitEthernet8/0/0
exec set interface state ipip8 up
exec ip route add 20.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use TenGigabitEthernet8/0/0
exec set interface state ipip9 up
exec ip route add 20.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use TenGigabitEthernet8/0/0
exec set interface state ipip10 up
exec ip route add 20.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use TenGigabitEthernet8/0/0
exec set interface state ipip11 up
exec ip route add 20.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use TenGigabitEthernet8/0/0
exec set interface state ipip12 up
exec ip route add 20.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use TenGigabitEthernet8/0/0
exec set interface state ipip13 up
exec ip route add 20.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use TenGigabitEthernet8/0/0
exec set interface state ipip14 up
exec ip route add 20.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use TenGigabitEthernet8/0/0
exec set interface state ipip15 up
exec ip route add 20.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use TenGigabitEthernet8/0/0
exec set interface state ipip16 up
exec ip route add 20.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use TenGigabitEthernet8/0/0
exec set interface state ipip17 up
exec ip route add 20.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use TenGigabitEthernet8/0/0
exec set interface state ipip18 up
exec ip route add 20.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use TenGigabitEthernet8/0/0
exec set interface state ipip19 up
exec ip route add 20.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use TenGigabitEthernet8/0/0
exec set interface state ipip20 up
exec ip route add 20.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use TenGigabitEthernet8/0/0
exec set interface state ipip21 up
exec ip route add 20.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use TenGigabitEthernet8/0/0
exec set interface state ipip22 up
exec ip route add 20.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use TenGigabitEthernet8/0/0
exec set interface state ipip23 up
exec ip route add 20.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use TenGigabitEthernet8/0/0
exec set interface state ipip24 up
exec ip route add 20.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use TenGigabitEthernet8/0/0
exec set interface state ipip25 up
exec ip route add 20.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use TenGigabitEthernet8/0/0
exec set interface state ipip26 up
exec ip route add 20.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use TenGigabitEthernet8/0/0
exec set interface state ipip27 up
exec ip route add 20.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use TenGigabitEthernet8/0/0
exec set interface state ipip28 up
exec ip route add 20.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use TenGigabitEthernet8/0/0
exec set interface state ipip29 up
exec ip route add 20.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use TenGigabitEthernet8/0/0
exec set interface state ipip30 up
exec ip route add 20.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use TenGigabitEthernet8/0/0
exec set interface state ipip31 up
exec ip route add 20.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use TenGigabitEthernet8/0/0
exec set interface state ipip32 up
exec ip route add 20.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use TenGigabitEthernet8/0/0
exec set interface state ipip33 up
exec ip route add 20.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use TenGigabitEthernet8/0/0
exec set interface state ipip34 up
exec ip route add 20.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use TenGigabitEthernet8/0/0
exec set interface state ipip35 up
exec ip route add 20.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use TenGigabitEthernet8/0/0
exec set interface state ipip36 up
exec ip route add 20.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use TenGigabitEthernet8/0/0
exec set interface state ipip37 up
exec ip route add 20.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use TenGigabitEthernet8/0/0
exec set interface state ipip38 up
exec ip route add 20.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use TenGigabitEthernet8/0/0
exec set interface state ipip39 up
exec ip route add 20.0.0.39/32 via ipip39
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec set interface ip address TenGigabitEthernet8/0/0 200.0.0.102/24.0
exec create ipip tunnel src 200.0.0.102 dst 100.0.0.1 p2p
exec ipsec sa add 100000 spi 200000 crypto-alg aes-cbc-128 crypto-key 5255575450586b544c67455370735247 integ-alg sha-512-256 integ-key 58676c614e5844576a596f6f5751654d71796c7a7a456f6d696c507671485162754c5a466f4e426d5648666d4b4c5272416776414e556b4e6a6e79617a57534b esp
exec ipsec sa add 0 spi 100000 crypto-alg aes-cbc-128 crypto-key 5255575450586b544c67455370735247 integ-alg sha-512-256 integ-key 58676c614e5844576a596f6f5751654d71796c7a7a456f6d696c507671485162754c5a466f4e426d5648666d4b4c5272416776414e556b4e6a6e79617a57534b esp
exec ipsec tunnel protect ipip0 sa-out 100000 sa-in 0 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.1.1 p2p
exec ipsec sa add 100001 spi 200001 crypto-alg aes-cbc-128 crypto-key 5663454a4c696e674e4c4b6d48514e4f integ-alg sha-512-256 integ-key 6b5446757a4a694b6d5a4b73444a7977586c564c45664b467950574d5867706572584f524e457a6b6c626d72796d516a627271466868507050667a6a436c534f esp
exec ipsec sa add 1 spi 100001 crypto-alg aes-cbc-128 crypto-key 5663454a4c696e674e4c4b6d48514e4f integ-alg sha-512-256 integ-key 6b5446757a4a694b6d5a4b73444a7977586c564c45664b467950574d5867706572584f524e457a6b6c626d72796d516a627271466868507050667a6a436c534f esp
exec ipsec tunnel protect ipip1 sa-out 100001 sa-in 1 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.2.1 p2p
exec ipsec sa add 100002 spi 200002 crypto-alg aes-cbc-128 crypto-key 794c62506e736f564b5867636263474c integ-alg sha-512-256 integ-key 435774656245446f42496a4b7a625a4b6172774d77546c665057776a63456374465776487756565a67615a694c6c447348434f7671715a7964616e756b4e6769 esp
exec ipsec sa add 2 spi 100002 crypto-alg aes-cbc-128 crypto-key 794c62506e736f564b5867636263474c integ-alg sha-512-256 integ-key 435774656245446f42496a4b7a625a4b6172774d77546c665057776a63456374465776487756565a67615a694c6c447348434f7671715a7964616e756b4e6769 esp
exec ipsec tunnel protect ipip2 sa-out 100002 sa-in 2 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.3.1 p2p
exec ipsec sa add 100003 spi 200003 crypto-alg aes-cbc-128 crypto-key 4375546a4161554c6d7357775570726e integ-alg sha-512-256 integ-key 74424455665258565864736272575963526f66547743517051516f686a4661497058464558676647766a4e736c436242586c545347476579745763587a4d6a54 esp
exec ipsec sa add 3 spi 100003 crypto-alg aes-cbc-128 crypto-key 4375546a4161554c6d7357775570726e integ-alg sha-512-256 integ-key 74424455665258565864736272575963526f66547743517051516f686a4661497058464558676647766a4e736c436242586c545347476579745763587a4d6a54 esp
exec ipsec tunnel protect ipip3 sa-out 100003 sa-in 3 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.4.1 p2p
exec ipsec sa add 100004 spi 200004 crypto-alg aes-cbc-128 crypto-key 425578594d745251446c6a437a787256 integ-alg sha-512-256 integ-key 4d574f654472566853614e72645a48785450777371704959524c4272455874486874646a6c725269496d6a424b6f524c786a4a6f54557a4e7a6d485a7a784559 esp
exec ipsec sa add 4 spi 100004 crypto-alg aes-cbc-128 crypto-key 425578594d745251446c6a437a787256 integ-alg sha-512-256 integ-key 4d574f654472566853614e72645a48785450777371704959524c4272455874486874646a6c725269496d6a424b6f524c786a4a6f54557a4e7a6d485a7a784559 esp
exec ipsec tunnel protect ipip4 sa-out 100004 sa-in 4 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.5.1 p2p
exec ipsec sa add 100005 spi 200005 crypto-alg aes-cbc-128 crypto-key 6f45636e52687a574f417a4a64546a53 integ-alg sha-512-256 integ-key 4770436848596e71624f757870624c545258434a5a6a4f75795641514b42614f4d55706a7349734966527271535a4e654e4f57445766426d6152636a57556b6b esp
exec ipsec sa add 5 spi 100005 crypto-alg aes-cbc-128 crypto-key 6f45636e52687a574f417a4a64546a53 integ-alg sha-512-256 integ-key 4770436848596e71624f757870624c545258434a5a6a4f75795641514b42614f4d55706a7349734966527271535a4e654e4f57445766426d6152636a57556b6b esp
exec ipsec tunnel protect ipip5 sa-out 100005 sa-in 5 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.6.1 p2p
exec ipsec sa add 100006 spi 200006 crypto-alg aes-cbc-128 crypto-key 466d624a7250534a5155565645637074 integ-alg sha-512-256 integ-key 78677a7a414c4a6e597450734349775650696f6f535053744f755a476b5169484c4b494661645778434c477267755371774864446a4b73716e69435155654370 esp
exec ipsec sa add 6 spi 100006 crypto-alg aes-cbc-128 crypto-key 466d624a7250534a5155565645637074 integ-alg sha-512-256 integ-key 78677a7a414c4a6e597450734349775650696f6f535053744f755a476b5169484c4b494661645778434c477267755371774864446a4b73716e69435155654370 esp
exec ipsec tunnel protect ipip6 sa-out 100006 sa-in 6 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.7.1 p2p
exec ipsec sa add 100007 spi 200007 crypto-alg aes-cbc-128 crypto-key 5944515a5a69695871624578714c6844 integ-alg sha-512-256 integ-key 614f5a4f67704f4559796f714453556b49574a494946764f4e584a6f5a446d676c5765566a595845646c61555a417642734e676f68526d7a6f6265417a524744 esp
exec ipsec sa add 7 spi 100007 crypto-alg aes-cbc-128 crypto-key 5944515a5a69695871624578714c6844 integ-alg sha-512-256 integ-key 614f5a4f67704f4559796f714453556b49574a494946764f4e584a6f5a446d676c5765566a595845646c61555a417642734e676f68526d7a6f6265417a524744 esp
exec ipsec tunnel protect ipip7 sa-out 100007 sa-in 7 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.8.1 p2p
exec ipsec sa add 100008 spi 200008 crypto-alg aes-cbc-128 crypto-key 6c5279564b7a71767959727847547543 integ-alg sha-512-256 integ-key 516e4d616547746e5652454242575a6346684b43456d4a596548487941554e44676f7665576470435564774851647950726670554f596f6763564f4248744e66 esp
exec ipsec sa add 8 spi 100008 crypto-alg aes-cbc-128 crypto-key 6c5279564b7a71767959727847547543 integ-alg sha-512-256 integ-key 516e4d616547746e5652454242575a6346684b43456d4a596548487941554e44676f7665576470435564774851647950726670554f596f6763564f4248744e66 esp
exec ipsec tunnel protect ipip8 sa-out 100008 sa-in 8 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.9.1 p2p
exec ipsec sa add 100009 spi 200009 crypto-alg aes-cbc-128 crypto-key 6a725253586171684e6a637245634873 integ-alg sha-512-256 integ-key 64644477576b5558584b6c624442475775505149427858526c68765368744d4264696a73754c576d705374784579584e5776455044574746456861786379705a esp
exec ipsec sa add 9 spi 100009 crypto-alg aes-cbc-128 crypto-key 6a725253586171684e6a637245634873 integ-alg sha-512-256 integ-key 64644477576b5558584b6c624442475775505149427858526c68765368744d4264696a73754c576d705374784579584e5776455044574746456861786379705a esp
exec ipsec tunnel protect ipip9 sa-out 100009 sa-in 9 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.10.1 p2p
exec ipsec sa add 100010 spi 200010 crypto-alg aes-cbc-128 crypto-key 4b697868716d594b46516f4545696b77 integ-alg sha-512-256 integ-key 4d63684b444f7865586a4569534363594f4368704e545a4a4159797765756959674965504744474c56626f726a4c61625a446c5741626e4a69676c4379526446 esp
exec ipsec sa add 10 spi 100010 crypto-alg aes-cbc-128 crypto-key 4b697868716d594b46516f4545696b77 integ-alg sha-512-256 integ-key 4d63684b444f7865586a4569534363594f4368704e545a4a4159797765756959674965504744474c56626f726a4c61625a446c5741626e4a69676c4379526446 esp
exec ipsec tunnel protect ipip10 sa-out 100010 sa-in 10 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.11.1 p2p
exec ipsec sa add 100011 spi 200011 crypto-alg aes-cbc-128 crypto-key 4a416374707553757848656967787761 integ-alg sha-512-256 integ-key 677a4a446d6348596c507359424378526a5358706e4a4a635a6241664558667a666654786977447669454b48516e7a7374466e4e7254576443544f7479537954 esp
exec ipsec sa add 11 spi 100011 crypto-alg aes-cbc-128 crypto-key 4a416374707553757848656967787761 integ-alg sha-512-256 integ-key 677a4a446d6348596c507359424378526a5358706e4a4a635a6241664558667a666654786977447669454b48516e7a7374466e4e7254576443544f7479537954 esp
exec ipsec tunnel protect ipip11 sa-out 100011 sa-in 11 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.12.1 p2p
exec ipsec sa add 100012 spi 200012 crypto-alg aes-cbc-128 crypto-key 4c457762734a52764376704a59716172 integ-alg sha-512-256 integ-key 6569736d677a446252436751584e55487365494a6e6c666972754a594148566d74436975575648734c707a68615544747154664d4c4d4769564151474c624178 esp
exec ipsec sa add 12 spi 100012 crypto-alg aes-cbc-128 crypto-key 4c457762734a52764376704a59716172 integ-alg sha-512-256 integ-key 6569736d677a446252436751584e55487365494a6e6c666972754a594148566d74436975575648734c707a68615544747154664d4c4d4769564151474c624178 esp
exec ipsec tunnel protect ipip12 sa-out 100012 sa-in 12 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.13.1 p2p
exec ipsec sa add 100013 spi 200013 crypto-alg aes-cbc-128 crypto-key 4c72596c706c7a69534265427151706f integ-alg sha-512-256 integ-key 7a444d594646754d4964426c645548577872416e57674a44714752664d676a5170786f4b6b73517256474f4661727174676d645a65796c597a57615a6267644c esp
exec ipsec sa add 13 spi 100013 crypto-alg aes-cbc-128 crypto-key 4c72596c706c7a69534265427151706f integ-alg sha-512-256 integ-key 7a444d594646754d4964426c645548577872416e57674a44714752664d676a5170786f4b6b73517256474f4661727174676d645a65796c597a57615a6267644c esp
exec ipsec tunnel protect ipip13 sa-out 100013 sa-in 13 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.14.1 p2p
exec ipsec sa add 100014 spi 200014 crypto-alg aes-cbc-128 crypto-key 73424975587a4f65636c49794f677464 integ-alg sha-512-256 integ-key 4d644a6c4a48566d764c765a75766857746945525465506c4b6f6368567443756443756e465a6146476d6470666a58705a5954704457514763637a5a646d555a esp
exec ipsec sa add 14 spi 100014 crypto-alg aes-cbc-128 crypto-key 73424975587a4f65636c49794f677464 integ-alg sha-512-256 integ-key 4d644a6c4a48566d764c765a75766857746945525465506c4b6f6368567443756443756e465a6146476d6470666a58705a5954704457514763637a5a646d555a esp
exec ipsec tunnel protect ipip14 sa-out 100014 sa-in 14 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.15.1 p2p
exec ipsec sa add 100015 spi 200015 crypto-alg aes-cbc-128 crypto-key 787571685a747654735a78706e566e71 integ-alg sha-512-256 integ-key 5851626a526e764f4d66447379527762686d71505a535a776a654d415a6462767461456471556966494a66784958424e4b7978625042556c794844764e487358 esp
exec ipsec sa add 15 spi 100015 crypto-alg aes-cbc-128 crypto-key 787571685a747654735a78706e566e71 integ-alg sha-512-256 integ-key 5851626a526e764f4d66447379527762686d71505a535a776a654d415a6462767461456471556966494a66784958424e4b7978625042556c794844764e487358 esp
exec ipsec tunnel protect ipip15 sa-out 100015 sa-in 15 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.16.1 p2p
exec ipsec sa add 100016 spi 200016 crypto-alg aes-cbc-128 crypto-key 5772787959646f6c5a484e5741796567 integ-alg sha-512-256 integ-key 6e6e5272695266646541777669646d6f436c7248635a4b595277507952696b415448587244576c52747947655545525064755a7442484b53494e4b7574575570 esp
exec ipsec sa add 16 spi 100016 crypto-alg aes-cbc-128 crypto-key 5772787959646f6c5a484e5741796567 integ-alg sha-512-256 integ-key 6e6e5272695266646541777669646d6f436c7248635a4b595277507952696b415448587244576c52747947655545525064755a7442484b53494e4b7574575570 esp
exec ipsec tunnel protect ipip16 sa-out 100016 sa-in 16 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.17.1 p2p
exec ipsec sa add 100017 spi 200017 crypto-alg aes-cbc-128 crypto-key 6c6b6c59654b704c59554d557a584f78 integ-alg sha-512-256 integ-key 6a675441506e4856536f4648725059537a4264794e45776a686a786d53427242426f594b744b7148566a716c56687744446c5a6278706779724c6b537a436474 esp
exec ipsec sa add 17 spi 100017 crypto-alg aes-cbc-128 crypto-key 6c6b6c59654b704c59554d557a584f78 integ-alg sha-512-256 integ-key 6a675441506e4856536f4648725059537a4264794e45776a686a786d53427242426f594b744b7148566a716c56687744446c5a6278706779724c6b537a436474 esp
exec ipsec tunnel protect ipip17 sa-out 100017 sa-in 17 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.18.1 p2p
exec ipsec sa add 100018 spi 200018 crypto-alg aes-cbc-128 crypto-key 6a4d675476506b637a6a704c6b48746b integ-alg sha-512-256 integ-key 566c6a4b5a67674a726250467658687a424a645647484b5661764c6a454579475775444b4858527944625a6d71535947514d766c756974744554764a77627746 esp
exec ipsec sa add 18 spi 100018 crypto-alg aes-cbc-128 crypto-key 6a4d675476506b637a6a704c6b48746b integ-alg sha-512-256 integ-key 566c6a4b5a67674a726250467658687a424a645647484b5661764c6a454579475775444b4858527944625a6d71535947514d766c756974744554764a77627746 esp
exec ipsec tunnel protect ipip18 sa-out 100018 sa-in 18 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.19.1 p2p
exec ipsec sa add 100019 spi 200019 crypto-alg aes-cbc-128 crypto-key 6d4c696a557859706e4d684d617a6b53 integ-alg sha-512-256 integ-key 6379454a4754474e6550567a4b63744c65715378574c4650445052724d6a55487968586c5a427152686e6767595070764b4d6652574a6c4a6a6346515361465a esp
exec ipsec sa add 19 spi 100019 crypto-alg aes-cbc-128 crypto-key 6d4c696a557859706e4d684d617a6b53 integ-alg sha-512-256 integ-key 6379454a4754474e6550567a4b63744c65715378574c4650445052724d6a55487968586c5a427152686e6767595070764b4d6652574a6c4a6a6346515361465a esp
exec ipsec tunnel protect ipip19 sa-out 100019 sa-in 19 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.20.1 p2p
exec ipsec sa add 100020 spi 200020 crypto-alg aes-cbc-128 crypto-key 584c42524e6c5a7366584f58576a6d43 integ-alg sha-512-256 integ-key 696774597850416570666458745a6359794662596362454c63574d47744f705a4d7a765252554a4b675771775a566c744c736a5472714f776953707978724474 esp
exec ipsec sa add 20 spi 100020 crypto-alg aes-cbc-128 crypto-key 584c42524e6c5a7366584f58576a6d43 integ-alg sha-512-256 integ-key 696774597850416570666458745a6359794662596362454c63574d47744f705a4d7a765252554a4b675771775a566c744c736a5472714f776953707978724474 esp
exec ipsec tunnel protect ipip20 sa-out 100020 sa-in 20 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.21.1 p2p
exec ipsec sa add 100021 spi 200021 crypto-alg aes-cbc-128 crypto-key 64716f42705156756f575863504a5448 integ-alg sha-512-256 integ-key 5a486a4763536578727167784d71536a586f464e706f4a42525956667157477073435776596a54616d6d757067665547796551415567624c59495144794e4247 esp
exec ipsec sa add 21 spi 100021 crypto-alg aes-cbc-128 crypto-key 64716f42705156756f575863504a5448 integ-alg sha-512-256 integ-key 5a486a4763536578727167784d71536a586f464e706f4a42525956667157477073435776596a54616d6d757067665547796551415567624c59495144794e4247 esp
exec ipsec tunnel protect ipip21 sa-out 100021 sa-in 21 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.22.1 p2p
exec ipsec sa add 100022 spi 200022 crypto-alg aes-cbc-128 crypto-key 724e6279465868687575626349465553 integ-alg sha-512-256 integ-key 514e52446e4d65554c455a72436756486e537766427a5447514f654a594f504f6c6e41496a665164546876634d5a414c6a6962535569526d4b71764b4e465143 esp
exec ipsec sa add 22 spi 100022 crypto-alg aes-cbc-128 crypto-key 724e6279465868687575626349465553 integ-alg sha-512-256 integ-key 514e52446e4d65554c455a72436756486e537766427a5447514f654a594f504f6c6e41496a665164546876634d5a414c6a6962535569526d4b71764b4e465143 esp
exec ipsec tunnel protect ipip22 sa-out 100022 sa-in 22 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.23.1 p2p
exec ipsec sa add 100023 spi 200023 crypto-alg aes-cbc-128 crypto-key 55786e6c484b697a476e647858726a45 integ-alg sha-512-256 integ-key 4f6879766364646f7846615946764d6f6648667575584c72786c6f69416e4a7754654370626c5561624d716341494168415574415a7a4f73415a675569716971 esp
exec ipsec sa add 23 spi 100023 crypto-alg aes-cbc-128 crypto-key 55786e6c484b697a476e647858726a45 integ-alg sha-512-256 integ-key 4f6879766364646f7846615946764d6f6648667575584c72786c6f69416e4a7754654370626c5561624d716341494168415574415a7a4f73415a675569716971 esp
exec ipsec tunnel protect ipip23 sa-out 100023 sa-in 23 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.24.1 p2p
exec ipsec sa add 100024 spi 200024 crypto-alg aes-cbc-128 crypto-key 4257484762506f4a4276695346527a59 integ-alg sha-512-256 integ-key 63646b4f674e62554e634f527a486d4156706164544a6c6342456f506e41675065554a41474b536c7a4b556b4b494a5a51705a7357705a6d5a63667a654f4b7a esp
exec ipsec sa add 24 spi 100024 crypto-alg aes-cbc-128 crypto-key 4257484762506f4a4276695346527a59 integ-alg sha-512-256 integ-key 63646b4f674e62554e634f527a486d4156706164544a6c6342456f506e41675065554a41474b536c7a4b556b4b494a5a51705a7357705a6d5a63667a654f4b7a esp
exec ipsec tunnel protect ipip24 sa-out 100024 sa-in 24 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.25.1 p2p
exec ipsec sa add 100025 spi 200025 crypto-alg aes-cbc-128 crypto-key 57506d6c6b5a4f654675634750744971 integ-alg sha-512-256 integ-key 736f6d6979634a657343526c71564a75466244424f6850446b70634b76647242694764436a6d4b6b59745844734242567063556545575a5163636767444e5173 esp
exec ipsec sa add 25 spi 100025 crypto-alg aes-cbc-128 crypto-key 57506d6c6b5a4f654675634750744971 integ-alg sha-512-256 integ-key 736f6d6979634a657343526c71564a75466244424f6850446b70634b76647242694764436a6d4b6b59745844734242567063556545575a5163636767444e5173 esp
exec ipsec tunnel protect ipip25 sa-out 100025 sa-in 25 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.26.1 p2p
exec ipsec sa add 100026 spi 200026 crypto-alg aes-cbc-128 crypto-key 49724f634a65574b5867714479455063 integ-alg sha-512-256 integ-key 68646145735a674d6142696968494b436e79754f7a6f544e704276634e4372666b715377424e4575465158637863626a506f444f674646516f5a4e42776b6b4b esp
exec ipsec sa add 26 spi 100026 crypto-alg aes-cbc-128 crypto-key 49724f634a65574b5867714479455063 integ-alg sha-512-256 integ-key 68646145735a674d6142696968494b436e79754f7a6f544e704276634e4372666b715377424e4575465158637863626a506f444f674646516f5a4e42776b6b4b esp
exec ipsec tunnel protect ipip26 sa-out 100026 sa-in 26 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.27.1 p2p
exec ipsec sa add 100027 spi 200027 crypto-alg aes-cbc-128 crypto-key 6179745478534a766f786b6f4d6e6a42 integ-alg sha-512-256 integ-key 4a4266744762754276706f4552454e6c564f444f6e6a434870524a57646e704466666d736a586a426a4c64625576457873765367664573726a52446b74596f74 esp
exec ipsec sa add 27 spi 100027 crypto-alg aes-cbc-128 crypto-key 6179745478534a766f786b6f4d6e6a42 integ-alg sha-512-256 integ-key 4a4266744762754276706f4552454e6c564f444f6e6a434870524a57646e704466666d736a586a426a4c64625576457873765367664573726a52446b74596f74 esp
exec ipsec tunnel protect ipip27 sa-out 100027 sa-in 27 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.28.1 p2p
exec ipsec sa add 100028 spi 200028 crypto-alg aes-cbc-128 crypto-key 6d50487959457963456c47456b596b45 integ-alg sha-512-256 integ-key 6844556a784f47764477546a72577355716a4c634c4b634643704e476d58475953456a6576666858534d6362595749687043666f50726c6477544a475071434e esp
exec ipsec sa add 28 spi 100028 crypto-alg aes-cbc-128 crypto-key 6d50487959457963456c47456b596b45 integ-alg sha-512-256 integ-key 6844556a784f47764477546a72577355716a4c634c4b634643704e476d58475953456a6576666858534d6362595749687043666f50726c6477544a475071434e esp
exec ipsec tunnel protect ipip28 sa-out 100028 sa-in 28 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.29.1 p2p
exec ipsec sa add 100029 spi 200029 crypto-alg aes-cbc-128 crypto-key 43455772706d61587a4950627672746a integ-alg sha-512-256 integ-key 495877794e797873596c55655a7a6f58537a4371755a535376525250656d4c55466d6f74734a49494d636a764a5665675a6749665566595567706b4666675750 esp
exec ipsec sa add 29 spi 100029 crypto-alg aes-cbc-128 crypto-key 43455772706d61587a4950627672746a integ-alg sha-512-256 integ-key 495877794e797873596c55655a7a6f58537a4371755a535376525250656d4c55466d6f74734a49494d636a764a5665675a6749665566595567706b4666675750 esp
exec ipsec tunnel protect ipip29 sa-out 100029 sa-in 29 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.30.1 p2p
exec ipsec sa add 100030 spi 200030 crypto-alg aes-cbc-128 crypto-key 4e59424f62656f4c6e4f5675786f5350 integ-alg sha-512-256 integ-key 47516e496f445467696757646878774a446171786d546656714f487073584270677473516e576f56506948556c6668586a45496d4a6b45527365586c6d475978 esp
exec ipsec sa add 30 spi 100030 crypto-alg aes-cbc-128 crypto-key 4e59424f62656f4c6e4f5675786f5350 integ-alg sha-512-256 integ-key 47516e496f445467696757646878774a446171786d546656714f487073584270677473516e576f56506948556c6668586a45496d4a6b45527365586c6d475978 esp
exec ipsec tunnel protect ipip30 sa-out 100030 sa-in 30 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.31.1 p2p
exec ipsec sa add 100031 spi 200031 crypto-alg aes-cbc-128 crypto-key 5a4261425a704367664a4c5675494e44 integ-alg sha-512-256 integ-key 4f486541616d4f71625a51644d624c4d466f786f5164705375435957594e477361417767576451675466756c474d494a4a7a4f44636f6d616644514176727050 esp
exec ipsec sa add 31 spi 100031 crypto-alg aes-cbc-128 crypto-key 5a4261425a704367664a4c5675494e44 integ-alg sha-512-256 integ-key 4f486541616d4f71625a51644d624c4d466f786f5164705375435957594e477361417767576451675466756c474d494a4a7a4f44636f6d616644514176727050 esp
exec ipsec tunnel protect ipip31 sa-out 100031 sa-in 31 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.32.1 p2p
exec ipsec sa add 100032 spi 200032 crypto-alg aes-cbc-128 crypto-key 746a626c65775762497965584d464868 integ-alg sha-512-256 integ-key 6a716b67415750766e59444851624c594f42786158496d76756c784561504673446d414a7345474b49754750674252476e746a465651545857726867786d554d esp
exec ipsec sa add 32 spi 100032 crypto-alg aes-cbc-128 crypto-key 746a626c65775762497965584d464868 integ-alg sha-512-256 integ-key 6a716b67415750766e59444851624c594f42786158496d76756c784561504673446d414a7345474b49754750674252476e746a465651545857726867786d554d esp
exec ipsec tunnel protect ipip32 sa-out 100032 sa-in 32 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.33.1 p2p
exec ipsec sa add 100033 spi 200033 crypto-alg aes-cbc-128 crypto-key 75657a57564d7948564c6e4a67465852 integ-alg sha-512-256 integ-key 63744a7758774f44706e517a4e4a784a6f545552674e7454794a4e456d6d4b7148527a7645686c7a705641557668514c65777a7478525862704355614655564d esp
exec ipsec sa add 33 spi 100033 crypto-alg aes-cbc-128 crypto-key 75657a57564d7948564c6e4a67465852 integ-alg sha-512-256 integ-key 63744a7758774f44706e517a4e4a784a6f545552674e7454794a4e456d6d4b7148527a7645686c7a705641557668514c65777a7478525862704355614655564d esp
exec ipsec tunnel protect ipip33 sa-out 100033 sa-in 33 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.34.1 p2p
exec ipsec sa add 100034 spi 200034 crypto-alg aes-cbc-128 crypto-key 4e73684f536f7351654b497959756847 integ-alg sha-512-256 integ-key 6f496452764a64694779684555504a4261667472487951505861446d716b4677544a526756554d486f4558574f704e565a417a4e516842436a456f6f706b6462 esp
exec ipsec sa add 34 spi 100034 crypto-alg aes-cbc-128 crypto-key 4e73684f536f7351654b497959756847 integ-alg sha-512-256 integ-key 6f496452764a64694779684555504a4261667472487951505861446d716b4677544a526756554d486f4558574f704e565a417a4e516842436a456f6f706b6462 esp
exec ipsec tunnel protect ipip34 sa-out 100034 sa-in 34 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.35.1 p2p
exec ipsec sa add 100035 spi 200035 crypto-alg aes-cbc-128 crypto-key 6a65677854514b704d4a414c66515545 integ-alg sha-512-256 integ-key 747969477968624e775662564b79574f6a5444675166496e5163676e4f76484450554e6c55497a5270535a5a4f455056524f58546c5146514977476c4f794943 esp
exec ipsec sa add 35 spi 100035 crypto-alg aes-cbc-128 crypto-key 6a65677854514b704d4a414c66515545 integ-alg sha-512-256 integ-key 747969477968624e775662564b79574f6a5444675166496e5163676e4f76484450554e6c55497a5270535a5a4f455056524f58546c5146514977476c4f794943 esp
exec ipsec tunnel protect ipip35 sa-out 100035 sa-in 35 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.36.1 p2p
exec ipsec sa add 100036 spi 200036 crypto-alg aes-cbc-128 crypto-key 6d6d67705771474568594f524a695964 integ-alg sha-512-256 integ-key 4b4252644b666865436b4c7472534f44644871695065724c4b486d466f7a5561464e59436a736f6c416242546d4552744842566f70624a54626e777551686d43 esp
exec ipsec sa add 36 spi 100036 crypto-alg aes-cbc-128 crypto-key 6d6d67705771474568594f524a695964 integ-alg sha-512-256 integ-key 4b4252644b666865436b4c7472534f44644871695065724c4b486d466f7a5561464e59436a736f6c416242546d4552744842566f70624a54626e777551686d43 esp
exec ipsec tunnel protect ipip36 sa-out 100036 sa-in 36 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.37.1 p2p
exec ipsec sa add 100037 spi 200037 crypto-alg aes-cbc-128 crypto-key 654867796d5274586b51784c52686955 integ-alg sha-512-256 integ-key 6c5243716f6653425a426e536d6b48696962576c764c5a5550734b49524b69767077424758546a6c61464d58616668714b55666f43454159465957574a787762 esp
exec ipsec sa add 37 spi 100037 crypto-alg aes-cbc-128 crypto-key 654867796d5274586b51784c52686955 integ-alg sha-512-256 integ-key 6c5243716f6653425a426e536d6b48696962576c764c5a5550734b49524b69767077424758546a6c61464d58616668714b55666f43454159465957574a787762 esp
exec ipsec tunnel protect ipip37 sa-out 100037 sa-in 37 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.38.1 p2p
exec ipsec sa add 100038 spi 200038 crypto-alg aes-cbc-128 crypto-key 4a4b77625870446146596a696169467a integ-alg sha-512-256 integ-key 516f7778554f684450704c774f4d455343515055507970427858784c6465517a4e50554844436e75536e594a48556e6367676663507346554e4d535251536d68 esp
exec ipsec sa add 38 spi 100038 crypto-alg aes-cbc-128 crypto-key 4a4b77625870446146596a696169467a integ-alg sha-512-256 integ-key 516f7778554f684450704c774f4d455343515055507970427858784c6465517a4e50554844436e75536e594a48556e6367676663507346554e4d535251536d68 esp
exec ipsec tunnel protect ipip38 sa-out 100038 sa-in 38 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.39.1 p2p
exec ipsec sa add 100039 spi 200039 crypto-alg aes-cbc-128 crypto-key 6b754e6a454d765964626a4d50734e71 integ-alg sha-512-256 integ-key 75696e4e476f756c6c4b4e50516f784e7a6e76666169555a6554684f6152634a4b486d595661576a7949686275716c725a5a7162714b71414a656f58784c4747 esp
exec ipsec sa add 39 spi 100039 crypto-alg aes-cbc-128 crypto-key 6b754e6a454d765964626a4d50734e71 integ-alg sha-512-256 integ-key 75696e4e476f756c6c4b4e50516f784e7a6e76666169555a6554684f6152634a4b486d595661576a7949686275716c725a5a7162714b71414a656f58784c4747 esp
exec ipsec tunnel protect ipip39 sa-out 100039 sa-in 39 add
exec ip route add 100.0.0.1/8 via 200.0.0.101 TenGigabitEthernet8/0/0
exec set interface unnumbered ipip0 use TenGigabitEthernet8/0/0
exec set interface state ipip0 up
exec ip route add 10.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use TenGigabitEthernet8/0/0
exec set interface state ipip1 up
exec ip route add 10.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use TenGigabitEthernet8/0/0
exec set interface state ipip2 up
exec ip route add 10.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use TenGigabitEthernet8/0/0
exec set interface state ipip3 up
exec ip route add 10.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use TenGigabitEthernet8/0/0
exec set interface state ipip4 up
exec ip route add 10.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use TenGigabitEthernet8/0/0
exec set interface state ipip5 up
exec ip route add 10.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use TenGigabitEthernet8/0/0
exec set interface state ipip6 up
exec ip route add 10.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use TenGigabitEthernet8/0/0
exec set interface state ipip7 up
exec ip route add 10.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use TenGigabitEthernet8/0/0
exec set interface state ipip8 up
exec ip route add 10.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use TenGigabitEthernet8/0/0
exec set interface state ipip9 up
exec ip route add 10.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use TenGigabitEthernet8/0/0
exec set interface state ipip10 up
exec ip route add 10.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use TenGigabitEthernet8/0/0
exec set interface state ipip11 up
exec ip route add 10.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use TenGigabitEthernet8/0/0
exec set interface state ipip12 up
exec ip route add 10.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use TenGigabitEthernet8/0/0
exec set interface state ipip13 up
exec ip route add 10.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use TenGigabitEthernet8/0/0
exec set interface state ipip14 up
exec ip route add 10.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use TenGigabitEthernet8/0/0
exec set interface state ipip15 up
exec ip route add 10.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use TenGigabitEthernet8/0/0
exec set interface state ipip16 up
exec ip route add 10.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use TenGigabitEthernet8/0/0
exec set interface state ipip17 up
exec ip route add 10.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use TenGigabitEthernet8/0/0
exec set interface state ipip18 up
exec ip route add 10.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use TenGigabitEthernet8/0/0
exec set interface state ipip19 up
exec ip route add 10.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use TenGigabitEthernet8/0/0
exec set interface state ipip20 up
exec ip route add 10.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use TenGigabitEthernet8/0/0
exec set interface state ipip21 up
exec ip route add 10.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use TenGigabitEthernet8/0/0
exec set interface state ipip22 up
exec ip route add 10.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use TenGigabitEthernet8/0/0
exec set interface state ipip23 up
exec ip route add 10.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use TenGigabitEthernet8/0/0
exec set interface state ipip24 up
exec ip route add 10.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use TenGigabitEthernet8/0/0
exec set interface state ipip25 up
exec ip route add 10.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use TenGigabitEthernet8/0/0
exec set interface state ipip26 up
exec ip route add 10.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use TenGigabitEthernet8/0/0
exec set interface state ipip27 up
exec ip route add 10.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use TenGigabitEthernet8/0/0
exec set interface state ipip28 up
exec ip route add 10.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use TenGigabitEthernet8/0/0
exec set interface state ipip29 up
exec ip route add 10.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use TenGigabitEthernet8/0/0
exec set interface state ipip30 up
exec ip route add 10.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use TenGigabitEthernet8/0/0
exec set interface state ipip31 up
exec ip route add 10.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use TenGigabitEthernet8/0/0
exec set interface state ipip32 up
exec ip route add 10.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use TenGigabitEthernet8/0/0
exec set interface state ipip33 up
exec ip route add 10.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use TenGigabitEthernet8/0/0
exec set interface state ipip34 up
exec ip route add 10.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use TenGigabitEthernet8/0/0
exec set interface state ipip35 up
exec ip route add 10.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use TenGigabitEthernet8/0/0
exec set interface state ipip36 up
exec ip route add 10.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use TenGigabitEthernet8/0/0
exec set interface state ipip37 up
exec ip route add 10.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use TenGigabitEthernet8/0/0
exec set interface state ipip38 up
exec ip route add 10.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use TenGigabitEthernet8/0/0
exec set interface state ipip39 up
exec ip route add 10.0.0.39/32 via ipip39

 1518b-2t2c-ethip4ipsec40tnlsw-ip4base- 
int-aes128cbc-hmac512sha-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec create loopback interface
exec set interface state loop0 up
exec set interface ip address TenGigabitEthernet8/0/0 200.0.0.101/24
exec set ip neighbor TenGigabitEthernet8/0/0 200.0.0.102 ac:1f:6b:57:57:fe static
exec set interface ip address loop0 100.0.0.1/32
exec create ipip tunnel src 100.0.0.1 dst 200.0.0.102 p2p
exec ipsec sa add 0 spi 100000 crypto-alg aes-cbc-128 crypto-key 6a447579746649704c494e4f6d4e7952 integ-alg sha-512-256 integ-key 777759756e6c42457a664e634c765559764b4f54684951556977456b65714b4844764b584646754e5a556d636b4f4d594653724d52594a42486d494e6f636541 esp
exec ipsec sa add 100000 spi 200000 crypto-alg aes-cbc-128 crypto-key 6a447579746649704c494e4f6d4e7952 integ-alg sha-512-256 integ-key 777759756e6c42457a664e634c765559764b4f54684951556977456b65714b4844764b584646754e5a556d636b4f4d594653724d52594a42486d494e6f636541 esp
exec ipsec tunnel protect ipip0 sa-out 0 sa-in 100000 add
exec set interface ip address loop0 100.0.1.1/32
exec create ipip tunnel src 100.0.1.1 dst 200.0.0.102 p2p
exec ipsec sa add 1 spi 100001 crypto-alg aes-cbc-128 crypto-key 79676d4c55416458434e63464f6b4455 integ-alg sha-512-256 integ-key 50746a4166754f5261524c574a647a747468784d79674f4a4f4f724c494d4d6a69754952526b736d415a484549456b565a676b4a4f6e7a4e4948525344656144 esp
exec ipsec sa add 100001 spi 200001 crypto-alg aes-cbc-128 crypto-key 79676d4c55416458434e63464f6b4455 integ-alg sha-512-256 integ-key 50746a4166754f5261524c574a647a747468784d79674f4a4f4f724c494d4d6a69754952526b736d415a484549456b565a676b4a4f6e7a4e4948525344656144 esp
exec ipsec tunnel protect ipip1 sa-out 1 sa-in 100001 add
exec set interface ip address loop0 100.0.2.1/32
exec create ipip tunnel src 100.0.2.1 dst 200.0.0.102 p2p
exec ipsec sa add 2 spi 100002 crypto-alg aes-cbc-128 crypto-key 63627a6d736e515769636e754d72436f integ-alg sha-512-256 integ-key 6b627371776354566c495665484c775261764e6f4569455a6f52794f6b4756486f6468586441715557574c564c586a4a554c7966646d4e7a6246747864797a50 esp
exec ipsec sa add 100002 spi 200002 crypto-alg aes-cbc-128 crypto-key 63627a6d736e515769636e754d72436f integ-alg sha-512-256 integ-key 6b627371776354566c495665484c775261764e6f4569455a6f52794f6b4756486f6468586441715557574c564c586a4a554c7966646d4e7a6246747864797a50 esp
exec ipsec tunnel protect ipip2 sa-out 2 sa-in 100002 add
exec set interface ip address loop0 100.0.3.1/32
exec create ipip tunnel src 100.0.3.1 dst 200.0.0.102 p2p
exec ipsec sa add 3 spi 100003 crypto-alg aes-cbc-128 crypto-key 71486c735051416e7871465159444f78 integ-alg sha-512-256 integ-key 44527954417a4a696371454f6b704b755867714970516f6f59435865464f786c6e564850746a5a69446575474b41764268786e627a536351644b51576a427275 esp
exec ipsec sa add 100003 spi 200003 crypto-alg aes-cbc-128 crypto-key 71486c735051416e7871465159444f78 integ-alg sha-512-256 integ-key 44527954417a4a696371454f6b704b755867714970516f6f59435865464f786c6e564850746a5a69446575474b41764268786e627a536351644b51576a427275 esp
exec ipsec tunnel protect ipip3 sa-out 3 sa-in 100003 add
exec set interface ip address loop0 100.0.4.1/32
exec create ipip tunnel src 100.0.4.1 dst 200.0.0.102 p2p
exec ipsec sa add 4 spi 100004 crypto-alg aes-cbc-128 crypto-key 50755a6c4a664c474571735a686c4665 integ-alg sha-512-256 integ-key 4563645274646b64444b644a48586d6271786753535658485975516e71466b4f71774b716273484b45735975494952757677467473776a74557a5a4c6c4c4a75 esp
exec ipsec sa add 100004 spi 200004 crypto-alg aes-cbc-128 crypto-key 50755a6c4a664c474571735a686c4665 integ-alg sha-512-256 integ-key 4563645274646b64444b644a48586d6271786753535658485975516e71466b4f71774b716273484b45735975494952757677467473776a74557a5a4c6c4c4a75 esp
exec ipsec tunnel protect ipip4 sa-out 4 sa-in 100004 add
exec set interface ip address loop0 100.0.5.1/32
exec create ipip tunnel src 100.0.5.1 dst 200.0.0.102 p2p
exec ipsec sa add 5 spi 100005 crypto-alg aes-cbc-128 crypto-key 6c5051715844734f664b537a68485051 integ-alg sha-512-256 integ-key 68524c5973535962486b62477a71416a595a6b4b78496a4b70595164556b63497476726d67484673727765656454574b74694c726f47764d4c53525162745069 esp
exec ipsec sa add 100005 spi 200005 crypto-alg aes-cbc-128 crypto-key 6c5051715844734f664b537a68485051 integ-alg sha-512-256 integ-key 68524c5973535962486b62477a71416a595a6b4b78496a4b70595164556b63497476726d67484673727765656454574b74694c726f47764d4c53525162745069 esp
exec ipsec tunnel protect ipip5 sa-out 5 sa-in 100005 add
exec set interface ip address loop0 100.0.6.1/32
exec create ipip tunnel src 100.0.6.1 dst 200.0.0.102 p2p
exec ipsec sa add 6 spi 100006 crypto-alg aes-cbc-128 crypto-key 4c6c50725873616244797a47566c6c4b integ-alg sha-512-256 integ-key 74507a66715945417a42646e466e4277787167576869574f4856734a7478477558655466746a486b4f4f516c674254704f714b63414d436273534d5346705346 esp
exec ipsec sa add 100006 spi 200006 crypto-alg aes-cbc-128 crypto-key 4c6c50725873616244797a47566c6c4b integ-alg sha-512-256 integ-key 74507a66715945417a42646e466e4277787167576869574f4856734a7478477558655466746a486b4f4f516c674254704f714b63414d436273534d5346705346 esp
exec ipsec tunnel protect ipip6 sa-out 6 sa-in 100006 add
exec set interface ip address loop0 100.0.7.1/32
exec create ipip tunnel src 100.0.7.1 dst 200.0.0.102 p2p
exec ipsec sa add 7 spi 100007 crypto-alg aes-cbc-128 crypto-key 587652616e7650436e4b51416551507a integ-alg sha-512-256 integ-key 556c724d434e4251676747645468736f554570754f43514f6c446c707554466b6747574b4470427353525946674c6a736a536d676964455862696c47627a4570 esp
exec ipsec sa add 100007 spi 200007 crypto-alg aes-cbc-128 crypto-key 587652616e7650436e4b51416551507a integ-alg sha-512-256 integ-key 556c724d434e4251676747645468736f554570754f43514f6c446c707554466b6747574b4470427353525946674c6a736a536d676964455862696c47627a4570 esp
exec ipsec tunnel protect ipip7 sa-out 7 sa-in 100007 add
exec set interface ip address loop0 100.0.8.1/32
exec create ipip tunnel src 100.0.8.1 dst 200.0.0.102 p2p
exec ipsec sa add 8 spi 100008 crypto-alg aes-cbc-128 crypto-key 446d79456c6661786c63684c4a464268 integ-alg sha-512-256 integ-key 5a754a4c717057485463536b516d474d686672696b534865676f55694b48486c614e6357646366467956445a4a716f526766644a676d7a574d4b4568754d7a51 esp
exec ipsec sa add 100008 spi 200008 crypto-alg aes-cbc-128 crypto-key 446d79456c6661786c63684c4a464268 integ-alg sha-512-256 integ-key 5a754a4c717057485463536b516d474d686672696b534865676f55694b48486c614e6357646366467956445a4a716f526766644a676d7a574d4b4568754d7a51 esp
exec ipsec tunnel protect ipip8 sa-out 8 sa-in 100008 add
exec set interface ip address loop0 100.0.9.1/32
exec create ipip tunnel src 100.0.9.1 dst 200.0.0.102 p2p
exec ipsec sa add 9 spi 100009 crypto-alg aes-cbc-128 crypto-key 636e504c765358596f51625a4d63746e integ-alg sha-512-256 integ-key 55646f4a704f6d66645a5a43756867544a64724b764142546d7943744143676c4e73485a674963454d6f4f7773615061765946755455464377524c7674746545 esp
exec ipsec sa add 100009 spi 200009 crypto-alg aes-cbc-128 crypto-key 636e504c765358596f51625a4d63746e integ-alg sha-512-256 integ-key 55646f4a704f6d66645a5a43756867544a64724b764142546d7943744143676c4e73485a674963454d6f4f7773615061765946755455464377524c7674746545 esp
exec ipsec tunnel protect ipip9 sa-out 9 sa-in 100009 add
exec set interface ip address loop0 100.0.10.1/32
exec create ipip tunnel src 100.0.10.1 dst 200.0.0.102 p2p
exec ipsec sa add 10 spi 100010 crypto-alg aes-cbc-128 crypto-key 5974647371534141414961454752626b integ-alg sha-512-256 integ-key 637264534d6358584d46695254796e4f796553424f716f676e53637a506a4f70536a664d7655654e627163574f65615369715271674c7445686c76774559755a esp
exec ipsec sa add 100010 spi 200010 crypto-alg aes-cbc-128 crypto-key 5974647371534141414961454752626b integ-alg sha-512-256 integ-key 637264534d6358584d46695254796e4f796553424f716f676e53637a506a4f70536a664d7655654e627163574f65615369715271674c7445686c76774559755a esp
exec ipsec tunnel protect ipip10 sa-out 10 sa-in 100010 add
exec set interface ip address loop0 100.0.11.1/32
exec create ipip tunnel src 100.0.11.1 dst 200.0.0.102 p2p
exec ipsec sa add 11 spi 100011 crypto-alg aes-cbc-128 crypto-key 796e774b4c63444b5969625871615771 integ-alg sha-512-256 integ-key 4f4950456f5059467a6f465969504a4a444c56496e5866567a546353726f764e5070414a4145536a7a4e434b474344484973426f516757617345724a624a4746 esp
exec ipsec sa add 100011 spi 200011 crypto-alg aes-cbc-128 crypto-key 796e774b4c63444b5969625871615771 integ-alg sha-512-256 integ-key 4f4950456f5059467a6f465969504a4a444c56496e5866567a546353726f764e5070414a4145536a7a4e434b474344484973426f516757617345724a624a4746 esp
exec ipsec tunnel protect ipip11 sa-out 11 sa-in 100011 add
exec set interface ip address loop0 100.0.12.1/32
exec create ipip tunnel src 100.0.12.1 dst 200.0.0.102 p2p
exec ipsec sa add 12 spi 100012 crypto-alg aes-cbc-128 crypto-key 71496d41497947597248476a5159716b integ-alg sha-512-256 integ-key 446443795368756f4e6d6d6c5a7569545a677243544b44596371796d6d6d6c4e5272676547415471507043625977566676454d694547536b4a69487679554b7a esp
exec ipsec sa add 100012 spi 200012 crypto-alg aes-cbc-128 crypto-key 71496d41497947597248476a5159716b integ-alg sha-512-256 integ-key 446443795368756f4e6d6d6c5a7569545a677243544b44596371796d6d6d6c4e5272676547415471507043625977566676454d694547536b4a69487679554b7a esp
exec ipsec tunnel protect ipip12 sa-out 12 sa-in 100012 add
exec set interface ip address loop0 100.0.13.1/32
exec create ipip tunnel src 100.0.13.1 dst 200.0.0.102 p2p
exec ipsec sa add 13 spi 100013 crypto-alg aes-cbc-128 crypto-key 74484647635159514e6f45416e79526f integ-alg sha-512-256 integ-key 784b46474b6c725451415142426759764e6b76717450734876534662577a736c75496d4a786c4967436a696d5362417367494e4565414c6f77757a77596a6141 esp
exec ipsec sa add 100013 spi 200013 crypto-alg aes-cbc-128 crypto-key 74484647635159514e6f45416e79526f integ-alg sha-512-256 integ-key 784b46474b6c725451415142426759764e6b76717450734876534662577a736c75496d4a786c4967436a696d5362417367494e4565414c6f77757a77596a6141 esp
exec ipsec tunnel protect ipip13 sa-out 13 sa-in 100013 add
exec set interface ip address loop0 100.0.14.1/32
exec create ipip tunnel src 100.0.14.1 dst 200.0.0.102 p2p
exec ipsec sa add 14 spi 100014 crypto-alg aes-cbc-128 crypto-key 494f564b757a4b7377595373585a675a integ-alg sha-512-256 integ-key 494c4b4e71565a744259615a626c556669454b595859556b766b6671434365756d5267795749664c5843676b564e4176416769737064637548644c784f546a4a esp
exec ipsec sa add 100014 spi 200014 crypto-alg aes-cbc-128 crypto-key 494f564b757a4b7377595373585a675a integ-alg sha-512-256 integ-key 494c4b4e71565a744259615a626c556669454b595859556b766b6671434365756d5267795749664c5843676b564e4176416769737064637548644c784f546a4a esp
exec ipsec tunnel protect ipip14 sa-out 14 sa-in 100014 add
exec set interface ip address loop0 100.0.15.1/32
exec create ipip tunnel src 100.0.15.1 dst 200.0.0.102 p2p
exec ipsec sa add 15 spi 100015 crypto-alg aes-cbc-128 crypto-key 42634d6a704b596d58655a434e78546c integ-alg sha-512-256 integ-key 6855547a65614f7754424762445a5a5657465a4767694d66667356744e575a746870676171534766475659634646526c66724464625a4b47487165495066484a esp
exec ipsec sa add 100015 spi 200015 crypto-alg aes-cbc-128 crypto-key 42634d6a704b596d58655a434e78546c integ-alg sha-512-256 integ-key 6855547a65614f7754424762445a5a5657465a4767694d66667356744e575a746870676171534766475659634646526c66724464625a4b47487165495066484a esp
exec ipsec tunnel protect ipip15 sa-out 15 sa-in 100015 add
exec set interface ip address loop0 100.0.16.1/32
exec create ipip tunnel src 100.0.16.1 dst 200.0.0.102 p2p
exec ipsec sa add 16 spi 100016 crypto-alg aes-cbc-128 crypto-key 694743504b7461555a446469516b6e5a integ-alg sha-512-256 integ-key 527a496b7a736a685570746f624d616a7a6f796150775375585a6f53576564594a447067517157766862727649787653617663486361615550556856486d6959 esp
exec ipsec sa add 100016 spi 200016 crypto-alg aes-cbc-128 crypto-key 694743504b7461555a446469516b6e5a integ-alg sha-512-256 integ-key 527a496b7a736a685570746f624d616a7a6f796150775375585a6f53576564594a447067517157766862727649787653617663486361615550556856486d6959 esp
exec ipsec tunnel protect ipip16 sa-out 16 sa-in 100016 add
exec set interface ip address loop0 100.0.17.1/32
exec create ipip tunnel src 100.0.17.1 dst 200.0.0.102 p2p
exec ipsec sa add 17 spi 100017 crypto-alg aes-cbc-128 crypto-key 6c71664e4d7a496d4a714d4c78557068 integ-alg sha-512-256 integ-key 704763636279755358465658674b6758617542716f4675585079536b61776c554b567771705956676d75495a45424b654e595264497454686c67456a496a4657 esp
exec ipsec sa add 100017 spi 200017 crypto-alg aes-cbc-128 crypto-key 6c71664e4d7a496d4a714d4c78557068 integ-alg sha-512-256 integ-key 704763636279755358465658674b6758617542716f4675585079536b61776c554b567771705956676d75495a45424b654e595264497454686c67456a496a4657 esp
exec ipsec tunnel protect ipip17 sa-out 17 sa-in 100017 add
exec set interface ip address loop0 100.0.18.1/32
exec create ipip tunnel src 100.0.18.1 dst 200.0.0.102 p2p
exec ipsec sa add 18 spi 100018 crypto-alg aes-cbc-128 crypto-key 775a504244684e44565557615a4d704d integ-alg sha-512-256 integ-key 77704f7475596a6b4167656a4542437067624946516646597a634e5272796f527259574159554e434e65457752774951497056596e75675277446e4267654f4a esp
exec ipsec sa add 100018 spi 200018 crypto-alg aes-cbc-128 crypto-key 775a504244684e44565557615a4d704d integ-alg sha-512-256 integ-key 77704f7475596a6b4167656a4542437067624946516646597a634e5272796f527259574159554e434e65457752774951497056596e75675277446e4267654f4a esp
exec ipsec tunnel protect ipip18 sa-out 18 sa-in 100018 add
exec set interface ip address loop0 100.0.19.1/32
exec create ipip tunnel src 100.0.19.1 dst 200.0.0.102 p2p
exec ipsec sa add 19 spi 100019 crypto-alg aes-cbc-128 crypto-key 776173416f557564704c4e6d4f71746e integ-alg sha-512-256 integ-key 43594b66755453714a534d77706142624d5470524c554e597a6c714b4a536178715757736161544771646f716a47705a6c494c7079706479644143464c465549 esp
exec ipsec sa add 100019 spi 200019 crypto-alg aes-cbc-128 crypto-key 776173416f557564704c4e6d4f71746e integ-alg sha-512-256 integ-key 43594b66755453714a534d77706142624d5470524c554e597a6c714b4a536178715757736161544771646f716a47705a6c494c7079706479644143464c465549 esp
exec ipsec tunnel protect ipip19 sa-out 19 sa-in 100019 add
exec set interface ip address loop0 100.0.20.1/32
exec create ipip tunnel src 100.0.20.1 dst 200.0.0.102 p2p
exec ipsec sa add 20 spi 100020 crypto-alg aes-cbc-128 crypto-key 6c6f70656f524345634c4d4573786278 integ-alg sha-512-256 integ-key 5172596570646b544a6848556d614d686f554e67796762544675624654594d576b6f6b4941626877734e6a664a5579697970444941526f4c765473456352726c esp
exec ipsec sa add 100020 spi 200020 crypto-alg aes-cbc-128 crypto-key 6c6f70656f524345634c4d4573786278 integ-alg sha-512-256 integ-key 5172596570646b544a6848556d614d686f554e67796762544675624654594d576b6f6b4941626877734e6a664a5579697970444941526f4c765473456352726c esp
exec ipsec tunnel protect ipip20 sa-out 20 sa-in 100020 add
exec set interface ip address loop0 100.0.21.1/32
exec create ipip tunnel src 100.0.21.1 dst 200.0.0.102 p2p
exec ipsec sa add 21 spi 100021 crypto-alg aes-cbc-128 crypto-key 4461466d57584f7462696a76797a724c integ-alg sha-512-256 integ-key 594e6c4c4f7a42454657535541644e7955744869487a63616f6a7243416f6c565541654574754e4376496a775870714941685177735348716641724d41735569 esp
exec ipsec sa add 100021 spi 200021 crypto-alg aes-cbc-128 crypto-key 4461466d57584f7462696a76797a724c integ-alg sha-512-256 integ-key 594e6c4c4f7a42454657535541644e7955744869487a63616f6a7243416f6c565541654574754e4376496a775870714941685177735348716641724d41735569 esp
exec ipsec tunnel protect ipip21 sa-out 21 sa-in 100021 add
exec set interface ip address loop0 100.0.22.1/32
exec create ipip tunnel src 100.0.22.1 dst 200.0.0.102 p2p
exec ipsec sa add 22 spi 100022 crypto-alg aes-cbc-128 crypto-key 5a457452474f4f45457a516b55737869 integ-alg sha-512-256 integ-key 6459445866637268547a464b6a75704a6351664744594d41645749687351554f5847577647436a674f4378716d794b565a686747757a597a744b464142664551 esp
exec ipsec sa add 100022 spi 200022 crypto-alg aes-cbc-128 crypto-key 5a457452474f4f45457a516b55737869 integ-alg sha-512-256 integ-key 6459445866637268547a464b6a75704a6351664744594d41645749687351554f5847577647436a674f4378716d794b565a686747757a597a744b464142664551 esp
exec ipsec tunnel protect ipip22 sa-out 22 sa-in 100022 add
exec set interface ip address loop0 100.0.23.1/32
exec create ipip tunnel src 100.0.23.1 dst 200.0.0.102 p2p
exec ipsec sa add 23 spi 100023 crypto-alg aes-cbc-128 crypto-key 6d504a4c434848716551515253487566 integ-alg sha-512-256 integ-key 4558594563707a4b547974486c4374526d4a664e45765a6a4a4e574f516d786c477a5a4c54476a6d6a59724a4159474c755967476f4e54536863764252504c54 esp
exec ipsec sa add 100023 spi 200023 crypto-alg aes-cbc-128 crypto-key 6d504a4c434848716551515253487566 integ-alg sha-512-256 integ-key 4558594563707a4b547974486c4374526d4a664e45765a6a4a4e574f516d786c477a5a4c54476a6d6a59724a4159474c755967476f4e54536863764252504c54 esp
exec ipsec tunnel protect ipip23 sa-out 23 sa-in 100023 add
exec set interface ip address loop0 100.0.24.1/32
exec create ipip tunnel src 100.0.24.1 dst 200.0.0.102 p2p
exec ipsec sa add 24 spi 100024 crypto-alg aes-cbc-128 crypto-key 506974546a466d43636f494d654f6157 integ-alg sha-512-256 integ-key 50654e465a4c4d644c424b6e425178644a566a4f5a5269706c5971685543646566464f6c647a476d4561434c6462524b4c73414a69624c796a5a646b6c625351 esp
exec ipsec sa add 100024 spi 200024 crypto-alg aes-cbc-128 crypto-key 506974546a466d43636f494d654f6157 integ-alg sha-512-256 integ-key 50654e465a4c4d644c424b6e425178644a566a4f5a5269706c5971685543646566464f6c647a476d4561434c6462524b4c73414a69624c796a5a646b6c625351 esp
exec ipsec tunnel protect ipip24 sa-out 24 sa-in 100024 add
exec set interface ip address loop0 100.0.25.1/32
exec create ipip tunnel src 100.0.25.1 dst 200.0.0.102 p2p
exec ipsec sa add 25 spi 100025 crypto-alg aes-cbc-128 crypto-key 465376485a724d54566e6c69646a6b4e integ-alg sha-512-256 integ-key 6c745053674c68416e6e436c7a6e78526363736f546d6e72414752537859677a4e41674f6778776e476b7155754a536d474662765a494d7875465576766a4644 esp
exec ipsec sa add 100025 spi 200025 crypto-alg aes-cbc-128 crypto-key 465376485a724d54566e6c69646a6b4e integ-alg sha-512-256 integ-key 6c745053674c68416e6e436c7a6e78526363736f546d6e72414752537859677a4e41674f6778776e476b7155754a536d474662765a494d7875465576766a4644 esp
exec ipsec tunnel protect ipip25 sa-out 25 sa-in 100025 add
exec set interface ip address loop0 100.0.26.1/32
exec create ipip tunnel src 100.0.26.1 dst 200.0.0.102 p2p
exec ipsec sa add 26 spi 100026 crypto-alg aes-cbc-128 crypto-key 4957764f436e726b4450595a676f4171 integ-alg sha-512-256 integ-key 7942494e6772576144586e786d5374594643425262546d4c43495a554952615748466c674873734f5a734c52614b507954654e484a79505078506a5470426a44 esp
exec ipsec sa add 100026 spi 200026 crypto-alg aes-cbc-128 crypto-key 4957764f436e726b4450595a676f4171 integ-alg sha-512-256 integ-key 7942494e6772576144586e786d5374594643425262546d4c43495a554952615748466c674873734f5a734c52614b507954654e484a79505078506a5470426a44 esp
exec ipsec tunnel protect ipip26 sa-out 26 sa-in 100026 add
exec set interface ip address loop0 100.0.27.1/32
exec create ipip tunnel src 100.0.27.1 dst 200.0.0.102 p2p
exec ipsec sa add 27 spi 100027 crypto-alg aes-cbc-128 crypto-key 4d627349575859766b5177446b6b6665 integ-alg sha-512-256 integ-key 5774776d5275486e4348786d42445764474e494f5357546b77685569514179636567434a504672534f6e6d6c486478666f6f46586c41534c497955695065586b esp
exec ipsec sa add 100027 spi 200027 crypto-alg aes-cbc-128 crypto-key 4d627349575859766b5177446b6b6665 integ-alg sha-512-256 integ-key 5774776d5275486e4348786d42445764474e494f5357546b77685569514179636567434a504672534f6e6d6c486478666f6f46586c41534c497955695065586b esp
exec ipsec tunnel protect ipip27 sa-out 27 sa-in 100027 add
exec set interface ip address loop0 100.0.28.1/32
exec create ipip tunnel src 100.0.28.1 dst 200.0.0.102 p2p
exec ipsec sa add 28 spi 100028 crypto-alg aes-cbc-128 crypto-key 646e665752486a6b48744670514b6363 integ-alg sha-512-256 integ-key 586471524f614d734a6a767472656f4d5569577575746c4f4670545a4d4f686367777a77474b4b4750794e6678737874436746434a73525a4c68724642704974 esp
exec ipsec sa add 100028 spi 200028 crypto-alg aes-cbc-128 crypto-key 646e665752486a6b48744670514b6363 integ-alg sha-512-256 integ-key 586471524f614d734a6a767472656f4d5569577575746c4f4670545a4d4f686367777a77474b4b4750794e6678737874436746434a73525a4c68724642704974 esp
exec ipsec tunnel protect ipip28 sa-out 28 sa-in 100028 add
exec set interface ip address loop0 100.0.29.1/32
exec create ipip tunnel src 100.0.29.1 dst 200.0.0.102 p2p
exec ipsec sa add 29 spi 100029 crypto-alg aes-cbc-128 crypto-key 504f52585757474e4276617944736469 integ-alg sha-512-256 integ-key 6c66794d677a64704d4354554679617575684b6b4f4569656f7255674c516771456f7a7756785477514659676a566b4c486a7978626244616f6d4f5556644a7a esp
exec ipsec sa add 100029 spi 200029 crypto-alg aes-cbc-128 crypto-key 504f52585757474e4276617944736469 integ-alg sha-512-256 integ-key 6c66794d677a64704d4354554679617575684b6b4f4569656f7255674c516771456f7a7756785477514659676a566b4c486a7978626244616f6d4f5556644a7a esp
exec ipsec tunnel protect ipip29 sa-out 29 sa-in 100029 add
exec set interface ip address loop0 100.0.30.1/32
exec create ipip tunnel src 100.0.30.1 dst 200.0.0.102 p2p
exec ipsec sa add 30 spi 100030 crypto-alg aes-cbc-128 crypto-key 48736c6b4f6b4d4274764c4254744946 integ-alg sha-512-256 integ-key 594c56535142474249456447766856464244774c415370435775574a455049655844736e5567726465425772756156594358797544546e727565694e47757572 esp
exec ipsec sa add 100030 spi 200030 crypto-alg aes-cbc-128 crypto-key 48736c6b4f6b4d4274764c4254744946 integ-alg sha-512-256 integ-key 594c56535142474249456447766856464244774c415370435775574a455049655844736e5567726465425772756156594358797544546e727565694e47757572 esp
exec ipsec tunnel protect ipip30 sa-out 30 sa-in 100030 add
exec set interface ip address loop0 100.0.31.1/32
exec create ipip tunnel src 100.0.31.1 dst 200.0.0.102 p2p
exec ipsec sa add 31 spi 100031 crypto-alg aes-cbc-128 crypto-key 58504a6c575473755255446f666c7476 integ-alg sha-512-256 integ-key 595a696e7049456462554a7949746a4d6744444f6e6d626e4565684f56506d724d4377696c5a6d53696a566f454a6d4f526754446b717057414a49686f4e6b58 esp
exec ipsec sa add 100031 spi 200031 crypto-alg aes-cbc-128 crypto-key 58504a6c575473755255446f666c7476 integ-alg sha-512-256 integ-key 595a696e7049456462554a7949746a4d6744444f6e6d626e4565684f56506d724d4377696c5a6d53696a566f454a6d4f526754446b717057414a49686f4e6b58 esp
exec ipsec tunnel protect ipip31 sa-out 31 sa-in 100031 add
exec set interface ip address loop0 100.0.32.1/32
exec create ipip tunnel src 100.0.32.1 dst 200.0.0.102 p2p
exec ipsec sa add 32 spi 100032 crypto-alg aes-cbc-128 crypto-key 786570794464547158566774614d6950 integ-alg sha-512-256 integ-key 54746c7875757650496f5244764b56497a536c4879566f4f52646f75574a62687572747447574963474c6e416c776e6c764776754546515a4b756a4949697747 esp
exec ipsec sa add 100032 spi 200032 crypto-alg aes-cbc-128 crypto-key 786570794464547158566774614d6950 integ-alg sha-512-256 integ-key 54746c7875757650496f5244764b56497a536c4879566f4f52646f75574a62687572747447574963474c6e416c776e6c764776754546515a4b756a4949697747 esp
exec ipsec tunnel protect ipip32 sa-out 32 sa-in 100032 add
exec set interface ip address loop0 100.0.33.1/32
exec create ipip tunnel src 100.0.33.1 dst 200.0.0.102 p2p
exec ipsec sa add 33 spi 100033 crypto-alg aes-cbc-128 crypto-key 61596a6b78714f4f7377534147587364 integ-alg sha-512-256 integ-key 636d744c5068584a4e525448495173784a6b6672584b7849666453514a5868774559634c4c644b474e5a4f4f644a5657725a775573747250597a4b5170767677 esp
exec ipsec sa add 100033 spi 200033 crypto-alg aes-cbc-128 crypto-key 61596a6b78714f4f7377534147587364 integ-alg sha-512-256 integ-key 636d744c5068584a4e525448495173784a6b6672584b7849666453514a5868774559634c4c644b474e5a4f4f644a5657725a775573747250597a4b5170767677 esp
exec ipsec tunnel protect ipip33 sa-out 33 sa-in 100033 add
exec set interface ip address loop0 100.0.34.1/32
exec create ipip tunnel src 100.0.34.1 dst 200.0.0.102 p2p
exec ipsec sa add 34 spi 100034 crypto-alg aes-cbc-128 crypto-key 496d57687874587a686e4e73454c7975 integ-alg sha-512-256 integ-key 4f75444e4a744a595944467544767a67467552436365657a645172417771714e54645973756c6741725262526f5672695055624c526f544e64706a66456a4775 esp
exec ipsec sa add 100034 spi 200034 crypto-alg aes-cbc-128 crypto-key 496d57687874587a686e4e73454c7975 integ-alg sha-512-256 integ-key 4f75444e4a744a595944467544767a67467552436365657a645172417771714e54645973756c6741725262526f5672695055624c526f544e64706a66456a4775 esp
exec ipsec tunnel protect ipip34 sa-out 34 sa-in 100034 add
exec set interface ip address loop0 100.0.35.1/32
exec create ipip tunnel src 100.0.35.1 dst 200.0.0.102 p2p
exec ipsec sa add 35 spi 100035 crypto-alg aes-cbc-128 crypto-key 664b50744d757177755442767458797a integ-alg sha-512-256 integ-key 6c6c755159696e466147516c57667864656b4c747454566d4564446f6a5472496f436f4d4f6d4247426b70724f7a7a526a516c426e4250504179686b66764a53 esp
exec ipsec sa add 100035 spi 200035 crypto-alg aes-cbc-128 crypto-key 664b50744d757177755442767458797a integ-alg sha-512-256 integ-key 6c6c755159696e466147516c57667864656b4c747454566d4564446f6a5472496f436f4d4f6d4247426b70724f7a7a526a516c426e4250504179686b66764a53 esp
exec ipsec tunnel protect ipip35 sa-out 35 sa-in 100035 add
exec set interface ip address loop0 100.0.36.1/32
exec create ipip tunnel src 100.0.36.1 dst 200.0.0.102 p2p
exec ipsec sa add 36 spi 100036 crypto-alg aes-cbc-128 crypto-key 5976706853686751466b48545a784c74 integ-alg sha-512-256 integ-key 675a634656584c7367535a527555596f5579694149684541785a4848676952506e4867794b79647177724e466d55536e7168477153656e584b41597278577252 esp
exec ipsec sa add 100036 spi 200036 crypto-alg aes-cbc-128 crypto-key 5976706853686751466b48545a784c74 integ-alg sha-512-256 integ-key 675a634656584c7367535a527555596f5579694149684541785a4848676952506e4867794b79647177724e466d55536e7168477153656e584b41597278577252 esp
exec ipsec tunnel protect ipip36 sa-out 36 sa-in 100036 add
exec set interface ip address loop0 100.0.37.1/32
exec create ipip tunnel src 100.0.37.1 dst 200.0.0.102 p2p
exec ipsec sa add 37 spi 100037 crypto-alg aes-cbc-128 crypto-key 7148494e574965794e686d6574787565 integ-alg sha-512-256 integ-key 69426943717048635a767a746c484a574d7956534c7772685662756175735578616756506166426262677a6d4a7049435847487a766e6b665579567759717570 esp
exec ipsec sa add 100037 spi 200037 crypto-alg aes-cbc-128 crypto-key 7148494e574965794e686d6574787565 integ-alg sha-512-256 integ-key 69426943717048635a767a746c484a574d7956534c7772685662756175735578616756506166426262677a6d4a7049435847487a766e6b665579567759717570 esp
exec ipsec tunnel protect ipip37 sa-out 37 sa-in 100037 add
exec set interface ip address loop0 100.0.38.1/32
exec create ipip tunnel src 100.0.38.1 dst 200.0.0.102 p2p
exec ipsec sa add 38 spi 100038 crypto-alg aes-cbc-128 crypto-key 477641716a7263747161654478584e52 integ-alg sha-512-256 integ-key 6375544b644c7a4262526c5a62744a486d6854694d7879737a784f536b4c526d51536c784c776b6d72736a6764594f7447796f4a654747736471566e76594175 esp
exec ipsec sa add 100038 spi 200038 crypto-alg aes-cbc-128 crypto-key 477641716a7263747161654478584e52 integ-alg sha-512-256 integ-key 6375544b644c7a4262526c5a62744a486d6854694d7879737a784f536b4c526d51536c784c776b6d72736a6764594f7447796f4a654747736471566e76594175 esp
exec ipsec tunnel protect ipip38 sa-out 38 sa-in 100038 add
exec set interface ip address loop0 100.0.39.1/32
exec create ipip tunnel src 100.0.39.1 dst 200.0.0.102 p2p
exec ipsec sa add 39 spi 100039 crypto-alg aes-cbc-128 crypto-key 446f5a69726d6f67735776447555654e integ-alg sha-512-256 integ-key 55707642537778596271537470716a706268796a66576e4f567a6544576d77416d52455170774b695561454751687972636a5374566f51716655464672596171 esp
exec ipsec sa add 100039 spi 200039 crypto-alg aes-cbc-128 crypto-key 446f5a69726d6f67735776447555654e integ-alg sha-512-256 integ-key 55707642537778596271537470716a706268796a66576e4f567a6544576d77416d52455170774b695561454751687972636a5374566f51716655464672596171 esp
exec ipsec tunnel protect ipip39 sa-out 39 sa-in 100039 add
exec set interface unnumbered ipip0 use TenGigabitEthernet8/0/0
exec set interface state ipip0 up
exec ip route add 20.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use TenGigabitEthernet8/0/0
exec set interface state ipip1 up
exec ip route add 20.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use TenGigabitEthernet8/0/0
exec set interface state ipip2 up
exec ip route add 20.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use TenGigabitEthernet8/0/0
exec set interface state ipip3 up
exec ip route add 20.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use TenGigabitEthernet8/0/0
exec set interface state ipip4 up
exec ip route add 20.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use TenGigabitEthernet8/0/0
exec set interface state ipip5 up
exec ip route add 20.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use TenGigabitEthernet8/0/0
exec set interface state ipip6 up
exec ip route add 20.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use TenGigabitEthernet8/0/0
exec set interface state ipip7 up
exec ip route add 20.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use TenGigabitEthernet8/0/0
exec set interface state ipip8 up
exec ip route add 20.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use TenGigabitEthernet8/0/0
exec set interface state ipip9 up
exec ip route add 20.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use TenGigabitEthernet8/0/0
exec set interface state ipip10 up
exec ip route add 20.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use TenGigabitEthernet8/0/0
exec set interface state ipip11 up
exec ip route add 20.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use TenGigabitEthernet8/0/0
exec set interface state ipip12 up
exec ip route add 20.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use TenGigabitEthernet8/0/0
exec set interface state ipip13 up
exec ip route add 20.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use TenGigabitEthernet8/0/0
exec set interface state ipip14 up
exec ip route add 20.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use TenGigabitEthernet8/0/0
exec set interface state ipip15 up
exec ip route add 20.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use TenGigabitEthernet8/0/0
exec set interface state ipip16 up
exec ip route add 20.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use TenGigabitEthernet8/0/0
exec set interface state ipip17 up
exec ip route add 20.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use TenGigabitEthernet8/0/0
exec set interface state ipip18 up
exec ip route add 20.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use TenGigabitEthernet8/0/0
exec set interface state ipip19 up
exec ip route add 20.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use TenGigabitEthernet8/0/0
exec set interface state ipip20 up
exec ip route add 20.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use TenGigabitEthernet8/0/0
exec set interface state ipip21 up
exec ip route add 20.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use TenGigabitEthernet8/0/0
exec set interface state ipip22 up
exec ip route add 20.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use TenGigabitEthernet8/0/0
exec set interface state ipip23 up
exec ip route add 20.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use TenGigabitEthernet8/0/0
exec set interface state ipip24 up
exec ip route add 20.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use TenGigabitEthernet8/0/0
exec set interface state ipip25 up
exec ip route add 20.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use TenGigabitEthernet8/0/0
exec set interface state ipip26 up
exec ip route add 20.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use TenGigabitEthernet8/0/0
exec set interface state ipip27 up
exec ip route add 20.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use TenGigabitEthernet8/0/0
exec set interface state ipip28 up
exec ip route add 20.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use TenGigabitEthernet8/0/0
exec set interface state ipip29 up
exec ip route add 20.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use TenGigabitEthernet8/0/0
exec set interface state ipip30 up
exec ip route add 20.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use TenGigabitEthernet8/0/0
exec set interface state ipip31 up
exec ip route add 20.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use TenGigabitEthernet8/0/0
exec set interface state ipip32 up
exec ip route add 20.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use TenGigabitEthernet8/0/0
exec set interface state ipip33 up
exec ip route add 20.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use TenGigabitEthernet8/0/0
exec set interface state ipip34 up
exec ip route add 20.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use TenGigabitEthernet8/0/0
exec set interface state ipip35 up
exec ip route add 20.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use TenGigabitEthernet8/0/0
exec set interface state ipip36 up
exec ip route add 20.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use TenGigabitEthernet8/0/0
exec set interface state ipip37 up
exec ip route add 20.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use TenGigabitEthernet8/0/0
exec set interface state ipip38 up
exec ip route add 20.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use TenGigabitEthernet8/0/0
exec set interface state ipip39 up
exec ip route add 20.0.0.39/32 via ipip39
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec set interface ip address TenGigabitEthernet8/0/0 200.0.0.102/24.0
exec create ipip tunnel src 200.0.0.102 dst 100.0.0.1 p2p
exec ipsec sa add 100000 spi 200000 crypto-alg aes-cbc-128 crypto-key 6a447579746649704c494e4f6d4e7952 integ-alg sha-512-256 integ-key 777759756e6c42457a664e634c765559764b4f54684951556977456b65714b4844764b584646754e5a556d636b4f4d594653724d52594a42486d494e6f636541 esp
exec ipsec sa add 0 spi 100000 crypto-alg aes-cbc-128 crypto-key 6a447579746649704c494e4f6d4e7952 integ-alg sha-512-256 integ-key 777759756e6c42457a664e634c765559764b4f54684951556977456b65714b4844764b584646754e5a556d636b4f4d594653724d52594a42486d494e6f636541 esp
exec ipsec tunnel protect ipip0 sa-out 100000 sa-in 0 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.1.1 p2p
exec ipsec sa add 100001 spi 200001 crypto-alg aes-cbc-128 crypto-key 79676d4c55416458434e63464f6b4455 integ-alg sha-512-256 integ-key 50746a4166754f5261524c574a647a747468784d79674f4a4f4f724c494d4d6a69754952526b736d415a484549456b565a676b4a4f6e7a4e4948525344656144 esp
exec ipsec sa add 1 spi 100001 crypto-alg aes-cbc-128 crypto-key 79676d4c55416458434e63464f6b4455 integ-alg sha-512-256 integ-key 50746a4166754f5261524c574a647a747468784d79674f4a4f4f724c494d4d6a69754952526b736d415a484549456b565a676b4a4f6e7a4e4948525344656144 esp
exec ipsec tunnel protect ipip1 sa-out 100001 sa-in 1 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.2.1 p2p
exec ipsec sa add 100002 spi 200002 crypto-alg aes-cbc-128 crypto-key 63627a6d736e515769636e754d72436f integ-alg sha-512-256 integ-key 6b627371776354566c495665484c775261764e6f4569455a6f52794f6b4756486f6468586441715557574c564c586a4a554c7966646d4e7a6246747864797a50 esp
exec ipsec sa add 2 spi 100002 crypto-alg aes-cbc-128 crypto-key 63627a6d736e515769636e754d72436f integ-alg sha-512-256 integ-key 6b627371776354566c495665484c775261764e6f4569455a6f52794f6b4756486f6468586441715557574c564c586a4a554c7966646d4e7a6246747864797a50 esp
exec ipsec tunnel protect ipip2 sa-out 100002 sa-in 2 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.3.1 p2p
exec ipsec sa add 100003 spi 200003 crypto-alg aes-cbc-128 crypto-key 71486c735051416e7871465159444f78 integ-alg sha-512-256 integ-key 44527954417a4a696371454f6b704b755867714970516f6f59435865464f786c6e564850746a5a69446575474b41764268786e627a536351644b51576a427275 esp
exec ipsec sa add 3 spi 100003 crypto-alg aes-cbc-128 crypto-key 71486c735051416e7871465159444f78 integ-alg sha-512-256 integ-key 44527954417a4a696371454f6b704b755867714970516f6f59435865464f786c6e564850746a5a69446575474b41764268786e627a536351644b51576a427275 esp
exec ipsec tunnel protect ipip3 sa-out 100003 sa-in 3 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.4.1 p2p
exec ipsec sa add 100004 spi 200004 crypto-alg aes-cbc-128 crypto-key 50755a6c4a664c474571735a686c4665 integ-alg sha-512-256 integ-key 4563645274646b64444b644a48586d6271786753535658485975516e71466b4f71774b716273484b45735975494952757677467473776a74557a5a4c6c4c4a75 esp
exec ipsec sa add 4 spi 100004 crypto-alg aes-cbc-128 crypto-key 50755a6c4a664c474571735a686c4665 integ-alg sha-512-256 integ-key 4563645274646b64444b644a48586d6271786753535658485975516e71466b4f71774b716273484b45735975494952757677467473776a74557a5a4c6c4c4a75 esp
exec ipsec tunnel protect ipip4 sa-out 100004 sa-in 4 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.5.1 p2p
exec ipsec sa add 100005 spi 200005 crypto-alg aes-cbc-128 crypto-key 6c5051715844734f664b537a68485051 integ-alg sha-512-256 integ-key 68524c5973535962486b62477a71416a595a6b4b78496a4b70595164556b63497476726d67484673727765656454574b74694c726f47764d4c53525162745069 esp
exec ipsec sa add 5 spi 100005 crypto-alg aes-cbc-128 crypto-key 6c5051715844734f664b537a68485051 integ-alg sha-512-256 integ-key 68524c5973535962486b62477a71416a595a6b4b78496a4b70595164556b63497476726d67484673727765656454574b74694c726f47764d4c53525162745069 esp
exec ipsec tunnel protect ipip5 sa-out 100005 sa-in 5 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.6.1 p2p
exec ipsec sa add 100006 spi 200006 crypto-alg aes-cbc-128 crypto-key 4c6c50725873616244797a47566c6c4b integ-alg sha-512-256 integ-key 74507a66715945417a42646e466e4277787167576869574f4856734a7478477558655466746a486b4f4f516c674254704f714b63414d436273534d5346705346 esp
exec ipsec sa add 6 spi 100006 crypto-alg aes-cbc-128 crypto-key 4c6c50725873616244797a47566c6c4b integ-alg sha-512-256 integ-key 74507a66715945417a42646e466e4277787167576869574f4856734a7478477558655466746a486b4f4f516c674254704f714b63414d436273534d5346705346 esp
exec ipsec tunnel protect ipip6 sa-out 100006 sa-in 6 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.7.1 p2p
exec ipsec sa add 100007 spi 200007 crypto-alg aes-cbc-128 crypto-key 587652616e7650436e4b51416551507a integ-alg sha-512-256 integ-key 556c724d434e4251676747645468736f554570754f43514f6c446c707554466b6747574b4470427353525946674c6a736a536d676964455862696c47627a4570 esp
exec ipsec sa add 7 spi 100007 crypto-alg aes-cbc-128 crypto-key 587652616e7650436e4b51416551507a integ-alg sha-512-256 integ-key 556c724d434e4251676747645468736f554570754f43514f6c446c707554466b6747574b4470427353525946674c6a736a536d676964455862696c47627a4570 esp
exec ipsec tunnel protect ipip7 sa-out 100007 sa-in 7 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.8.1 p2p
exec ipsec sa add 100008 spi 200008 crypto-alg aes-cbc-128 crypto-key 446d79456c6661786c63684c4a464268 integ-alg sha-512-256 integ-key 5a754a4c717057485463536b516d474d686672696b534865676f55694b48486c614e6357646366467956445a4a716f526766644a676d7a574d4b4568754d7a51 esp
exec ipsec sa add 8 spi 100008 crypto-alg aes-cbc-128 crypto-key 446d79456c6661786c63684c4a464268 integ-alg sha-512-256 integ-key 5a754a4c717057485463536b516d474d686672696b534865676f55694b48486c614e6357646366467956445a4a716f526766644a676d7a574d4b4568754d7a51 esp
exec ipsec tunnel protect ipip8 sa-out 100008 sa-in 8 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.9.1 p2p
exec ipsec sa add 100009 spi 200009 crypto-alg aes-cbc-128 crypto-key 636e504c765358596f51625a4d63746e integ-alg sha-512-256 integ-key 55646f4a704f6d66645a5a43756867544a64724b764142546d7943744143676c4e73485a674963454d6f4f7773615061765946755455464377524c7674746545 esp
exec ipsec sa add 9 spi 100009 crypto-alg aes-cbc-128 crypto-key 636e504c765358596f51625a4d63746e integ-alg sha-512-256 integ-key 55646f4a704f6d66645a5a43756867544a64724b764142546d7943744143676c4e73485a674963454d6f4f7773615061765946755455464377524c7674746545 esp
exec ipsec tunnel protect ipip9 sa-out 100009 sa-in 9 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.10.1 p2p
exec ipsec sa add 100010 spi 200010 crypto-alg aes-cbc-128 crypto-key 5974647371534141414961454752626b integ-alg sha-512-256 integ-key 637264534d6358584d46695254796e4f796553424f716f676e53637a506a4f70536a664d7655654e627163574f65615369715271674c7445686c76774559755a esp
exec ipsec sa add 10 spi 100010 crypto-alg aes-cbc-128 crypto-key 5974647371534141414961454752626b integ-alg sha-512-256 integ-key 637264534d6358584d46695254796e4f796553424f716f676e53637a506a4f70536a664d7655654e627163574f65615369715271674c7445686c76774559755a esp
exec ipsec tunnel protect ipip10 sa-out 100010 sa-in 10 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.11.1 p2p
exec ipsec sa add 100011 spi 200011 crypto-alg aes-cbc-128 crypto-key 796e774b4c63444b5969625871615771 integ-alg sha-512-256 integ-key 4f4950456f5059467a6f465969504a4a444c56496e5866567a546353726f764e5070414a4145536a7a4e434b474344484973426f516757617345724a624a4746 esp
exec ipsec sa add 11 spi 100011 crypto-alg aes-cbc-128 crypto-key 796e774b4c63444b5969625871615771 integ-alg sha-512-256 integ-key 4f4950456f5059467a6f465969504a4a444c56496e5866567a546353726f764e5070414a4145536a7a4e434b474344484973426f516757617345724a624a4746 esp
exec ipsec tunnel protect ipip11 sa-out 100011 sa-in 11 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.12.1 p2p
exec ipsec sa add 100012 spi 200012 crypto-alg aes-cbc-128 crypto-key 71496d41497947597248476a5159716b integ-alg sha-512-256 integ-key 446443795368756f4e6d6d6c5a7569545a677243544b44596371796d6d6d6c4e5272676547415471507043625977566676454d694547536b4a69487679554b7a esp
exec ipsec sa add 12 spi 100012 crypto-alg aes-cbc-128 crypto-key 71496d41497947597248476a5159716b integ-alg sha-512-256 integ-key 446443795368756f4e6d6d6c5a7569545a677243544b44596371796d6d6d6c4e5272676547415471507043625977566676454d694547536b4a69487679554b7a esp
exec ipsec tunnel protect ipip12 sa-out 100012 sa-in 12 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.13.1 p2p
exec ipsec sa add 100013 spi 200013 crypto-alg aes-cbc-128 crypto-key 74484647635159514e6f45416e79526f integ-alg sha-512-256 integ-key 784b46474b6c725451415142426759764e6b76717450734876534662577a736c75496d4a786c4967436a696d5362417367494e4565414c6f77757a77596a6141 esp
exec ipsec sa add 13 spi 100013 crypto-alg aes-cbc-128 crypto-key 74484647635159514e6f45416e79526f integ-alg sha-512-256 integ-key 784b46474b6c725451415142426759764e6b76717450734876534662577a736c75496d4a786c4967436a696d5362417367494e4565414c6f77757a77596a6141 esp
exec ipsec tunnel protect ipip13 sa-out 100013 sa-in 13 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.14.1 p2p
exec ipsec sa add 100014 spi 200014 crypto-alg aes-cbc-128 crypto-key 494f564b757a4b7377595373585a675a integ-alg sha-512-256 integ-key 494c4b4e71565a744259615a626c556669454b595859556b766b6671434365756d5267795749664c5843676b564e4176416769737064637548644c784f546a4a esp
exec ipsec sa add 14 spi 100014 crypto-alg aes-cbc-128 crypto-key 494f564b757a4b7377595373585a675a integ-alg sha-512-256 integ-key 494c4b4e71565a744259615a626c556669454b595859556b766b6671434365756d5267795749664c5843676b564e4176416769737064637548644c784f546a4a esp
exec ipsec tunnel protect ipip14 sa-out 100014 sa-in 14 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.15.1 p2p
exec ipsec sa add 100015 spi 200015 crypto-alg aes-cbc-128 crypto-key 42634d6a704b596d58655a434e78546c integ-alg sha-512-256 integ-key 6855547a65614f7754424762445a5a5657465a4767694d66667356744e575a746870676171534766475659634646526c66724464625a4b47487165495066484a esp
exec ipsec sa add 15 spi 100015 crypto-alg aes-cbc-128 crypto-key 42634d6a704b596d58655a434e78546c integ-alg sha-512-256 integ-key 6855547a65614f7754424762445a5a5657465a4767694d66667356744e575a746870676171534766475659634646526c66724464625a4b47487165495066484a esp
exec ipsec tunnel protect ipip15 sa-out 100015 sa-in 15 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.16.1 p2p
exec ipsec sa add 100016 spi 200016 crypto-alg aes-cbc-128 crypto-key 694743504b7461555a446469516b6e5a integ-alg sha-512-256 integ-key 527a496b7a736a685570746f624d616a7a6f796150775375585a6f53576564594a447067517157766862727649787653617663486361615550556856486d6959 esp
exec ipsec sa add 16 spi 100016 crypto-alg aes-cbc-128 crypto-key 694743504b7461555a446469516b6e5a integ-alg sha-512-256 integ-key 527a496b7a736a685570746f624d616a7a6f796150775375585a6f53576564594a447067517157766862727649787653617663486361615550556856486d6959 esp
exec ipsec tunnel protect ipip16 sa-out 100016 sa-in 16 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.17.1 p2p
exec ipsec sa add 100017 spi 200017 crypto-alg aes-cbc-128 crypto-key 6c71664e4d7a496d4a714d4c78557068 integ-alg sha-512-256 integ-key 704763636279755358465658674b6758617542716f4675585079536b61776c554b567771705956676d75495a45424b654e595264497454686c67456a496a4657 esp
exec ipsec sa add 17 spi 100017 crypto-alg aes-cbc-128 crypto-key 6c71664e4d7a496d4a714d4c78557068 integ-alg sha-512-256 integ-key 704763636279755358465658674b6758617542716f4675585079536b61776c554b567771705956676d75495a45424b654e595264497454686c67456a496a4657 esp
exec ipsec tunnel protect ipip17 sa-out 100017 sa-in 17 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.18.1 p2p
exec ipsec sa add 100018 spi 200018 crypto-alg aes-cbc-128 crypto-key 775a504244684e44565557615a4d704d integ-alg sha-512-256 integ-key 77704f7475596a6b4167656a4542437067624946516646597a634e5272796f527259574159554e434e65457752774951497056596e75675277446e4267654f4a esp
exec ipsec sa add 18 spi 100018 crypto-alg aes-cbc-128 crypto-key 775a504244684e44565557615a4d704d integ-alg sha-512-256 integ-key 77704f7475596a6b4167656a4542437067624946516646597a634e5272796f527259574159554e434e65457752774951497056596e75675277446e4267654f4a esp
exec ipsec tunnel protect ipip18 sa-out 100018 sa-in 18 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.19.1 p2p
exec ipsec sa add 100019 spi 200019 crypto-alg aes-cbc-128 crypto-key 776173416f557564704c4e6d4f71746e integ-alg sha-512-256 integ-key 43594b66755453714a534d77706142624d5470524c554e597a6c714b4a536178715757736161544771646f716a47705a6c494c7079706479644143464c465549 esp
exec ipsec sa add 19 spi 100019 crypto-alg aes-cbc-128 crypto-key 776173416f557564704c4e6d4f71746e integ-alg sha-512-256 integ-key 43594b66755453714a534d77706142624d5470524c554e597a6c714b4a536178715757736161544771646f716a47705a6c494c7079706479644143464c465549 esp
exec ipsec tunnel protect ipip19 sa-out 100019 sa-in 19 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.20.1 p2p
exec ipsec sa add 100020 spi 200020 crypto-alg aes-cbc-128 crypto-key 6c6f70656f524345634c4d4573786278 integ-alg sha-512-256 integ-key 5172596570646b544a6848556d614d686f554e67796762544675624654594d576b6f6b4941626877734e6a664a5579697970444941526f4c765473456352726c esp
exec ipsec sa add 20 spi 100020 crypto-alg aes-cbc-128 crypto-key 6c6f70656f524345634c4d4573786278 integ-alg sha-512-256 integ-key 5172596570646b544a6848556d614d686f554e67796762544675624654594d576b6f6b4941626877734e6a664a5579697970444941526f4c765473456352726c esp
exec ipsec tunnel protect ipip20 sa-out 100020 sa-in 20 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.21.1 p2p
exec ipsec sa add 100021 spi 200021 crypto-alg aes-cbc-128 crypto-key 4461466d57584f7462696a76797a724c integ-alg sha-512-256 integ-key 594e6c4c4f7a42454657535541644e7955744869487a63616f6a7243416f6c565541654574754e4376496a775870714941685177735348716641724d41735569 esp
exec ipsec sa add 21 spi 100021 crypto-alg aes-cbc-128 crypto-key 4461466d57584f7462696a76797a724c integ-alg sha-512-256 integ-key 594e6c4c4f7a42454657535541644e7955744869487a63616f6a7243416f6c565541654574754e4376496a775870714941685177735348716641724d41735569 esp
exec ipsec tunnel protect ipip21 sa-out 100021 sa-in 21 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.22.1 p2p
exec ipsec sa add 100022 spi 200022 crypto-alg aes-cbc-128 crypto-key 5a457452474f4f45457a516b55737869 integ-alg sha-512-256 integ-key 6459445866637268547a464b6a75704a6351664744594d41645749687351554f5847577647436a674f4378716d794b565a686747757a597a744b464142664551 esp
exec ipsec sa add 22 spi 100022 crypto-alg aes-cbc-128 crypto-key 5a457452474f4f45457a516b55737869 integ-alg sha-512-256 integ-key 6459445866637268547a464b6a75704a6351664744594d41645749687351554f5847577647436a674f4378716d794b565a686747757a597a744b464142664551 esp
exec ipsec tunnel protect ipip22 sa-out 100022 sa-in 22 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.23.1 p2p
exec ipsec sa add 100023 spi 200023 crypto-alg aes-cbc-128 crypto-key 6d504a4c434848716551515253487566 integ-alg sha-512-256 integ-key 4558594563707a4b547974486c4374526d4a664e45765a6a4a4e574f516d786c477a5a4c54476a6d6a59724a4159474c755967476f4e54536863764252504c54 esp
exec ipsec sa add 23 spi 100023 crypto-alg aes-cbc-128 crypto-key 6d504a4c434848716551515253487566 integ-alg sha-512-256 integ-key 4558594563707a4b547974486c4374526d4a664e45765a6a4a4e574f516d786c477a5a4c54476a6d6a59724a4159474c755967476f4e54536863764252504c54 esp
exec ipsec tunnel protect ipip23 sa-out 100023 sa-in 23 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.24.1 p2p
exec ipsec sa add 100024 spi 200024 crypto-alg aes-cbc-128 crypto-key 506974546a466d43636f494d654f6157 integ-alg sha-512-256 integ-key 50654e465a4c4d644c424b6e425178644a566a4f5a5269706c5971685543646566464f6c647a476d4561434c6462524b4c73414a69624c796a5a646b6c625351 esp
exec ipsec sa add 24 spi 100024 crypto-alg aes-cbc-128 crypto-key 506974546a466d43636f494d654f6157 integ-alg sha-512-256 integ-key 50654e465a4c4d644c424b6e425178644a566a4f5a5269706c5971685543646566464f6c647a476d4561434c6462524b4c73414a69624c796a5a646b6c625351 esp
exec ipsec tunnel protect ipip24 sa-out 100024 sa-in 24 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.25.1 p2p
exec ipsec sa add 100025 spi 200025 crypto-alg aes-cbc-128 crypto-key 465376485a724d54566e6c69646a6b4e integ-alg sha-512-256 integ-key 6c745053674c68416e6e436c7a6e78526363736f546d6e72414752537859677a4e41674f6778776e476b7155754a536d474662765a494d7875465576766a4644 esp
exec ipsec sa add 25 spi 100025 crypto-alg aes-cbc-128 crypto-key 465376485a724d54566e6c69646a6b4e integ-alg sha-512-256 integ-key 6c745053674c68416e6e436c7a6e78526363736f546d6e72414752537859677a4e41674f6778776e476b7155754a536d474662765a494d7875465576766a4644 esp
exec ipsec tunnel protect ipip25 sa-out 100025 sa-in 25 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.26.1 p2p
exec ipsec sa add 100026 spi 200026 crypto-alg aes-cbc-128 crypto-key 4957764f436e726b4450595a676f4171 integ-alg sha-512-256 integ-key 7942494e6772576144586e786d5374594643425262546d4c43495a554952615748466c674873734f5a734c52614b507954654e484a79505078506a5470426a44 esp
exec ipsec sa add 26 spi 100026 crypto-alg aes-cbc-128 crypto-key 4957764f436e726b4450595a676f4171 integ-alg sha-512-256 integ-key 7942494e6772576144586e786d5374594643425262546d4c43495a554952615748466c674873734f5a734c52614b507954654e484a79505078506a5470426a44 esp
exec ipsec tunnel protect ipip26 sa-out 100026 sa-in 26 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.27.1 p2p
exec ipsec sa add 100027 spi 200027 crypto-alg aes-cbc-128 crypto-key 4d627349575859766b5177446b6b6665 integ-alg sha-512-256 integ-key 5774776d5275486e4348786d42445764474e494f5357546b77685569514179636567434a504672534f6e6d6c486478666f6f46586c41534c497955695065586b esp
exec ipsec sa add 27 spi 100027 crypto-alg aes-cbc-128 crypto-key 4d627349575859766b5177446b6b6665 integ-alg sha-512-256 integ-key 5774776d5275486e4348786d42445764474e494f5357546b77685569514179636567434a504672534f6e6d6c486478666f6f46586c41534c497955695065586b esp
exec ipsec tunnel protect ipip27 sa-out 100027 sa-in 27 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.28.1 p2p
exec ipsec sa add 100028 spi 200028 crypto-alg aes-cbc-128 crypto-key 646e665752486a6b48744670514b6363 integ-alg sha-512-256 integ-key 586471524f614d734a6a767472656f4d5569577575746c4f4670545a4d4f686367777a77474b4b4750794e6678737874436746434a73525a4c68724642704974 esp
exec ipsec sa add 28 spi 100028 crypto-alg aes-cbc-128 crypto-key 646e665752486a6b48744670514b6363 integ-alg sha-512-256 integ-key 586471524f614d734a6a767472656f4d5569577575746c4f4670545a4d4f686367777a77474b4b4750794e6678737874436746434a73525a4c68724642704974 esp
exec ipsec tunnel protect ipip28 sa-out 100028 sa-in 28 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.29.1 p2p
exec ipsec sa add 100029 spi 200029 crypto-alg aes-cbc-128 crypto-key 504f52585757474e4276617944736469 integ-alg sha-512-256 integ-key 6c66794d677a64704d4354554679617575684b6b4f4569656f7255674c516771456f7a7756785477514659676a566b4c486a7978626244616f6d4f5556644a7a esp
exec ipsec sa add 29 spi 100029 crypto-alg aes-cbc-128 crypto-key 504f52585757474e4276617944736469 integ-alg sha-512-256 integ-key 6c66794d677a64704d4354554679617575684b6b4f4569656f7255674c516771456f7a7756785477514659676a566b4c486a7978626244616f6d4f5556644a7a esp
exec ipsec tunnel protect ipip29 sa-out 100029 sa-in 29 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.30.1 p2p
exec ipsec sa add 100030 spi 200030 crypto-alg aes-cbc-128 crypto-key 48736c6b4f6b4d4274764c4254744946 integ-alg sha-512-256 integ-key 594c56535142474249456447766856464244774c415370435775574a455049655844736e5567726465425772756156594358797544546e727565694e47757572 esp
exec ipsec sa add 30 spi 100030 crypto-alg aes-cbc-128 crypto-key 48736c6b4f6b4d4274764c4254744946 integ-alg sha-512-256 integ-key 594c56535142474249456447766856464244774c415370435775574a455049655844736e5567726465425772756156594358797544546e727565694e47757572 esp
exec ipsec tunnel protect ipip30 sa-out 100030 sa-in 30 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.31.1 p2p
exec ipsec sa add 100031 spi 200031 crypto-alg aes-cbc-128 crypto-key 58504a6c575473755255446f666c7476 integ-alg sha-512-256 integ-key 595a696e7049456462554a7949746a4d6744444f6e6d626e4565684f56506d724d4377696c5a6d53696a566f454a6d4f526754446b717057414a49686f4e6b58 esp
exec ipsec sa add 31 spi 100031 crypto-alg aes-cbc-128 crypto-key 58504a6c575473755255446f666c7476 integ-alg sha-512-256 integ-key 595a696e7049456462554a7949746a4d6744444f6e6d626e4565684f56506d724d4377696c5a6d53696a566f454a6d4f526754446b717057414a49686f4e6b58 esp
exec ipsec tunnel protect ipip31 sa-out 100031 sa-in 31 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.32.1 p2p
exec ipsec sa add 100032 spi 200032 crypto-alg aes-cbc-128 crypto-key 786570794464547158566774614d6950 integ-alg sha-512-256 integ-key 54746c7875757650496f5244764b56497a536c4879566f4f52646f75574a62687572747447574963474c6e416c776e6c764776754546515a4b756a4949697747 esp
exec ipsec sa add 32 spi 100032 crypto-alg aes-cbc-128 crypto-key 786570794464547158566774614d6950 integ-alg sha-512-256 integ-key 54746c7875757650496f5244764b56497a536c4879566f4f52646f75574a62687572747447574963474c6e416c776e6c764776754546515a4b756a4949697747 esp
exec ipsec tunnel protect ipip32 sa-out 100032 sa-in 32 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.33.1 p2p
exec ipsec sa add 100033 spi 200033 crypto-alg aes-cbc-128 crypto-key 61596a6b78714f4f7377534147587364 integ-alg sha-512-256 integ-key 636d744c5068584a4e525448495173784a6b6672584b7849666453514a5868774559634c4c644b474e5a4f4f644a5657725a775573747250597a4b5170767677 esp
exec ipsec sa add 33 spi 100033 crypto-alg aes-cbc-128 crypto-key 61596a6b78714f4f7377534147587364 integ-alg sha-512-256 integ-key 636d744c5068584a4e525448495173784a6b6672584b7849666453514a5868774559634c4c644b474e5a4f4f644a5657725a775573747250597a4b5170767677 esp
exec ipsec tunnel protect ipip33 sa-out 100033 sa-in 33 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.34.1 p2p
exec ipsec sa add 100034 spi 200034 crypto-alg aes-cbc-128 crypto-key 496d57687874587a686e4e73454c7975 integ-alg sha-512-256 integ-key 4f75444e4a744a595944467544767a67467552436365657a645172417771714e54645973756c6741725262526f5672695055624c526f544e64706a66456a4775 esp
exec ipsec sa add 34 spi 100034 crypto-alg aes-cbc-128 crypto-key 496d57687874587a686e4e73454c7975 integ-alg sha-512-256 integ-key 4f75444e4a744a595944467544767a67467552436365657a645172417771714e54645973756c6741725262526f5672695055624c526f544e64706a66456a4775 esp
exec ipsec tunnel protect ipip34 sa-out 100034 sa-in 34 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.35.1 p2p
exec ipsec sa add 100035 spi 200035 crypto-alg aes-cbc-128 crypto-key 664b50744d757177755442767458797a integ-alg sha-512-256 integ-key 6c6c755159696e466147516c57667864656b4c747454566d4564446f6a5472496f436f4d4f6d4247426b70724f7a7a526a516c426e4250504179686b66764a53 esp
exec ipsec sa add 35 spi 100035 crypto-alg aes-cbc-128 crypto-key 664b50744d757177755442767458797a integ-alg sha-512-256 integ-key 6c6c755159696e466147516c57667864656b4c747454566d4564446f6a5472496f436f4d4f6d4247426b70724f7a7a526a516c426e4250504179686b66764a53 esp
exec ipsec tunnel protect ipip35 sa-out 100035 sa-in 35 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.36.1 p2p
exec ipsec sa add 100036 spi 200036 crypto-alg aes-cbc-128 crypto-key 5976706853686751466b48545a784c74 integ-alg sha-512-256 integ-key 675a634656584c7367535a527555596f5579694149684541785a4848676952506e4867794b79647177724e466d55536e7168477153656e584b41597278577252 esp
exec ipsec sa add 36 spi 100036 crypto-alg aes-cbc-128 crypto-key 5976706853686751466b48545a784c74 integ-alg sha-512-256 integ-key 675a634656584c7367535a527555596f5579694149684541785a4848676952506e4867794b79647177724e466d55536e7168477153656e584b41597278577252 esp
exec ipsec tunnel protect ipip36 sa-out 100036 sa-in 36 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.37.1 p2p
exec ipsec sa add 100037 spi 200037 crypto-alg aes-cbc-128 crypto-key 7148494e574965794e686d6574787565 integ-alg sha-512-256 integ-key 69426943717048635a767a746c484a574d7956534c7772685662756175735578616756506166426262677a6d4a7049435847487a766e6b665579567759717570 esp
exec ipsec sa add 37 spi 100037 crypto-alg aes-cbc-128 crypto-key 7148494e574965794e686d6574787565 integ-alg sha-512-256 integ-key 69426943717048635a767a746c484a574d7956534c7772685662756175735578616756506166426262677a6d4a7049435847487a766e6b665579567759717570 esp
exec ipsec tunnel protect ipip37 sa-out 100037 sa-in 37 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.38.1 p2p
exec ipsec sa add 100038 spi 200038 crypto-alg aes-cbc-128 crypto-key 477641716a7263747161654478584e52 integ-alg sha-512-256 integ-key 6375544b644c7a4262526c5a62744a486d6854694d7879737a784f536b4c526d51536c784c776b6d72736a6764594f7447796f4a654747736471566e76594175 esp
exec ipsec sa add 38 spi 100038 crypto-alg aes-cbc-128 crypto-key 477641716a7263747161654478584e52 integ-alg sha-512-256 integ-key 6375544b644c7a4262526c5a62744a486d6854694d7879737a784f536b4c526d51536c784c776b6d72736a6764594f7447796f4a654747736471566e76594175 esp
exec ipsec tunnel protect ipip38 sa-out 100038 sa-in 38 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.39.1 p2p
exec ipsec sa add 100039 spi 200039 crypto-alg aes-cbc-128 crypto-key 446f5a69726d6f67735776447555654e integ-alg sha-512-256 integ-key 55707642537778596271537470716a706268796a66576e4f567a6544576d77416d52455170774b695561454751687972636a5374566f51716655464672596171 esp
exec ipsec sa add 39 spi 100039 crypto-alg aes-cbc-128 crypto-key 446f5a69726d6f67735776447555654e integ-alg sha-512-256 integ-key 55707642537778596271537470716a706268796a66576e4f567a6544576d77416d52455170774b695561454751687972636a5374566f51716655464672596171 esp
exec ipsec tunnel protect ipip39 sa-out 100039 sa-in 39 add
exec ip route add 100.0.0.1/8 via 200.0.0.101 TenGigabitEthernet8/0/0
exec set interface unnumbered ipip0 use TenGigabitEthernet8/0/0
exec set interface state ipip0 up
exec ip route add 10.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use TenGigabitEthernet8/0/0
exec set interface state ipip1 up
exec ip route add 10.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use TenGigabitEthernet8/0/0
exec set interface state ipip2 up
exec ip route add 10.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use TenGigabitEthernet8/0/0
exec set interface state ipip3 up
exec ip route add 10.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use TenGigabitEthernet8/0/0
exec set interface state ipip4 up
exec ip route add 10.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use TenGigabitEthernet8/0/0
exec set interface state ipip5 up
exec ip route add 10.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use TenGigabitEthernet8/0/0
exec set interface state ipip6 up
exec ip route add 10.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use TenGigabitEthernet8/0/0
exec set interface state ipip7 up
exec ip route add 10.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use TenGigabitEthernet8/0/0
exec set interface state ipip8 up
exec ip route add 10.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use TenGigabitEthernet8/0/0
exec set interface state ipip9 up
exec ip route add 10.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use TenGigabitEthernet8/0/0
exec set interface state ipip10 up
exec ip route add 10.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use TenGigabitEthernet8/0/0
exec set interface state ipip11 up
exec ip route add 10.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use TenGigabitEthernet8/0/0
exec set interface state ipip12 up
exec ip route add 10.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use TenGigabitEthernet8/0/0
exec set interface state ipip13 up
exec ip route add 10.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use TenGigabitEthernet8/0/0
exec set interface state ipip14 up
exec ip route add 10.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use TenGigabitEthernet8/0/0
exec set interface state ipip15 up
exec ip route add 10.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use TenGigabitEthernet8/0/0
exec set interface state ipip16 up
exec ip route add 10.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use TenGigabitEthernet8/0/0
exec set interface state ipip17 up
exec ip route add 10.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use TenGigabitEthernet8/0/0
exec set interface state ipip18 up
exec ip route add 10.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use TenGigabitEthernet8/0/0
exec set interface state ipip19 up
exec ip route add 10.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use TenGigabitEthernet8/0/0
exec set interface state ipip20 up
exec ip route add 10.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use TenGigabitEthernet8/0/0
exec set interface state ipip21 up
exec ip route add 10.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use TenGigabitEthernet8/0/0
exec set interface state ipip22 up
exec ip route add 10.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use TenGigabitEthernet8/0/0
exec set interface state ipip23 up
exec ip route add 10.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use TenGigabitEthernet8/0/0
exec set interface state ipip24 up
exec ip route add 10.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use TenGigabitEthernet8/0/0
exec set interface state ipip25 up
exec ip route add 10.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use TenGigabitEthernet8/0/0
exec set interface state ipip26 up
exec ip route add 10.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use TenGigabitEthernet8/0/0
exec set interface state ipip27 up
exec ip route add 10.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use TenGigabitEthernet8/0/0
exec set interface state ipip28 up
exec ip route add 10.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use TenGigabitEthernet8/0/0
exec set interface state ipip29 up
exec ip route add 10.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use TenGigabitEthernet8/0/0
exec set interface state ipip30 up
exec ip route add 10.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use TenGigabitEthernet8/0/0
exec set interface state ipip31 up
exec ip route add 10.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use TenGigabitEthernet8/0/0
exec set interface state ipip32 up
exec ip route add 10.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use TenGigabitEthernet8/0/0
exec set interface state ipip33 up
exec ip route add 10.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use TenGigabitEthernet8/0/0
exec set interface state ipip34 up
exec ip route add 10.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use TenGigabitEthernet8/0/0
exec set interface state ipip35 up
exec ip route add 10.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use TenGigabitEthernet8/0/0
exec set interface state ipip36 up
exec ip route add 10.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use TenGigabitEthernet8/0/0
exec set interface state ipip37 up
exec ip route add 10.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use TenGigabitEthernet8/0/0
exec set interface state ipip38 up
exec ip route add 10.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use TenGigabitEthernet8/0/0
exec set interface state ipip39 up
exec ip route add 10.0.0.39/32 via ipip39

 imix-1t1c-ethip4ipsec40tnlsw-ip4base- 
int-aes128cbc-hmac512sha-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec create loopback interface
exec set interface state loop0 up
exec set interface ip address TenGigabitEthernet8/0/0 200.0.0.101/24
exec set ip neighbor TenGigabitEthernet8/0/0 200.0.0.102 ac:1f:6b:57:57:fe static
exec set interface ip address loop0 100.0.0.1/32
exec create ipip tunnel src 100.0.0.1 dst 200.0.0.102 p2p
exec ipsec sa add 0 spi 100000 crypto-alg aes-cbc-128 crypto-key 4245487a62514b4e624758754f7a6779 integ-alg sha-512-256 integ-key 4265656b59417a754741516b425578715a494543504678766d4d517352774b45717956757572787648657859586f744b44797a4d6a6c427669545050664c4a52 esp
exec ipsec sa add 100000 spi 200000 crypto-alg aes-cbc-128 crypto-key 4245487a62514b4e624758754f7a6779 integ-alg sha-512-256 integ-key 4265656b59417a754741516b425578715a494543504678766d4d517352774b45717956757572787648657859586f744b44797a4d6a6c427669545050664c4a52 esp
exec ipsec tunnel protect ipip0 sa-out 0 sa-in 100000 add
exec set interface ip address loop0 100.0.1.1/32
exec create ipip tunnel src 100.0.1.1 dst 200.0.0.102 p2p
exec ipsec sa add 1 spi 100001 crypto-alg aes-cbc-128 crypto-key 58584d766862797265794f6f6b436355 integ-alg sha-512-256 integ-key 7050447441744d6a4e63416e6b494253665970704d5a667a516468636673575a65566f74544f6f494c494d54484f4f4f7175687464454a76595565747a41676b esp
exec ipsec sa add 100001 spi 200001 crypto-alg aes-cbc-128 crypto-key 58584d766862797265794f6f6b436355 integ-alg sha-512-256 integ-key 7050447441744d6a4e63416e6b494253665970704d5a667a516468636673575a65566f74544f6f494c494d54484f4f4f7175687464454a76595565747a41676b esp
exec ipsec tunnel protect ipip1 sa-out 1 sa-in 100001 add
exec set interface ip address loop0 100.0.2.1/32
exec create ipip tunnel src 100.0.2.1 dst 200.0.0.102 p2p
exec ipsec sa add 2 spi 100002 crypto-alg aes-cbc-128 crypto-key 57786668426373425767456e6165764a integ-alg sha-512-256 integ-key 614254736a54494f49636b71744c46596d424369594b63624c5278544470687763696f70425350524d4a73424c72714a48536c426973445a66484a4f75535052 esp
exec ipsec sa add 100002 spi 200002 crypto-alg aes-cbc-128 crypto-key 57786668426373425767456e6165764a integ-alg sha-512-256 integ-key 614254736a54494f49636b71744c46596d424369594b63624c5278544470687763696f70425350524d4a73424c72714a48536c426973445a66484a4f75535052 esp
exec ipsec tunnel protect ipip2 sa-out 2 sa-in 100002 add
exec set interface ip address loop0 100.0.3.1/32
exec create ipip tunnel src 100.0.3.1 dst 200.0.0.102 p2p
exec ipsec sa add 3 spi 100003 crypto-alg aes-cbc-128 crypto-key 4742456f614b4d597141675249634869 integ-alg sha-512-256 integ-key 4b67784b47434753515879477557785467577770477a755067637a657a4c77756b62517468714f78467474535843545a7577675272646562544d6f545549534c esp
exec ipsec sa add 100003 spi 200003 crypto-alg aes-cbc-128 crypto-key 4742456f614b4d597141675249634869 integ-alg sha-512-256 integ-key 4b67784b47434753515879477557785467577770477a755067637a657a4c77756b62517468714f78467474535843545a7577675272646562544d6f545549534c esp
exec ipsec tunnel protect ipip3 sa-out 3 sa-in 100003 add
exec set interface ip address loop0 100.0.4.1/32
exec create ipip tunnel src 100.0.4.1 dst 200.0.0.102 p2p
exec ipsec sa add 4 spi 100004 crypto-alg aes-cbc-128 crypto-key 65585547444171505a5269436e4f644f integ-alg sha-512-256 integ-key 766d785949625a6a6d4a6b426a69676254616567464b54647970665776646f687061477061636a53435665574f796d587553464842735159687a454366775075 esp
exec ipsec sa add 100004 spi 200004 crypto-alg aes-cbc-128 crypto-key 65585547444171505a5269436e4f644f integ-alg sha-512-256 integ-key 766d785949625a6a6d4a6b426a69676254616567464b54647970665776646f687061477061636a53435665574f796d587553464842735159687a454366775075 esp
exec ipsec tunnel protect ipip4 sa-out 4 sa-in 100004 add
exec set interface ip address loop0 100.0.5.1/32
exec create ipip tunnel src 100.0.5.1 dst 200.0.0.102 p2p
exec ipsec sa add 5 spi 100005 crypto-alg aes-cbc-128 crypto-key 586f735546717979594f6f5a4e567441 integ-alg sha-512-256 integ-key 6c6d4e544351556a774d624b78704e49654d6372505067684a775355547958427850717745685a5570764869594b6669794651457a4c69465452686a564a4364 esp
exec ipsec sa add 100005 spi 200005 crypto-alg aes-cbc-128 crypto-key 586f735546717979594f6f5a4e567441 integ-alg sha-512-256 integ-key 6c6d4e544351556a774d624b78704e49654d6372505067684a775355547958427850717745685a5570764869594b6669794651457a4c69465452686a564a4364 esp
exec ipsec tunnel protect ipip5 sa-out 5 sa-in 100005 add
exec set interface ip address loop0 100.0.6.1/32
exec create ipip tunnel src 100.0.6.1 dst 200.0.0.102 p2p
exec ipsec sa add 6 spi 100006 crypto-alg aes-cbc-128 crypto-key 6f5a7679786f70566d56746b6f417845 integ-alg sha-512-256 integ-key 574665775968674365765742486c755649737a5670445a4e474d7070485645417471755759794d557569675252567463515552485569765455537047736c7556 esp
exec ipsec sa add 100006 spi 200006 crypto-alg aes-cbc-128 crypto-key 6f5a7679786f70566d56746b6f417845 integ-alg sha-512-256 integ-key 574665775968674365765742486c755649737a5670445a4e474d7070485645417471755759794d557569675252567463515552485569765455537047736c7556 esp
exec ipsec tunnel protect ipip6 sa-out 6 sa-in 100006 add
exec set interface ip address loop0 100.0.7.1/32
exec create ipip tunnel src 100.0.7.1 dst 200.0.0.102 p2p
exec ipsec sa add 7 spi 100007 crypto-alg aes-cbc-128 crypto-key 574d44586273534a4c44554a6f514d4a integ-alg sha-512-256 integ-key 4e4b744d4344495556735a754267737371657275734c58486c644c4f6c6c6176614376457171746a41784a6944744469797a674c43755a5267434952524a4177 esp
exec ipsec sa add 100007 spi 200007 crypto-alg aes-cbc-128 crypto-key 574d44586273534a4c44554a6f514d4a integ-alg sha-512-256 integ-key 4e4b744d4344495556735a754267737371657275734c58486c644c4f6c6c6176614376457171746a41784a6944744469797a674c43755a5267434952524a4177 esp
exec ipsec tunnel protect ipip7 sa-out 7 sa-in 100007 add
exec set interface ip address loop0 100.0.8.1/32
exec create ipip tunnel src 100.0.8.1 dst 200.0.0.102 p2p
exec ipsec sa add 8 spi 100008 crypto-alg aes-cbc-128 crypto-key 66716748414e68537372504169534945 integ-alg sha-512-256 integ-key 5069534c6172654378555845464c6d59577a6c5a62514172586255584876574c58617651524a7873664e444d7170705a5678436251524150715a50707a465258 esp
exec ipsec sa add 100008 spi 200008 crypto-alg aes-cbc-128 crypto-key 66716748414e68537372504169534945 integ-alg sha-512-256 integ-key 5069534c6172654378555845464c6d59577a6c5a62514172586255584876574c58617651524a7873664e444d7170705a5678436251524150715a50707a465258 esp
exec ipsec tunnel protect ipip8 sa-out 8 sa-in 100008 add
exec set interface ip address loop0 100.0.9.1/32
exec create ipip tunnel src 100.0.9.1 dst 200.0.0.102 p2p
exec ipsec sa add 9 spi 100009 crypto-alg aes-cbc-128 crypto-key 4b61424375597352786d71644d6a7771 integ-alg sha-512-256 integ-key 4745636f79484f4d79684974727a6771534b7674414e755066786b6a7a7950644970796a4e68764b545848444f7570796a686d516f7141684a72776254474e48 esp
exec ipsec sa add 100009 spi 200009 crypto-alg aes-cbc-128 crypto-key 4b61424375597352786d71644d6a7771 integ-alg sha-512-256 integ-key 4745636f79484f4d79684974727a6771534b7674414e755066786b6a7a7950644970796a4e68764b545848444f7570796a686d516f7141684a72776254474e48 esp
exec ipsec tunnel protect ipip9 sa-out 9 sa-in 100009 add
exec set interface ip address loop0 100.0.10.1/32
exec create ipip tunnel src 100.0.10.1 dst 200.0.0.102 p2p
exec ipsec sa add 10 spi 100010 crypto-alg aes-cbc-128 crypto-key 5743765266636543717446744d796767 integ-alg sha-512-256 integ-key 6650584d5a46436e41696d675351525747726b51686d5266527675796a44506e4b556f6c427a575743757270525a586f435041584a4b456f5a7558426b645372 esp
exec ipsec sa add 100010 spi 200010 crypto-alg aes-cbc-128 crypto-key 5743765266636543717446744d796767 integ-alg sha-512-256 integ-key 6650584d5a46436e41696d675351525747726b51686d5266527675796a44506e4b556f6c427a575743757270525a586f435041584a4b456f5a7558426b645372 esp
exec ipsec tunnel protect ipip10 sa-out 10 sa-in 100010 add
exec set interface ip address loop0 100.0.11.1/32
exec create ipip tunnel src 100.0.11.1 dst 200.0.0.102 p2p
exec ipsec sa add 11 spi 100011 crypto-alg aes-cbc-128 crypto-key 586f654b6654547474436a7473436850 integ-alg sha-512-256 integ-key 6c4b6e5468564b42465156706a67797553684479577779507263734c744e63756658694354697548556b684f4358655645706c564e5265664b44684f644f4741 esp
exec ipsec sa add 100011 spi 200011 crypto-alg aes-cbc-128 crypto-key 586f654b6654547474436a7473436850 integ-alg sha-512-256 integ-key 6c4b6e5468564b42465156706a67797553684479577779507263734c744e63756658694354697548556b684f4358655645706c564e5265664b44684f644f4741 esp
exec ipsec tunnel protect ipip11 sa-out 11 sa-in 100011 add
exec set interface ip address loop0 100.0.12.1/32
exec create ipip tunnel src 100.0.12.1 dst 200.0.0.102 p2p
exec ipsec sa add 12 spi 100012 crypto-alg aes-cbc-128 crypto-key 696d54784970686b4462756e6a56476e integ-alg sha-512-256 integ-key 49614e52437363616e485277755a4e636d647a6c4372676d47444748526751786665455752796578445461456c62516a7752564273527a58436d4779456c4b71 esp
exec ipsec sa add 100012 spi 200012 crypto-alg aes-cbc-128 crypto-key 696d54784970686b4462756e6a56476e integ-alg sha-512-256 integ-key 49614e52437363616e485277755a4e636d647a6c4372676d47444748526751786665455752796578445461456c62516a7752564273527a58436d4779456c4b71 esp
exec ipsec tunnel protect ipip12 sa-out 12 sa-in 100012 add
exec set interface ip address loop0 100.0.13.1/32
exec create ipip tunnel src 100.0.13.1 dst 200.0.0.102 p2p
exec ipsec sa add 13 spi 100013 crypto-alg aes-cbc-128 crypto-key 5569484a4858595043744675476a7a47 integ-alg sha-512-256 integ-key 68424c69507366614a455364677675526443476d63435455436d76735464515a6a755a6457467768465378414e7749506258676d785555517943484248424570 esp
exec ipsec sa add 100013 spi 200013 crypto-alg aes-cbc-128 crypto-key 5569484a4858595043744675476a7a47 integ-alg sha-512-256 integ-key 68424c69507366614a455364677675526443476d63435455436d76735464515a6a755a6457467768465378414e7749506258676d785555517943484248424570 esp
exec ipsec tunnel protect ipip13 sa-out 13 sa-in 100013 add
exec set interface ip address loop0 100.0.14.1/32
exec create ipip tunnel src 100.0.14.1 dst 200.0.0.102 p2p
exec ipsec sa add 14 spi 100014 crypto-alg aes-cbc-128 crypto-key 7943544a42747649616f6b6b616b5261 integ-alg sha-512-256 integ-key 43426e425354676c416547726a676c4571764363434c4a6f6751697555596d5a455743647a6b7171597a425868797762617a6b7864444a626358525056666d6a esp
exec ipsec sa add 100014 spi 200014 crypto-alg aes-cbc-128 crypto-key 7943544a42747649616f6b6b616b5261 integ-alg sha-512-256 integ-key 43426e425354676c416547726a676c4571764363434c4a6f6751697555596d5a455743647a6b7171597a425868797762617a6b7864444a626358525056666d6a esp
exec ipsec tunnel protect ipip14 sa-out 14 sa-in 100014 add
exec set interface ip address loop0 100.0.15.1/32
exec create ipip tunnel src 100.0.15.1 dst 200.0.0.102 p2p
exec ipsec sa add 15 spi 100015 crypto-alg aes-cbc-128 crypto-key 63414154526476576c7a6b634e4c714a integ-alg sha-512-256 integ-key 666c7a7a4771594d6957627359744b6f6958594c5a4d4b647a4f4476766d506d746f6d526c4352766b58416a4e59587a566f7152716a617468446d617369476e esp
exec ipsec sa add 100015 spi 200015 crypto-alg aes-cbc-128 crypto-key 63414154526476576c7a6b634e4c714a integ-alg sha-512-256 integ-key 666c7a7a4771594d6957627359744b6f6958594c5a4d4b647a4f4476766d506d746f6d526c4352766b58416a4e59587a566f7152716a617468446d617369476e esp
exec ipsec tunnel protect ipip15 sa-out 15 sa-in 100015 add
exec set interface ip address loop0 100.0.16.1/32
exec create ipip tunnel src 100.0.16.1 dst 200.0.0.102 p2p
exec ipsec sa add 16 spi 100016 crypto-alg aes-cbc-128 crypto-key 496f65597875425172716749756a7748 integ-alg sha-512-256 integ-key 674c4b6a4763684548564b486c67616b784a4f697761717948734a565a5252617576526b6b46636c6e704762766c6b566d74766e6c59596d446b416668444667 esp
exec ipsec sa add 100016 spi 200016 crypto-alg aes-cbc-128 crypto-key 496f65597875425172716749756a7748 integ-alg sha-512-256 integ-key 674c4b6a4763684548564b486c67616b784a4f697761717948734a565a5252617576526b6b46636c6e704762766c6b566d74766e6c59596d446b416668444667 esp
exec ipsec tunnel protect ipip16 sa-out 16 sa-in 100016 add
exec set interface ip address loop0 100.0.17.1/32
exec create ipip tunnel src 100.0.17.1 dst 200.0.0.102 p2p
exec ipsec sa add 17 spi 100017 crypto-alg aes-cbc-128 crypto-key 6a484f785a55664e666d674b6d507470 integ-alg sha-512-256 integ-key 7448464742785054734356554d655442526e65426a6e7863726e4e534f4c4a4b4a745a6a6456587772584b497a71496368536168514743787a6445714d6b6a52 esp
exec ipsec sa add 100017 spi 200017 crypto-alg aes-cbc-128 crypto-key 6a484f785a55664e666d674b6d507470 integ-alg sha-512-256 integ-key 7448464742785054734356554d655442526e65426a6e7863726e4e534f4c4a4b4a745a6a6456587772584b497a71496368536168514743787a6445714d6b6a52 esp
exec ipsec tunnel protect ipip17 sa-out 17 sa-in 100017 add
exec set interface ip address loop0 100.0.18.1/32
exec create ipip tunnel src 100.0.18.1 dst 200.0.0.102 p2p
exec ipsec sa add 18 spi 100018 crypto-alg aes-cbc-128 crypto-key 5776756157415a495475767964617178 integ-alg sha-512-256 integ-key 6a554d73706c5077747a764678734d755353624f75455347544a5457704b784e57764a5275526d78594872736c487772744d4d76424570586e76714e6a586d54 esp
exec ipsec sa add 100018 spi 200018 crypto-alg aes-cbc-128 crypto-key 5776756157415a495475767964617178 integ-alg sha-512-256 integ-key 6a554d73706c5077747a764678734d755353624f75455347544a5457704b784e57764a5275526d78594872736c487772744d4d76424570586e76714e6a586d54 esp
exec ipsec tunnel protect ipip18 sa-out 18 sa-in 100018 add
exec set interface ip address loop0 100.0.19.1/32
exec create ipip tunnel src 100.0.19.1 dst 200.0.0.102 p2p
exec ipsec sa add 19 spi 100019 crypto-alg aes-cbc-128 crypto-key 6663534e6d734d4647796e5353484161 integ-alg sha-512-256 integ-key 4a68786c5a49444754487874496542666f4e59697447777a794c7a70674572666763754e4a4d4171496748694d61766d787979694568496f447a77756e594453 esp
exec ipsec sa add 100019 spi 200019 crypto-alg aes-cbc-128 crypto-key 6663534e6d734d4647796e5353484161 integ-alg sha-512-256 integ-key 4a68786c5a49444754487874496542666f4e59697447777a794c7a70674572666763754e4a4d4171496748694d61766d787979694568496f447a77756e594453 esp
exec ipsec tunnel protect ipip19 sa-out 19 sa-in 100019 add
exec set interface ip address loop0 100.0.20.1/32
exec create ipip tunnel src 100.0.20.1 dst 200.0.0.102 p2p
exec ipsec sa add 20 spi 100020 crypto-alg aes-cbc-128 crypto-key 626c47784b796d644477696b52494a68 integ-alg sha-512-256 integ-key 696f416a7a4c56625a707a58724b646b7063626c537045624d7456556b674265545173487661694b73664b614b774f735350584d64434e5046574170446c4e4a esp
exec ipsec sa add 100020 spi 200020 crypto-alg aes-cbc-128 crypto-key 626c47784b796d644477696b52494a68 integ-alg sha-512-256 integ-key 696f416a7a4c56625a707a58724b646b7063626c537045624d7456556b674265545173487661694b73664b614b774f735350584d64434e5046574170446c4e4a esp
exec ipsec tunnel protect ipip20 sa-out 20 sa-in 100020 add
exec set interface ip address loop0 100.0.21.1/32
exec create ipip tunnel src 100.0.21.1 dst 200.0.0.102 p2p
exec ipsec sa add 21 spi 100021 crypto-alg aes-cbc-128 crypto-key 524852734b6a5976626b68426e6a7a6b integ-alg sha-512-256 integ-key 6a77496f4f6f6a59456a424c49615a59674867634e6d6b6f4277464861674e44776b6c775a4e5568714c444a5172636b44534b6f6b4362445272497671687743 esp
exec ipsec sa add 100021 spi 200021 crypto-alg aes-cbc-128 crypto-key 524852734b6a5976626b68426e6a7a6b integ-alg sha-512-256 integ-key 6a77496f4f6f6a59456a424c49615a59674867634e6d6b6f4277464861674e44776b6c775a4e5568714c444a5172636b44534b6f6b4362445272497671687743 esp
exec ipsec tunnel protect ipip21 sa-out 21 sa-in 100021 add
exec set interface ip address loop0 100.0.22.1/32
exec create ipip tunnel src 100.0.22.1 dst 200.0.0.102 p2p
exec ipsec sa add 22 spi 100022 crypto-alg aes-cbc-128 crypto-key 72676f62537746704b53716142746f4a integ-alg sha-512-256 integ-key 6a6a696261747571426a7a4b6a466253674749795a415a656242617a44446a574b57595459594f646a48515578476e5a487176514d4b7561746a696f696a635a esp
exec ipsec sa add 100022 spi 200022 crypto-alg aes-cbc-128 crypto-key 72676f62537746704b53716142746f4a integ-alg sha-512-256 integ-key 6a6a696261747571426a7a4b6a466253674749795a415a656242617a44446a574b57595459594f646a48515578476e5a487176514d4b7561746a696f696a635a esp
exec ipsec tunnel protect ipip22 sa-out 22 sa-in 100022 add
exec set interface ip address loop0 100.0.23.1/32
exec create ipip tunnel src 100.0.23.1 dst 200.0.0.102 p2p
exec ipsec sa add 23 spi 100023 crypto-alg aes-cbc-128 crypto-key 5a6e4668766b56704b6871524243774e integ-alg sha-512-256 integ-key 6e6358784774664e6d716d70564652674c584269676a79566f5a677248654873465a6d774c54575676596f746e7a6e476a6443664b724b4d4669594e724a6765 esp
exec ipsec sa add 100023 spi 200023 crypto-alg aes-cbc-128 crypto-key 5a6e4668766b56704b6871524243774e integ-alg sha-512-256 integ-key 6e6358784774664e6d716d70564652674c584269676a79566f5a677248654873465a6d774c54575676596f746e7a6e476a6443664b724b4d4669594e724a6765 esp
exec ipsec tunnel protect ipip23 sa-out 23 sa-in 100023 add
exec set interface ip address loop0 100.0.24.1/32
exec create ipip tunnel src 100.0.24.1 dst 200.0.0.102 p2p
exec ipsec sa add 24 spi 100024 crypto-alg aes-cbc-128 crypto-key 4f6e4c524f747a6275545371744f7776 integ-alg sha-512-256 integ-key 59417666594b63754b4d704278796768766a6c4378677767715059484b56717448724749536770414c6d484f44524264595872625643756f4f636a477862726b esp
exec ipsec sa add 100024 spi 200024 crypto-alg aes-cbc-128 crypto-key 4f6e4c524f747a6275545371744f7776 integ-alg sha-512-256 integ-key 59417666594b63754b4d704278796768766a6c4378677767715059484b56717448724749536770414c6d484f44524264595872625643756f4f636a477862726b esp
exec ipsec tunnel protect ipip24 sa-out 24 sa-in 100024 add
exec set interface ip address loop0 100.0.25.1/32
exec create ipip tunnel src 100.0.25.1 dst 200.0.0.102 p2p
exec ipsec sa add 25 spi 100025 crypto-alg aes-cbc-128 crypto-key 5a5767674b4a624f596c4f686f697a57 integ-alg sha-512-256 integ-key 74577377424a465a516f504a52716f466b66586b77684863496168457a6873595a6f75767251676b75784b504d555869766a41536e46496469594b4c63686474 esp
exec ipsec sa add 100025 spi 200025 crypto-alg aes-cbc-128 crypto-key 5a5767674b4a624f596c4f686f697a57 integ-alg sha-512-256 integ-key 74577377424a465a516f504a52716f466b66586b77684863496168457a6873595a6f75767251676b75784b504d555869766a41536e46496469594b4c63686474 esp
exec ipsec tunnel protect ipip25 sa-out 25 sa-in 100025 add
exec set interface ip address loop0 100.0.26.1/32
exec create ipip tunnel src 100.0.26.1 dst 200.0.0.102 p2p
exec ipsec sa add 26 spi 100026 crypto-alg aes-cbc-128 crypto-key 51596476474d77686d4d594e45555171 integ-alg sha-512-256 integ-key 64716464614c755a4e416f476a5241565666534a495941476e746a53696779766d7463556775516d546a464d736c74427a785461794d6b4e575359664e4d5863 esp
exec ipsec sa add 100026 spi 200026 crypto-alg aes-cbc-128 crypto-key 51596476474d77686d4d594e45555171 integ-alg sha-512-256 integ-key 64716464614c755a4e416f476a5241565666534a495941476e746a53696779766d7463556775516d546a464d736c74427a785461794d6b4e575359664e4d5863 esp
exec ipsec tunnel protect ipip26 sa-out 26 sa-in 100026 add
exec set interface ip address loop0 100.0.27.1/32
exec create ipip tunnel src 100.0.27.1 dst 200.0.0.102 p2p
exec ipsec sa add 27 spi 100027 crypto-alg aes-cbc-128 crypto-key 5844584959546d7a4669554873636f6a integ-alg sha-512-256 integ-key 72536675734c626b4750576e6844574b774a454a5050444c6f727a4d56706e6b5a6f474375545073484a775549497963486877474f6358596a7a77486b525752 esp
exec ipsec sa add 100027 spi 200027 crypto-alg aes-cbc-128 crypto-key 5844584959546d7a4669554873636f6a integ-alg sha-512-256 integ-key 72536675734c626b4750576e6844574b774a454a5050444c6f727a4d56706e6b5a6f474375545073484a775549497963486877474f6358596a7a77486b525752 esp
exec ipsec tunnel protect ipip27 sa-out 27 sa-in 100027 add
exec set interface ip address loop0 100.0.28.1/32
exec create ipip tunnel src 100.0.28.1 dst 200.0.0.102 p2p
exec ipsec sa add 28 spi 100028 crypto-alg aes-cbc-128 crypto-key 5658546b6a596570434f4c4c77464b4c integ-alg sha-512-256 integ-key 56576865537063484957544679666b567a6e4a68657a6d7376786b7445596c4a6176735577704a73494b6958514b654d424c4946486a754b534a597253526b63 esp
exec ipsec sa add 100028 spi 200028 crypto-alg aes-cbc-128 crypto-key 5658546b6a596570434f4c4c77464b4c integ-alg sha-512-256 integ-key 56576865537063484957544679666b567a6e4a68657a6d7376786b7445596c4a6176735577704a73494b6958514b654d424c4946486a754b534a597253526b63 esp
exec ipsec tunnel protect ipip28 sa-out 28 sa-in 100028 add
exec set interface ip address loop0 100.0.29.1/32
exec create ipip tunnel src 100.0.29.1 dst 200.0.0.102 p2p
exec ipsec sa add 29 spi 100029 crypto-alg aes-cbc-128 crypto-key 735567516c704c794b78797a775a6c41 integ-alg sha-512-256 integ-key 744254584f47537679795969576b6e73554350774a58764961476a667a68465376526e546d6d5a6b5a5a416a71417479554956664b516156797a7951456f4264 esp
exec ipsec sa add 100029 spi 200029 crypto-alg aes-cbc-128 crypto-key 735567516c704c794b78797a775a6c41 integ-alg sha-512-256 integ-key 744254584f47537679795969576b6e73554350774a58764961476a667a68465376526e546d6d5a6b5a5a416a71417479554956664b516156797a7951456f4264 esp
exec ipsec tunnel protect ipip29 sa-out 29 sa-in 100029 add
exec set interface ip address loop0 100.0.30.1/32
exec create ipip tunnel src 100.0.30.1 dst 200.0.0.102 p2p
exec ipsec sa add 30 spi 100030 crypto-alg aes-cbc-128 crypto-key 4e5245487a7554435456566642584553 integ-alg sha-512-256 integ-key 78796747624869475a6463465444487547455646686d4244746479464d6754647844436862544f5062616252566b52507147414a6b584b4e5741736550575467 esp
exec ipsec sa add 100030 spi 200030 crypto-alg aes-cbc-128 crypto-key 4e5245487a7554435456566642584553 integ-alg sha-512-256 integ-key 78796747624869475a6463465444487547455646686d4244746479464d6754647844436862544f5062616252566b52507147414a6b584b4e5741736550575467 esp
exec ipsec tunnel protect ipip30 sa-out 30 sa-in 100030 add
exec set interface ip address loop0 100.0.31.1/32
exec create ipip tunnel src 100.0.31.1 dst 200.0.0.102 p2p
exec ipsec sa add 31 spi 100031 crypto-alg aes-cbc-128 crypto-key 6961486177506c717967736751777266 integ-alg sha-512-256 integ-key 5a414b7144535066764e4c72754c6d43547369427a714547726745736f706c5441516a55694770584572656274784d655055625661666172746b4847764d7569 esp
exec ipsec sa add 100031 spi 200031 crypto-alg aes-cbc-128 crypto-key 6961486177506c717967736751777266 integ-alg sha-512-256 integ-key 5a414b7144535066764e4c72754c6d43547369427a714547726745736f706c5441516a55694770584572656274784d655055625661666172746b4847764d7569 esp
exec ipsec tunnel protect ipip31 sa-out 31 sa-in 100031 add
exec set interface ip address loop0 100.0.32.1/32
exec create ipip tunnel src 100.0.32.1 dst 200.0.0.102 p2p
exec ipsec sa add 32 spi 100032 crypto-alg aes-cbc-128 crypto-key 50735778514356466f707a4e476a4a64 integ-alg sha-512-256 integ-key 6f514e626b61464d585a6b6b5a4a45594b42476c5079644c4c66654977554f656b4977686957484e507874594f4e554266754a4d6a4548795062424a4f696353 esp
exec ipsec sa add 100032 spi 200032 crypto-alg aes-cbc-128 crypto-key 50735778514356466f707a4e476a4a64 integ-alg sha-512-256 integ-key 6f514e626b61464d585a6b6b5a4a45594b42476c5079644c4c66654977554f656b4977686957484e507874594f4e554266754a4d6a4548795062424a4f696353 esp
exec ipsec tunnel protect ipip32 sa-out 32 sa-in 100032 add
exec set interface ip address loop0 100.0.33.1/32
exec create ipip tunnel src 100.0.33.1 dst 200.0.0.102 p2p
exec ipsec sa add 33 spi 100033 crypto-alg aes-cbc-128 crypto-key 54724e6155524a75675874765645616d integ-alg sha-512-256 integ-key 6454715a78657262685648686d6d4e464677454866546e43485a797967644d626a5a686347455a636e41616b56744e4e7972615552735051624f7254544a704e esp
exec ipsec sa add 100033 spi 200033 crypto-alg aes-cbc-128 crypto-key 54724e6155524a75675874765645616d integ-alg sha-512-256 integ-key 6454715a78657262685648686d6d4e464677454866546e43485a797967644d626a5a686347455a636e41616b56744e4e7972615552735051624f7254544a704e esp
exec ipsec tunnel protect ipip33 sa-out 33 sa-in 100033 add
exec set interface ip address loop0 100.0.34.1/32
exec create ipip tunnel src 100.0.34.1 dst 200.0.0.102 p2p
exec ipsec sa add 34 spi 100034 crypto-alg aes-cbc-128 crypto-key 67594f4d4e6367524679454461715678 integ-alg sha-512-256 integ-key 7754454b4856674372464b52704f585255467a664a636d434c7064615847726379754748445a554366436b4b6e67564459656f6d71716541556e48665a6e5a4b esp
exec ipsec sa add 100034 spi 200034 crypto-alg aes-cbc-128 crypto-key 67594f4d4e6367524679454461715678 integ-alg sha-512-256 integ-key 7754454b4856674372464b52704f585255467a664a636d434c7064615847726379754748445a554366436b4b6e67564459656f6d71716541556e48665a6e5a4b esp
exec ipsec tunnel protect ipip34 sa-out 34 sa-in 100034 add
exec set interface ip address loop0 100.0.35.1/32
exec create ipip tunnel src 100.0.35.1 dst 200.0.0.102 p2p
exec ipsec sa add 35 spi 100035 crypto-alg aes-cbc-128 crypto-key 497452735954626f414f51664f51764f integ-alg sha-512-256 integ-key 436953586b695a644372584452764b63415357427656427a73476c7362595964794e756664747747536362444a4157675645484e676e56514b6a794357744c53 esp
exec ipsec sa add 100035 spi 200035 crypto-alg aes-cbc-128 crypto-key 497452735954626f414f51664f51764f integ-alg sha-512-256 integ-key 436953586b695a644372584452764b63415357427656427a73476c7362595964794e756664747747536362444a4157675645484e676e56514b6a794357744c53 esp
exec ipsec tunnel protect ipip35 sa-out 35 sa-in 100035 add
exec set interface ip address loop0 100.0.36.1/32
exec create ipip tunnel src 100.0.36.1 dst 200.0.0.102 p2p
exec ipsec sa add 36 spi 100036 crypto-alg aes-cbc-128 crypto-key 4b636c4e42796d4e486d66636f697664 integ-alg sha-512-256 integ-key 44664d745570614364634664567a4651446250556447686f546c4f46496e754a6f626b52484a71674b676c634f596b7a707359494a68647169446d76536b5461 esp
exec ipsec sa add 100036 spi 200036 crypto-alg aes-cbc-128 crypto-key 4b636c4e42796d4e486d66636f697664 integ-alg sha-512-256 integ-key 44664d745570614364634664567a4651446250556447686f546c4f46496e754a6f626b52484a71674b676c634f596b7a707359494a68647169446d76536b5461 esp
exec ipsec tunnel protect ipip36 sa-out 36 sa-in 100036 add
exec set interface ip address loop0 100.0.37.1/32
exec create ipip tunnel src 100.0.37.1 dst 200.0.0.102 p2p
exec ipsec sa add 37 spi 100037 crypto-alg aes-cbc-128 crypto-key 5a4678506d7947565573725744666b62 integ-alg sha-512-256 integ-key 726b62467a6a517a56634b4e73486a7a7376676f626d4c62616544714e786a6743486857684450757649555a4a6e447157414d796d564366624e455759675563 esp
exec ipsec sa add 100037 spi 200037 crypto-alg aes-cbc-128 crypto-key 5a4678506d7947565573725744666b62 integ-alg sha-512-256 integ-key 726b62467a6a517a56634b4e73486a7a7376676f626d4c62616544714e786a6743486857684450757649555a4a6e447157414d796d564366624e455759675563 esp
exec ipsec tunnel protect ipip37 sa-out 37 sa-in 100037 add
exec set interface ip address loop0 100.0.38.1/32
exec create ipip tunnel src 100.0.38.1 dst 200.0.0.102 p2p
exec ipsec sa add 38 spi 100038 crypto-alg aes-cbc-128 crypto-key 446b436d594555614246676c6e544e49 integ-alg sha-512-256 integ-key 766351564b4e624d6b79596257746a656a4f785157576a5351706579517a526f63736c6846445372754d4a446b725a6e557854554d6b53545973515a6652626a esp
exec ipsec sa add 100038 spi 200038 crypto-alg aes-cbc-128 crypto-key 446b436d594555614246676c6e544e49 integ-alg sha-512-256 integ-key 766351564b4e624d6b79596257746a656a4f785157576a5351706579517a526f63736c6846445372754d4a446b725a6e557854554d6b53545973515a6652626a esp
exec ipsec tunnel protect ipip38 sa-out 38 sa-in 100038 add
exec set interface ip address loop0 100.0.39.1/32
exec create ipip tunnel src 100.0.39.1 dst 200.0.0.102 p2p
exec ipsec sa add 39 spi 100039 crypto-alg aes-cbc-128 crypto-key 4a494167776966576444764a61655967 integ-alg sha-512-256 integ-key 73574a61656759707659665361596c4750784e65424f41596d6375755873704c6c6374425667714576547778636c5552774a797553455753466f4b4441687269 esp
exec ipsec sa add 100039 spi 200039 crypto-alg aes-cbc-128 crypto-key 4a494167776966576444764a61655967 integ-alg sha-512-256 integ-key 73574a61656759707659665361596c4750784e65424f41596d6375755873704c6c6374425667714576547778636c5552774a797553455753466f4b4441687269 esp
exec ipsec tunnel protect ipip39 sa-out 39 sa-in 100039 add
exec set interface unnumbered ipip0 use TenGigabitEthernet8/0/0
exec set interface state ipip0 up
exec ip route add 20.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use TenGigabitEthernet8/0/0
exec set interface state ipip1 up
exec ip route add 20.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use TenGigabitEthernet8/0/0
exec set interface state ipip2 up
exec ip route add 20.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use TenGigabitEthernet8/0/0
exec set interface state ipip3 up
exec ip route add 20.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use TenGigabitEthernet8/0/0
exec set interface state ipip4 up
exec ip route add 20.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use TenGigabitEthernet8/0/0
exec set interface state ipip5 up
exec ip route add 20.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use TenGigabitEthernet8/0/0
exec set interface state ipip6 up
exec ip route add 20.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use TenGigabitEthernet8/0/0
exec set interface state ipip7 up
exec ip route add 20.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use TenGigabitEthernet8/0/0
exec set interface state ipip8 up
exec ip route add 20.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use TenGigabitEthernet8/0/0
exec set interface state ipip9 up
exec ip route add 20.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use TenGigabitEthernet8/0/0
exec set interface state ipip10 up
exec ip route add 20.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use TenGigabitEthernet8/0/0
exec set interface state ipip11 up
exec ip route add 20.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use TenGigabitEthernet8/0/0
exec set interface state ipip12 up
exec ip route add 20.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use TenGigabitEthernet8/0/0
exec set interface state ipip13 up
exec ip route add 20.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use TenGigabitEthernet8/0/0
exec set interface state ipip14 up
exec ip route add 20.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use TenGigabitEthernet8/0/0
exec set interface state ipip15 up
exec ip route add 20.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use TenGigabitEthernet8/0/0
exec set interface state ipip16 up
exec ip route add 20.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use TenGigabitEthernet8/0/0
exec set interface state ipip17 up
exec ip route add 20.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use TenGigabitEthernet8/0/0
exec set interface state ipip18 up
exec ip route add 20.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use TenGigabitEthernet8/0/0
exec set interface state ipip19 up
exec ip route add 20.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use TenGigabitEthernet8/0/0
exec set interface state ipip20 up
exec ip route add 20.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use TenGigabitEthernet8/0/0
exec set interface state ipip21 up
exec ip route add 20.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use TenGigabitEthernet8/0/0
exec set interface state ipip22 up
exec ip route add 20.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use TenGigabitEthernet8/0/0
exec set interface state ipip23 up
exec ip route add 20.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use TenGigabitEthernet8/0/0
exec set interface state ipip24 up
exec ip route add 20.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use TenGigabitEthernet8/0/0
exec set interface state ipip25 up
exec ip route add 20.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use TenGigabitEthernet8/0/0
exec set interface state ipip26 up
exec ip route add 20.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use TenGigabitEthernet8/0/0
exec set interface state ipip27 up
exec ip route add 20.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use TenGigabitEthernet8/0/0
exec set interface state ipip28 up
exec ip route add 20.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use TenGigabitEthernet8/0/0
exec set interface state ipip29 up
exec ip route add 20.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use TenGigabitEthernet8/0/0
exec set interface state ipip30 up
exec ip route add 20.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use TenGigabitEthernet8/0/0
exec set interface state ipip31 up
exec ip route add 20.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use TenGigabitEthernet8/0/0
exec set interface state ipip32 up
exec ip route add 20.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use TenGigabitEthernet8/0/0
exec set interface state ipip33 up
exec ip route add 20.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use TenGigabitEthernet8/0/0
exec set interface state ipip34 up
exec ip route add 20.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use TenGigabitEthernet8/0/0
exec set interface state ipip35 up
exec ip route add 20.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use TenGigabitEthernet8/0/0
exec set interface state ipip36 up
exec ip route add 20.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use TenGigabitEthernet8/0/0
exec set interface state ipip37 up
exec ip route add 20.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use TenGigabitEthernet8/0/0
exec set interface state ipip38 up
exec ip route add 20.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use TenGigabitEthernet8/0/0
exec set interface state ipip39 up
exec ip route add 20.0.0.39/32 via ipip39
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec set interface ip address TenGigabitEthernet8/0/0 200.0.0.102/24.0
exec create ipip tunnel src 200.0.0.102 dst 100.0.0.1 p2p
exec ipsec sa add 100000 spi 200000 crypto-alg aes-cbc-128 crypto-key 4245487a62514b4e624758754f7a6779 integ-alg sha-512-256 integ-key 4265656b59417a754741516b425578715a494543504678766d4d517352774b45717956757572787648657859586f744b44797a4d6a6c427669545050664c4a52 esp
exec ipsec sa add 0 spi 100000 crypto-alg aes-cbc-128 crypto-key 4245487a62514b4e624758754f7a6779 integ-alg sha-512-256 integ-key 4265656b59417a754741516b425578715a494543504678766d4d517352774b45717956757572787648657859586f744b44797a4d6a6c427669545050664c4a52 esp
exec ipsec tunnel protect ipip0 sa-out 100000 sa-in 0 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.1.1 p2p
exec ipsec sa add 100001 spi 200001 crypto-alg aes-cbc-128 crypto-key 58584d766862797265794f6f6b436355 integ-alg sha-512-256 integ-key 7050447441744d6a4e63416e6b494253665970704d5a667a516468636673575a65566f74544f6f494c494d54484f4f4f7175687464454a76595565747a41676b esp
exec ipsec sa add 1 spi 100001 crypto-alg aes-cbc-128 crypto-key 58584d766862797265794f6f6b436355 integ-alg sha-512-256 integ-key 7050447441744d6a4e63416e6b494253665970704d5a667a516468636673575a65566f74544f6f494c494d54484f4f4f7175687464454a76595565747a41676b esp
exec ipsec tunnel protect ipip1 sa-out 100001 sa-in 1 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.2.1 p2p
exec ipsec sa add 100002 spi 200002 crypto-alg aes-cbc-128 crypto-key 57786668426373425767456e6165764a integ-alg sha-512-256 integ-key 614254736a54494f49636b71744c46596d424369594b63624c5278544470687763696f70425350524d4a73424c72714a48536c426973445a66484a4f75535052 esp
exec ipsec sa add 2 spi 100002 crypto-alg aes-cbc-128 crypto-key 57786668426373425767456e6165764a integ-alg sha-512-256 integ-key 614254736a54494f49636b71744c46596d424369594b63624c5278544470687763696f70425350524d4a73424c72714a48536c426973445a66484a4f75535052 esp
exec ipsec tunnel protect ipip2 sa-out 100002 sa-in 2 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.3.1 p2p
exec ipsec sa add 100003 spi 200003 crypto-alg aes-cbc-128 crypto-key 4742456f614b4d597141675249634869 integ-alg sha-512-256 integ-key 4b67784b47434753515879477557785467577770477a755067637a657a4c77756b62517468714f78467474535843545a7577675272646562544d6f545549534c esp
exec ipsec sa add 3 spi 100003 crypto-alg aes-cbc-128 crypto-key 4742456f614b4d597141675249634869 integ-alg sha-512-256 integ-key 4b67784b47434753515879477557785467577770477a755067637a657a4c77756b62517468714f78467474535843545a7577675272646562544d6f545549534c esp
exec ipsec tunnel protect ipip3 sa-out 100003 sa-in 3 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.4.1 p2p
exec ipsec sa add 100004 spi 200004 crypto-alg aes-cbc-128 crypto-key 65585547444171505a5269436e4f644f integ-alg sha-512-256 integ-key 766d785949625a6a6d4a6b426a69676254616567464b54647970665776646f687061477061636a53435665574f796d587553464842735159687a454366775075 esp
exec ipsec sa add 4 spi 100004 crypto-alg aes-cbc-128 crypto-key 65585547444171505a5269436e4f644f integ-alg sha-512-256 integ-key 766d785949625a6a6d4a6b426a69676254616567464b54647970665776646f687061477061636a53435665574f796d587553464842735159687a454366775075 esp
exec ipsec tunnel protect ipip4 sa-out 100004 sa-in 4 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.5.1 p2p
exec ipsec sa add 100005 spi 200005 crypto-alg aes-cbc-128 crypto-key 586f735546717979594f6f5a4e567441 integ-alg sha-512-256 integ-key 6c6d4e544351556a774d624b78704e49654d6372505067684a775355547958427850717745685a5570764869594b6669794651457a4c69465452686a564a4364 esp
exec ipsec sa add 5 spi 100005 crypto-alg aes-cbc-128 crypto-key 586f735546717979594f6f5a4e567441 integ-alg sha-512-256 integ-key 6c6d4e544351556a774d624b78704e49654d6372505067684a775355547958427850717745685a5570764869594b6669794651457a4c69465452686a564a4364 esp
exec ipsec tunnel protect ipip5 sa-out 100005 sa-in 5 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.6.1 p2p
exec ipsec sa add 100006 spi 200006 crypto-alg aes-cbc-128 crypto-key 6f5a7679786f70566d56746b6f417845 integ-alg sha-512-256 integ-key 574665775968674365765742486c755649737a5670445a4e474d7070485645417471755759794d557569675252567463515552485569765455537047736c7556 esp
exec ipsec sa add 6 spi 100006 crypto-alg aes-cbc-128 crypto-key 6f5a7679786f70566d56746b6f417845 integ-alg sha-512-256 integ-key 574665775968674365765742486c755649737a5670445a4e474d7070485645417471755759794d557569675252567463515552485569765455537047736c7556 esp
exec ipsec tunnel protect ipip6 sa-out 100006 sa-in 6 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.7.1 p2p
exec ipsec sa add 100007 spi 200007 crypto-alg aes-cbc-128 crypto-key 574d44586273534a4c44554a6f514d4a integ-alg sha-512-256 integ-key 4e4b744d4344495556735a754267737371657275734c58486c644c4f6c6c6176614376457171746a41784a6944744469797a674c43755a5267434952524a4177 esp
exec ipsec sa add 7 spi 100007 crypto-alg aes-cbc-128 crypto-key 574d44586273534a4c44554a6f514d4a integ-alg sha-512-256 integ-key 4e4b744d4344495556735a754267737371657275734c58486c644c4f6c6c6176614376457171746a41784a6944744469797a674c43755a5267434952524a4177 esp
exec ipsec tunnel protect ipip7 sa-out 100007 sa-in 7 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.8.1 p2p
exec ipsec sa add 100008 spi 200008 crypto-alg aes-cbc-128 crypto-key 66716748414e68537372504169534945 integ-alg sha-512-256 integ-key 5069534c6172654378555845464c6d59577a6c5a62514172586255584876574c58617651524a7873664e444d7170705a5678436251524150715a50707a465258 esp
exec ipsec sa add 8 spi 100008 crypto-alg aes-cbc-128 crypto-key 66716748414e68537372504169534945 integ-alg sha-512-256 integ-key 5069534c6172654378555845464c6d59577a6c5a62514172586255584876574c58617651524a7873664e444d7170705a5678436251524150715a50707a465258 esp
exec ipsec tunnel protect ipip8 sa-out 100008 sa-in 8 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.9.1 p2p
exec ipsec sa add 100009 spi 200009 crypto-alg aes-cbc-128 crypto-key 4b61424375597352786d71644d6a7771 integ-alg sha-512-256 integ-key 4745636f79484f4d79684974727a6771534b7674414e755066786b6a7a7950644970796a4e68764b545848444f7570796a686d516f7141684a72776254474e48 esp
exec ipsec sa add 9 spi 100009 crypto-alg aes-cbc-128 crypto-key 4b61424375597352786d71644d6a7771 integ-alg sha-512-256 integ-key 4745636f79484f4d79684974727a6771534b7674414e755066786b6a7a7950644970796a4e68764b545848444f7570796a686d516f7141684a72776254474e48 esp
exec ipsec tunnel protect ipip9 sa-out 100009 sa-in 9 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.10.1 p2p
exec ipsec sa add 100010 spi 200010 crypto-alg aes-cbc-128 crypto-key 5743765266636543717446744d796767 integ-alg sha-512-256 integ-key 6650584d5a46436e41696d675351525747726b51686d5266527675796a44506e4b556f6c427a575743757270525a586f435041584a4b456f5a7558426b645372 esp
exec ipsec sa add 10 spi 100010 crypto-alg aes-cbc-128 crypto-key 5743765266636543717446744d796767 integ-alg sha-512-256 integ-key 6650584d5a46436e41696d675351525747726b51686d5266527675796a44506e4b556f6c427a575743757270525a586f435041584a4b456f5a7558426b645372 esp
exec ipsec tunnel protect ipip10 sa-out 100010 sa-in 10 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.11.1 p2p
exec ipsec sa add 100011 spi 200011 crypto-alg aes-cbc-128 crypto-key 586f654b6654547474436a7473436850 integ-alg sha-512-256 integ-key 6c4b6e5468564b42465156706a67797553684479577779507263734c744e63756658694354697548556b684f4358655645706c564e5265664b44684f644f4741 esp
exec ipsec sa add 11 spi 100011 crypto-alg aes-cbc-128 crypto-key 586f654b6654547474436a7473436850 integ-alg sha-512-256 integ-key 6c4b6e5468564b42465156706a67797553684479577779507263734c744e63756658694354697548556b684f4358655645706c564e5265664b44684f644f4741 esp
exec ipsec tunnel protect ipip11 sa-out 100011 sa-in 11 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.12.1 p2p
exec ipsec sa add 100012 spi 200012 crypto-alg aes-cbc-128 crypto-key 696d54784970686b4462756e6a56476e integ-alg sha-512-256 integ-key 49614e52437363616e485277755a4e636d647a6c4372676d47444748526751786665455752796578445461456c62516a7752564273527a58436d4779456c4b71 esp
exec ipsec sa add 12 spi 100012 crypto-alg aes-cbc-128 crypto-key 696d54784970686b4462756e6a56476e integ-alg sha-512-256 integ-key 49614e52437363616e485277755a4e636d647a6c4372676d47444748526751786665455752796578445461456c62516a7752564273527a58436d4779456c4b71 esp
exec ipsec tunnel protect ipip12 sa-out 100012 sa-in 12 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.13.1 p2p
exec ipsec sa add 100013 spi 200013 crypto-alg aes-cbc-128 crypto-key 5569484a4858595043744675476a7a47 integ-alg sha-512-256 integ-key 68424c69507366614a455364677675526443476d63435455436d76735464515a6a755a6457467768465378414e7749506258676d785555517943484248424570 esp
exec ipsec sa add 13 spi 100013 crypto-alg aes-cbc-128 crypto-key 5569484a4858595043744675476a7a47 integ-alg sha-512-256 integ-key 68424c69507366614a455364677675526443476d63435455436d76735464515a6a755a6457467768465378414e7749506258676d785555517943484248424570 esp
exec ipsec tunnel protect ipip13 sa-out 100013 sa-in 13 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.14.1 p2p
exec ipsec sa add 100014 spi 200014 crypto-alg aes-cbc-128 crypto-key 7943544a42747649616f6b6b616b5261 integ-alg sha-512-256 integ-key 43426e425354676c416547726a676c4571764363434c4a6f6751697555596d5a455743647a6b7171597a425868797762617a6b7864444a626358525056666d6a esp
exec ipsec sa add 14 spi 100014 crypto-alg aes-cbc-128 crypto-key 7943544a42747649616f6b6b616b5261 integ-alg sha-512-256 integ-key 43426e425354676c416547726a676c4571764363434c4a6f6751697555596d5a455743647a6b7171597a425868797762617a6b7864444a626358525056666d6a esp
exec ipsec tunnel protect ipip14 sa-out 100014 sa-in 14 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.15.1 p2p
exec ipsec sa add 100015 spi 200015 crypto-alg aes-cbc-128 crypto-key 63414154526476576c7a6b634e4c714a integ-alg sha-512-256 integ-key 666c7a7a4771594d6957627359744b6f6958594c5a4d4b647a4f4476766d506d746f6d526c4352766b58416a4e59587a566f7152716a617468446d617369476e esp
exec ipsec sa add 15 spi 100015 crypto-alg aes-cbc-128 crypto-key 63414154526476576c7a6b634e4c714a integ-alg sha-512-256 integ-key 666c7a7a4771594d6957627359744b6f6958594c5a4d4b647a4f4476766d506d746f6d526c4352766b58416a4e59587a566f7152716a617468446d617369476e esp
exec ipsec tunnel protect ipip15 sa-out 100015 sa-in 15 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.16.1 p2p
exec ipsec sa add 100016 spi 200016 crypto-alg aes-cbc-128 crypto-key 496f65597875425172716749756a7748 integ-alg sha-512-256 integ-key 674c4b6a4763684548564b486c67616b784a4f697761717948734a565a5252617576526b6b46636c6e704762766c6b566d74766e6c59596d446b416668444667 esp
exec ipsec sa add 16 spi 100016 crypto-alg aes-cbc-128 crypto-key 496f65597875425172716749756a7748 integ-alg sha-512-256 integ-key 674c4b6a4763684548564b486c67616b784a4f697761717948734a565a5252617576526b6b46636c6e704762766c6b566d74766e6c59596d446b416668444667 esp
exec ipsec tunnel protect ipip16 sa-out 100016 sa-in 16 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.17.1 p2p
exec ipsec sa add 100017 spi 200017 crypto-alg aes-cbc-128 crypto-key 6a484f785a55664e666d674b6d507470 integ-alg sha-512-256 integ-key 7448464742785054734356554d655442526e65426a6e7863726e4e534f4c4a4b4a745a6a6456587772584b497a71496368536168514743787a6445714d6b6a52 esp
exec ipsec sa add 17 spi 100017 crypto-alg aes-cbc-128 crypto-key 6a484f785a55664e666d674b6d507470 integ-alg sha-512-256 integ-key 7448464742785054734356554d655442526e65426a6e7863726e4e534f4c4a4b4a745a6a6456587772584b497a71496368536168514743787a6445714d6b6a52 esp
exec ipsec tunnel protect ipip17 sa-out 100017 sa-in 17 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.18.1 p2p
exec ipsec sa add 100018 spi 200018 crypto-alg aes-cbc-128 crypto-key 5776756157415a495475767964617178 integ-alg sha-512-256 integ-key 6a554d73706c5077747a764678734d755353624f75455347544a5457704b784e57764a5275526d78594872736c487772744d4d76424570586e76714e6a586d54 esp
exec ipsec sa add 18 spi 100018 crypto-alg aes-cbc-128 crypto-key 5776756157415a495475767964617178 integ-alg sha-512-256 integ-key 6a554d73706c5077747a764678734d755353624f75455347544a5457704b784e57764a5275526d78594872736c487772744d4d76424570586e76714e6a586d54 esp
exec ipsec tunnel protect ipip18 sa-out 100018 sa-in 18 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.19.1 p2p
exec ipsec sa add 100019 spi 200019 crypto-alg aes-cbc-128 crypto-key 6663534e6d734d4647796e5353484161 integ-alg sha-512-256 integ-key 4a68786c5a49444754487874496542666f4e59697447777a794c7a70674572666763754e4a4d4171496748694d61766d787979694568496f447a77756e594453 esp
exec ipsec sa add 19 spi 100019 crypto-alg aes-cbc-128 crypto-key 6663534e6d734d4647796e5353484161 integ-alg sha-512-256 integ-key 4a68786c5a49444754487874496542666f4e59697447777a794c7a70674572666763754e4a4d4171496748694d61766d787979694568496f447a77756e594453 esp
exec ipsec tunnel protect ipip19 sa-out 100019 sa-in 19 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.20.1 p2p
exec ipsec sa add 100020 spi 200020 crypto-alg aes-cbc-128 crypto-key 626c47784b796d644477696b52494a68 integ-alg sha-512-256 integ-key 696f416a7a4c56625a707a58724b646b7063626c537045624d7456556b674265545173487661694b73664b614b774f735350584d64434e5046574170446c4e4a esp
exec ipsec sa add 20 spi 100020 crypto-alg aes-cbc-128 crypto-key 626c47784b796d644477696b52494a68 integ-alg sha-512-256 integ-key 696f416a7a4c56625a707a58724b646b7063626c537045624d7456556b674265545173487661694b73664b614b774f735350584d64434e5046574170446c4e4a esp
exec ipsec tunnel protect ipip20 sa-out 100020 sa-in 20 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.21.1 p2p
exec ipsec sa add 100021 spi 200021 crypto-alg aes-cbc-128 crypto-key 524852734b6a5976626b68426e6a7a6b integ-alg sha-512-256 integ-key 6a77496f4f6f6a59456a424c49615a59674867634e6d6b6f4277464861674e44776b6c775a4e5568714c444a5172636b44534b6f6b4362445272497671687743 esp
exec ipsec sa add 21 spi 100021 crypto-alg aes-cbc-128 crypto-key 524852734b6a5976626b68426e6a7a6b integ-alg sha-512-256 integ-key 6a77496f4f6f6a59456a424c49615a59674867634e6d6b6f4277464861674e44776b6c775a4e5568714c444a5172636b44534b6f6b4362445272497671687743 esp
exec ipsec tunnel protect ipip21 sa-out 100021 sa-in 21 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.22.1 p2p
exec ipsec sa add 100022 spi 200022 crypto-alg aes-cbc-128 crypto-key 72676f62537746704b53716142746f4a integ-alg sha-512-256 integ-key 6a6a696261747571426a7a4b6a466253674749795a415a656242617a44446a574b57595459594f646a48515578476e5a487176514d4b7561746a696f696a635a esp
exec ipsec sa add 22 spi 100022 crypto-alg aes-cbc-128 crypto-key 72676f62537746704b53716142746f4a integ-alg sha-512-256 integ-key 6a6a696261747571426a7a4b6a466253674749795a415a656242617a44446a574b57595459594f646a48515578476e5a487176514d4b7561746a696f696a635a esp
exec ipsec tunnel protect ipip22 sa-out 100022 sa-in 22 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.23.1 p2p
exec ipsec sa add 100023 spi 200023 crypto-alg aes-cbc-128 crypto-key 5a6e4668766b56704b6871524243774e integ-alg sha-512-256 integ-key 6e6358784774664e6d716d70564652674c584269676a79566f5a677248654873465a6d774c54575676596f746e7a6e476a6443664b724b4d4669594e724a6765 esp
exec ipsec sa add 23 spi 100023 crypto-alg aes-cbc-128 crypto-key 5a6e4668766b56704b6871524243774e integ-alg sha-512-256 integ-key 6e6358784774664e6d716d70564652674c584269676a79566f5a677248654873465a6d774c54575676596f746e7a6e476a6443664b724b4d4669594e724a6765 esp
exec ipsec tunnel protect ipip23 sa-out 100023 sa-in 23 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.24.1 p2p
exec ipsec sa add 100024 spi 200024 crypto-alg aes-cbc-128 crypto-key 4f6e4c524f747a6275545371744f7776 integ-alg sha-512-256 integ-key 59417666594b63754b4d704278796768766a6c4378677767715059484b56717448724749536770414c6d484f44524264595872625643756f4f636a477862726b esp
exec ipsec sa add 24 spi 100024 crypto-alg aes-cbc-128 crypto-key 4f6e4c524f747a6275545371744f7776 integ-alg sha-512-256 integ-key 59417666594b63754b4d704278796768766a6c4378677767715059484b56717448724749536770414c6d484f44524264595872625643756f4f636a477862726b esp
exec ipsec tunnel protect ipip24 sa-out 100024 sa-in 24 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.25.1 p2p
exec ipsec sa add 100025 spi 200025 crypto-alg aes-cbc-128 crypto-key 5a5767674b4a624f596c4f686f697a57 integ-alg sha-512-256 integ-key 74577377424a465a516f504a52716f466b66586b77684863496168457a6873595a6f75767251676b75784b504d555869766a41536e46496469594b4c63686474 esp
exec ipsec sa add 25 spi 100025 crypto-alg aes-cbc-128 crypto-key 5a5767674b4a624f596c4f686f697a57 integ-alg sha-512-256 integ-key 74577377424a465a516f504a52716f466b66586b77684863496168457a6873595a6f75767251676b75784b504d555869766a41536e46496469594b4c63686474 esp
exec ipsec tunnel protect ipip25 sa-out 100025 sa-in 25 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.26.1 p2p
exec ipsec sa add 100026 spi 200026 crypto-alg aes-cbc-128 crypto-key 51596476474d77686d4d594e45555171 integ-alg sha-512-256 integ-key 64716464614c755a4e416f476a5241565666534a495941476e746a53696779766d7463556775516d546a464d736c74427a785461794d6b4e575359664e4d5863 esp
exec ipsec sa add 26 spi 100026 crypto-alg aes-cbc-128 crypto-key 51596476474d77686d4d594e45555171 integ-alg sha-512-256 integ-key 64716464614c755a4e416f476a5241565666534a495941476e746a53696779766d7463556775516d546a464d736c74427a785461794d6b4e575359664e4d5863 esp
exec ipsec tunnel protect ipip26 sa-out 100026 sa-in 26 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.27.1 p2p
exec ipsec sa add 100027 spi 200027 crypto-alg aes-cbc-128 crypto-key 5844584959546d7a4669554873636f6a integ-alg sha-512-256 integ-key 72536675734c626b4750576e6844574b774a454a5050444c6f727a4d56706e6b5a6f474375545073484a775549497963486877474f6358596a7a77486b525752 esp
exec ipsec sa add 27 spi 100027 crypto-alg aes-cbc-128 crypto-key 5844584959546d7a4669554873636f6a integ-alg sha-512-256 integ-key 72536675734c626b4750576e6844574b774a454a5050444c6f727a4d56706e6b5a6f474375545073484a775549497963486877474f6358596a7a77486b525752 esp
exec ipsec tunnel protect ipip27 sa-out 100027 sa-in 27 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.28.1 p2p
exec ipsec sa add 100028 spi 200028 crypto-alg aes-cbc-128 crypto-key 5658546b6a596570434f4c4c77464b4c integ-alg sha-512-256 integ-key 56576865537063484957544679666b567a6e4a68657a6d7376786b7445596c4a6176735577704a73494b6958514b654d424c4946486a754b534a597253526b63 esp
exec ipsec sa add 28 spi 100028 crypto-alg aes-cbc-128 crypto-key 5658546b6a596570434f4c4c77464b4c integ-alg sha-512-256 integ-key 56576865537063484957544679666b567a6e4a68657a6d7376786b7445596c4a6176735577704a73494b6958514b654d424c4946486a754b534a597253526b63 esp
exec ipsec tunnel protect ipip28 sa-out 100028 sa-in 28 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.29.1 p2p
exec ipsec sa add 100029 spi 200029 crypto-alg aes-cbc-128 crypto-key 735567516c704c794b78797a775a6c41 integ-alg sha-512-256 integ-key 744254584f47537679795969576b6e73554350774a58764961476a667a68465376526e546d6d5a6b5a5a416a71417479554956664b516156797a7951456f4264 esp
exec ipsec sa add 29 spi 100029 crypto-alg aes-cbc-128 crypto-key 735567516c704c794b78797a775a6c41 integ-alg sha-512-256 integ-key 744254584f47537679795969576b6e73554350774a58764961476a667a68465376526e546d6d5a6b5a5a416a71417479554956664b516156797a7951456f4264 esp
exec ipsec tunnel protect ipip29 sa-out 100029 sa-in 29 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.30.1 p2p
exec ipsec sa add 100030 spi 200030 crypto-alg aes-cbc-128 crypto-key 4e5245487a7554435456566642584553 integ-alg sha-512-256 integ-key 78796747624869475a6463465444487547455646686d4244746479464d6754647844436862544f5062616252566b52507147414a6b584b4e5741736550575467 esp
exec ipsec sa add 30 spi 100030 crypto-alg aes-cbc-128 crypto-key 4e5245487a7554435456566642584553 integ-alg sha-512-256 integ-key 78796747624869475a6463465444487547455646686d4244746479464d6754647844436862544f5062616252566b52507147414a6b584b4e5741736550575467 esp
exec ipsec tunnel protect ipip30 sa-out 100030 sa-in 30 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.31.1 p2p
exec ipsec sa add 100031 spi 200031 crypto-alg aes-cbc-128 crypto-key 6961486177506c717967736751777266 integ-alg sha-512-256 integ-key 5a414b7144535066764e4c72754c6d43547369427a714547726745736f706c5441516a55694770584572656274784d655055625661666172746b4847764d7569 esp
exec ipsec sa add 31 spi 100031 crypto-alg aes-cbc-128 crypto-key 6961486177506c717967736751777266 integ-alg sha-512-256 integ-key 5a414b7144535066764e4c72754c6d43547369427a714547726745736f706c5441516a55694770584572656274784d655055625661666172746b4847764d7569 esp
exec ipsec tunnel protect ipip31 sa-out 100031 sa-in 31 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.32.1 p2p
exec ipsec sa add 100032 spi 200032 crypto-alg aes-cbc-128 crypto-key 50735778514356466f707a4e476a4a64 integ-alg sha-512-256 integ-key 6f514e626b61464d585a6b6b5a4a45594b42476c5079644c4c66654977554f656b4977686957484e507874594f4e554266754a4d6a4548795062424a4f696353 esp
exec ipsec sa add 32 spi 100032 crypto-alg aes-cbc-128 crypto-key 50735778514356466f707a4e476a4a64 integ-alg sha-512-256 integ-key 6f514e626b61464d585a6b6b5a4a45594b42476c5079644c4c66654977554f656b4977686957484e507874594f4e554266754a4d6a4548795062424a4f696353 esp
exec ipsec tunnel protect ipip32 sa-out 100032 sa-in 32 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.33.1 p2p
exec ipsec sa add 100033 spi 200033 crypto-alg aes-cbc-128 crypto-key 54724e6155524a75675874765645616d integ-alg sha-512-256 integ-key 6454715a78657262685648686d6d4e464677454866546e43485a797967644d626a5a686347455a636e41616b56744e4e7972615552735051624f7254544a704e esp
exec ipsec sa add 33 spi 100033 crypto-alg aes-cbc-128 crypto-key 54724e6155524a75675874765645616d integ-alg sha-512-256 integ-key 6454715a78657262685648686d6d4e464677454866546e43485a797967644d626a5a686347455a636e41616b56744e4e7972615552735051624f7254544a704e esp
exec ipsec tunnel protect ipip33 sa-out 100033 sa-in 33 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.34.1 p2p
exec ipsec sa add 100034 spi 200034 crypto-alg aes-cbc-128 crypto-key 67594f4d4e6367524679454461715678 integ-alg sha-512-256 integ-key 7754454b4856674372464b52704f585255467a664a636d434c7064615847726379754748445a554366436b4b6e67564459656f6d71716541556e48665a6e5a4b esp
exec ipsec sa add 34 spi 100034 crypto-alg aes-cbc-128 crypto-key 67594f4d4e6367524679454461715678 integ-alg sha-512-256 integ-key 7754454b4856674372464b52704f585255467a664a636d434c7064615847726379754748445a554366436b4b6e67564459656f6d71716541556e48665a6e5a4b esp
exec ipsec tunnel protect ipip34 sa-out 100034 sa-in 34 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.35.1 p2p
exec ipsec sa add 100035 spi 200035 crypto-alg aes-cbc-128 crypto-key 497452735954626f414f51664f51764f integ-alg sha-512-256 integ-key 436953586b695a644372584452764b63415357427656427a73476c7362595964794e756664747747536362444a4157675645484e676e56514b6a794357744c53 esp
exec ipsec sa add 35 spi 100035 crypto-alg aes-cbc-128 crypto-key 497452735954626f414f51664f51764f integ-alg sha-512-256 integ-key 436953586b695a644372584452764b63415357427656427a73476c7362595964794e756664747747536362444a4157675645484e676e56514b6a794357744c53 esp
exec ipsec tunnel protect ipip35 sa-out 100035 sa-in 35 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.36.1 p2p
exec ipsec sa add 100036 spi 200036 crypto-alg aes-cbc-128 crypto-key 4b636c4e42796d4e486d66636f697664 integ-alg sha-512-256 integ-key 44664d745570614364634664567a4651446250556447686f546c4f46496e754a6f626b52484a71674b676c634f596b7a707359494a68647169446d76536b5461 esp
exec ipsec sa add 36 spi 100036 crypto-alg aes-cbc-128 crypto-key 4b636c4e42796d4e486d66636f697664 integ-alg sha-512-256 integ-key 44664d745570614364634664567a4651446250556447686f546c4f46496e754a6f626b52484a71674b676c634f596b7a707359494a68647169446d76536b5461 esp
exec ipsec tunnel protect ipip36 sa-out 100036 sa-in 36 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.37.1 p2p
exec ipsec sa add 100037 spi 200037 crypto-alg aes-cbc-128 crypto-key 5a4678506d7947565573725744666b62 integ-alg sha-512-256 integ-key 726b62467a6a517a56634b4e73486a7a7376676f626d4c62616544714e786a6743486857684450757649555a4a6e447157414d796d564366624e455759675563 esp
exec ipsec sa add 37 spi 100037 crypto-alg aes-cbc-128 crypto-key 5a4678506d7947565573725744666b62 integ-alg sha-512-256 integ-key 726b62467a6a517a56634b4e73486a7a7376676f626d4c62616544714e786a6743486857684450757649555a4a6e447157414d796d564366624e455759675563 esp
exec ipsec tunnel protect ipip37 sa-out 100037 sa-in 37 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.38.1 p2p
exec ipsec sa add 100038 spi 200038 crypto-alg aes-cbc-128 crypto-key 446b436d594555614246676c6e544e49 integ-alg sha-512-256 integ-key 766351564b4e624d6b79596257746a656a4f785157576a5351706579517a526f63736c6846445372754d4a446b725a6e557854554d6b53545973515a6652626a esp
exec ipsec sa add 38 spi 100038 crypto-alg aes-cbc-128 crypto-key 446b436d594555614246676c6e544e49 integ-alg sha-512-256 integ-key 766351564b4e624d6b79596257746a656a4f785157576a5351706579517a526f63736c6846445372754d4a446b725a6e557854554d6b53545973515a6652626a esp
exec ipsec tunnel protect ipip38 sa-out 100038 sa-in 38 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.39.1 p2p
exec ipsec sa add 100039 spi 200039 crypto-alg aes-cbc-128 crypto-key 4a494167776966576444764a61655967 integ-alg sha-512-256 integ-key 73574a61656759707659665361596c4750784e65424f41596d6375755873704c6c6374425667714576547778636c5552774a797553455753466f4b4441687269 esp
exec ipsec sa add 39 spi 100039 crypto-alg aes-cbc-128 crypto-key 4a494167776966576444764a61655967 integ-alg sha-512-256 integ-key 73574a61656759707659665361596c4750784e65424f41596d6375755873704c6c6374425667714576547778636c5552774a797553455753466f4b4441687269 esp
exec ipsec tunnel protect ipip39 sa-out 100039 sa-in 39 add
exec ip route add 100.0.0.1/8 via 200.0.0.101 TenGigabitEthernet8/0/0
exec set interface unnumbered ipip0 use TenGigabitEthernet8/0/0
exec set interface state ipip0 up
exec ip route add 10.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use TenGigabitEthernet8/0/0
exec set interface state ipip1 up
exec ip route add 10.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use TenGigabitEthernet8/0/0
exec set interface state ipip2 up
exec ip route add 10.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use TenGigabitEthernet8/0/0
exec set interface state ipip3 up
exec ip route add 10.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use TenGigabitEthernet8/0/0
exec set interface state ipip4 up
exec ip route add 10.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use TenGigabitEthernet8/0/0
exec set interface state ipip5 up
exec ip route add 10.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use TenGigabitEthernet8/0/0
exec set interface state ipip6 up
exec ip route add 10.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use TenGigabitEthernet8/0/0
exec set interface state ipip7 up
exec ip route add 10.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use TenGigabitEthernet8/0/0
exec set interface state ipip8 up
exec ip route add 10.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use TenGigabitEthernet8/0/0
exec set interface state ipip9 up
exec ip route add 10.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use TenGigabitEthernet8/0/0
exec set interface state ipip10 up
exec ip route add 10.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use TenGigabitEthernet8/0/0
exec set interface state ipip11 up
exec ip route add 10.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use TenGigabitEthernet8/0/0
exec set interface state ipip12 up
exec ip route add 10.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use TenGigabitEthernet8/0/0
exec set interface state ipip13 up
exec ip route add 10.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use TenGigabitEthernet8/0/0
exec set interface state ipip14 up
exec ip route add 10.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use TenGigabitEthernet8/0/0
exec set interface state ipip15 up
exec ip route add 10.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use TenGigabitEthernet8/0/0
exec set interface state ipip16 up
exec ip route add 10.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use TenGigabitEthernet8/0/0
exec set interface state ipip17 up
exec ip route add 10.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use TenGigabitEthernet8/0/0
exec set interface state ipip18 up
exec ip route add 10.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use TenGigabitEthernet8/0/0
exec set interface state ipip19 up
exec ip route add 10.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use TenGigabitEthernet8/0/0
exec set interface state ipip20 up
exec ip route add 10.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use TenGigabitEthernet8/0/0
exec set interface state ipip21 up
exec ip route add 10.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use TenGigabitEthernet8/0/0
exec set interface state ipip22 up
exec ip route add 10.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use TenGigabitEthernet8/0/0
exec set interface state ipip23 up
exec ip route add 10.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use TenGigabitEthernet8/0/0
exec set interface state ipip24 up
exec ip route add 10.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use TenGigabitEthernet8/0/0
exec set interface state ipip25 up
exec ip route add 10.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use TenGigabitEthernet8/0/0
exec set interface state ipip26 up
exec ip route add 10.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use TenGigabitEthernet8/0/0
exec set interface state ipip27 up
exec ip route add 10.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use TenGigabitEthernet8/0/0
exec set interface state ipip28 up
exec ip route add 10.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use TenGigabitEthernet8/0/0
exec set interface state ipip29 up
exec ip route add 10.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use TenGigabitEthernet8/0/0
exec set interface state ipip30 up
exec ip route add 10.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use TenGigabitEthernet8/0/0
exec set interface state ipip31 up
exec ip route add 10.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use TenGigabitEthernet8/0/0
exec set interface state ipip32 up
exec ip route add 10.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use TenGigabitEthernet8/0/0
exec set interface state ipip33 up
exec ip route add 10.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use TenGigabitEthernet8/0/0
exec set interface state ipip34 up
exec ip route add 10.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use TenGigabitEthernet8/0/0
exec set interface state ipip35 up
exec ip route add 10.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use TenGigabitEthernet8/0/0
exec set interface state ipip36 up
exec ip route add 10.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use TenGigabitEthernet8/0/0
exec set interface state ipip37 up
exec ip route add 10.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use TenGigabitEthernet8/0/0
exec set interface state ipip38 up
exec ip route add 10.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use TenGigabitEthernet8/0/0
exec set interface state ipip39 up
exec ip route add 10.0.0.39/32 via ipip39

 imix-2t2c-ethip4ipsec40tnlsw-ip4base- 
int-aes128cbc-hmac512sha-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec create loopback interface
exec set interface state loop0 up
exec set interface ip address TenGigabitEthernet8/0/0 200.0.0.101/24
exec set ip neighbor TenGigabitEthernet8/0/0 200.0.0.102 ac:1f:6b:57:57:fe static
exec set interface ip address loop0 100.0.0.1/32
exec create ipip tunnel src 100.0.0.1 dst 200.0.0.102 p2p
exec ipsec sa add 0 spi 100000 crypto-alg aes-cbc-128 crypto-key 64634b7869776f565078435063596566 integ-alg sha-512-256 integ-key 516279454f46706f59554a784a675947467a53757178534a474d4a76705a6b6b465875566a457a7352614b4a515a7a58774e545655507968504d53754b586758 esp
exec ipsec sa add 100000 spi 200000 crypto-alg aes-cbc-128 crypto-key 64634b7869776f565078435063596566 integ-alg sha-512-256 integ-key 516279454f46706f59554a784a675947467a53757178534a474d4a76705a6b6b465875566a457a7352614b4a515a7a58774e545655507968504d53754b586758 esp
exec ipsec tunnel protect ipip0 sa-out 0 sa-in 100000 add
exec set interface ip address loop0 100.0.1.1/32
exec create ipip tunnel src 100.0.1.1 dst 200.0.0.102 p2p
exec ipsec sa add 1 spi 100001 crypto-alg aes-cbc-128 crypto-key 415447434f50696b505a79516a76716b integ-alg sha-512-256 integ-key 71416f4a62736a79594c6e4e6d5a546d45695674744d4e4a6d4856785657626f6854424244614b53695766754d634664626b694e5066616c67686e494461637a esp
exec ipsec sa add 100001 spi 200001 crypto-alg aes-cbc-128 crypto-key 415447434f50696b505a79516a76716b integ-alg sha-512-256 integ-key 71416f4a62736a79594c6e4e6d5a546d45695674744d4e4a6d4856785657626f6854424244614b53695766754d634664626b694e5066616c67686e494461637a esp
exec ipsec tunnel protect ipip1 sa-out 1 sa-in 100001 add
exec set interface ip address loop0 100.0.2.1/32
exec create ipip tunnel src 100.0.2.1 dst 200.0.0.102 p2p
exec ipsec sa add 2 spi 100002 crypto-alg aes-cbc-128 crypto-key 446c694c654e4462726e48516f65756e integ-alg sha-512-256 integ-key 6245566c5578577175436942576b436c6655577559434a4b7556616e594c6b6f6d61796b5678694877526a704749424d6a48586e62474573436b686167547577 esp
exec ipsec sa add 100002 spi 200002 crypto-alg aes-cbc-128 crypto-key 446c694c654e4462726e48516f65756e integ-alg sha-512-256 integ-key 6245566c5578577175436942576b436c6655577559434a4b7556616e594c6b6f6d61796b5678694877526a704749424d6a48586e62474573436b686167547577 esp
exec ipsec tunnel protect ipip2 sa-out 2 sa-in 100002 add
exec set interface ip address loop0 100.0.3.1/32
exec create ipip tunnel src 100.0.3.1 dst 200.0.0.102 p2p
exec ipsec sa add 3 spi 100003 crypto-alg aes-cbc-128 crypto-key 6d67534c6b7673477341516a5468566c integ-alg sha-512-256 integ-key 6b72666a594e41785963654855635368797375776669484e674b4a614a67774559657a737948584a616a474556785267435374657861514247475751796e6d58 esp
exec ipsec sa add 100003 spi 200003 crypto-alg aes-cbc-128 crypto-key 6d67534c6b7673477341516a5468566c integ-alg sha-512-256 integ-key 6b72666a594e41785963654855635368797375776669484e674b4a614a67774559657a737948584a616a474556785267435374657861514247475751796e6d58 esp
exec ipsec tunnel protect ipip3 sa-out 3 sa-in 100003 add
exec set interface ip address loop0 100.0.4.1/32
exec create ipip tunnel src 100.0.4.1 dst 200.0.0.102 p2p
exec ipsec sa add 4 spi 100004 crypto-alg aes-cbc-128 crypto-key 745465786a64524d6a4a726f7755694c integ-alg sha-512-256 integ-key 52644c51645475754e615a7371656e4e6c556c7a69644f636a766b5a4b6b4d7059496875776e6a54516b4b5454786d55506c58587173626c56486a6e70504c6c esp
exec ipsec sa add 100004 spi 200004 crypto-alg aes-cbc-128 crypto-key 745465786a64524d6a4a726f7755694c integ-alg sha-512-256 integ-key 52644c51645475754e615a7371656e4e6c556c7a69644f636a766b5a4b6b4d7059496875776e6a54516b4b5454786d55506c58587173626c56486a6e70504c6c esp
exec ipsec tunnel protect ipip4 sa-out 4 sa-in 100004 add
exec set interface ip address loop0 100.0.5.1/32
exec create ipip tunnel src 100.0.5.1 dst 200.0.0.102 p2p
exec ipsec sa add 5 spi 100005 crypto-alg aes-cbc-128 crypto-key 555a5369794a77596c6d5262616b4f42 integ-alg sha-512-256 integ-key 594e6b476e6f67614f49795a5673526373704344434474484d6f585a6947536e56674d575248766a6362506b7875664868425146526b72786d4f4f7a43585a56 esp
exec ipsec sa add 100005 spi 200005 crypto-alg aes-cbc-128 crypto-key 555a5369794a77596c6d5262616b4f42 integ-alg sha-512-256 integ-key 594e6b476e6f67614f49795a5673526373704344434474484d6f585a6947536e56674d575248766a6362506b7875664868425146526b72786d4f4f7a43585a56 esp
exec ipsec tunnel protect ipip5 sa-out 5 sa-in 100005 add
exec set interface ip address loop0 100.0.6.1/32
exec create ipip tunnel src 100.0.6.1 dst 200.0.0.102 p2p
exec ipsec sa add 6 spi 100006 crypto-alg aes-cbc-128 crypto-key 536d62597a72726945527457476b6e6c integ-alg sha-512-256 integ-key 4d525a6c4a4a736b78774e557858435268457357554441587a6443786851684852784e54484454566e51766c4277686b4463416d6c784d534e78615677677650 esp
exec ipsec sa add 100006 spi 200006 crypto-alg aes-cbc-128 crypto-key 536d62597a72726945527457476b6e6c integ-alg sha-512-256 integ-key 4d525a6c4a4a736b78774e557858435268457357554441587a6443786851684852784e54484454566e51766c4277686b4463416d6c784d534e78615677677650 esp
exec ipsec tunnel protect ipip6 sa-out 6 sa-in 100006 add
exec set interface ip address loop0 100.0.7.1/32
exec create ipip tunnel src 100.0.7.1 dst 200.0.0.102 p2p
exec ipsec sa add 7 spi 100007 crypto-alg aes-cbc-128 crypto-key 4b7150786b4c6479464257646b4d6e72 integ-alg sha-512-256 integ-key 554a724473666778797a4c644958426b7a735a7654764261444177466f796a44436578734a506672575754414d4267454c43576f4b4e6b675679695067574970 esp
exec ipsec sa add 100007 spi 200007 crypto-alg aes-cbc-128 crypto-key 4b7150786b4c6479464257646b4d6e72 integ-alg sha-512-256 integ-key 554a724473666778797a4c644958426b7a735a7654764261444177466f796a44436578734a506672575754414d4267454c43576f4b4e6b675679695067574970 esp
exec ipsec tunnel protect ipip7 sa-out 7 sa-in 100007 add
exec set interface ip address loop0 100.0.8.1/32
exec create ipip tunnel src 100.0.8.1 dst 200.0.0.102 p2p
exec ipsec sa add 8 spi 100008 crypto-alg aes-cbc-128 crypto-key 4d5875716952746a57554650495a4b73 integ-alg sha-512-256 integ-key 4c45694b746b6f4e6b64704947736a4e5061414d716c6e67556b7567526e6345447073726a4c59776f57504e486f566370696d7144614e566462644869786473 esp
exec ipsec sa add 100008 spi 200008 crypto-alg aes-cbc-128 crypto-key 4d5875716952746a57554650495a4b73 integ-alg sha-512-256 integ-key 4c45694b746b6f4e6b64704947736a4e5061414d716c6e67556b7567526e6345447073726a4c59776f57504e486f566370696d7144614e566462644869786473 esp
exec ipsec tunnel protect ipip8 sa-out 8 sa-in 100008 add
exec set interface ip address loop0 100.0.9.1/32
exec create ipip tunnel src 100.0.9.1 dst 200.0.0.102 p2p
exec ipsec sa add 9 spi 100009 crypto-alg aes-cbc-128 crypto-key 74646858765a59626563474f75565370 integ-alg sha-512-256 integ-key 626a547868514b59454e634273516d547677655662595a4d765569646f4a4f51674b54727778427157795a5941626c654a575a75514d624a7575484548714c49 esp
exec ipsec sa add 100009 spi 200009 crypto-alg aes-cbc-128 crypto-key 74646858765a59626563474f75565370 integ-alg sha-512-256 integ-key 626a547868514b59454e634273516d547677655662595a4d765569646f4a4f51674b54727778427157795a5941626c654a575a75514d624a7575484548714c49 esp
exec ipsec tunnel protect ipip9 sa-out 9 sa-in 100009 add
exec set interface ip address loop0 100.0.10.1/32
exec create ipip tunnel src 100.0.10.1 dst 200.0.0.102 p2p
exec ipsec sa add 10 spi 100010 crypto-alg aes-cbc-128 crypto-key 7273585275744d674c45766156545764 integ-alg sha-512-256 integ-key 42577a657a476b416f4471616d6f4f6d7258687048415270616c5479587265695177744842747257444f7a577a6e734667446d5842585a6458507a6552534c48 esp
exec ipsec sa add 100010 spi 200010 crypto-alg aes-cbc-128 crypto-key 7273585275744d674c45766156545764 integ-alg sha-512-256 integ-key 42577a657a476b416f4471616d6f4f6d7258687048415270616c5479587265695177744842747257444f7a577a6e734667446d5842585a6458507a6552534c48 esp
exec ipsec tunnel protect ipip10 sa-out 10 sa-in 100010 add
exec set interface ip address loop0 100.0.11.1/32
exec create ipip tunnel src 100.0.11.1 dst 200.0.0.102 p2p
exec ipsec sa add 11 spi 100011 crypto-alg aes-cbc-128 crypto-key 57444a71694346797846576e71574876 integ-alg sha-512-256 integ-key 695956496861547a5272525a42664c525974676f4869496a6b5572796a4c434b6e6d436f77564a6f4e4a70485a6c7277514d686b7a7441486d426d6365754f41 esp
exec ipsec sa add 100011 spi 200011 crypto-alg aes-cbc-128 crypto-key 57444a71694346797846576e71574876 integ-alg sha-512-256 integ-key 695956496861547a5272525a42664c525974676f4869496a6b5572796a4c434b6e6d436f77564a6f4e4a70485a6c7277514d686b7a7441486d426d6365754f41 esp
exec ipsec tunnel protect ipip11 sa-out 11 sa-in 100011 add
exec set interface ip address loop0 100.0.12.1/32
exec create ipip tunnel src 100.0.12.1 dst 200.0.0.102 p2p
exec ipsec sa add 12 spi 100012 crypto-alg aes-cbc-128 crypto-key 736252786151555071774a4e75624c72 integ-alg sha-512-256 integ-key 45777655677577707853517743535561427a524352674344754876687559616f4f6a797644486b7470496a7366774375427978416f4b44786d77744b4a566454 esp
exec ipsec sa add 100012 spi 200012 crypto-alg aes-cbc-128 crypto-key 736252786151555071774a4e75624c72 integ-alg sha-512-256 integ-key 45777655677577707853517743535561427a524352674344754876687559616f4f6a797644486b7470496a7366774375427978416f4b44786d77744b4a566454 esp
exec ipsec tunnel protect ipip12 sa-out 12 sa-in 100012 add
exec set interface ip address loop0 100.0.13.1/32
exec create ipip tunnel src 100.0.13.1 dst 200.0.0.102 p2p
exec ipsec sa add 13 spi 100013 crypto-alg aes-cbc-128 crypto-key 476f5247576b654d43566144537a656f integ-alg sha-512-256 integ-key 524778786e436e50444358506d47636e794d6e7a4d41666a754c685066546c514b6b63464d766876434b7a495552747376425a544e415879744965655879595a esp
exec ipsec sa add 100013 spi 200013 crypto-alg aes-cbc-128 crypto-key 476f5247576b654d43566144537a656f integ-alg sha-512-256 integ-key 524778786e436e50444358506d47636e794d6e7a4d41666a754c685066546c514b6b63464d766876434b7a495552747376425a544e415879744965655879595a esp
exec ipsec tunnel protect ipip13 sa-out 13 sa-in 100013 add
exec set interface ip address loop0 100.0.14.1/32
exec create ipip tunnel src 100.0.14.1 dst 200.0.0.102 p2p
exec ipsec sa add 14 spi 100014 crypto-alg aes-cbc-128 crypto-key 5974436b4d595a7148754362767a4f46 integ-alg sha-512-256 integ-key 706c7857504e4368647357556b4d445341444c486d65457363534a524e4e477a627a7877626e6241687a737a4c485945776468747252506b7a6744674e756758 esp
exec ipsec sa add 100014 spi 200014 crypto-alg aes-cbc-128 crypto-key 5974436b4d595a7148754362767a4f46 integ-alg sha-512-256 integ-key 706c7857504e4368647357556b4d445341444c486d65457363534a524e4e477a627a7877626e6241687a737a4c485945776468747252506b7a6744674e756758 esp
exec ipsec tunnel protect ipip14 sa-out 14 sa-in 100014 add
exec set interface ip address loop0 100.0.15.1/32
exec create ipip tunnel src 100.0.15.1 dst 200.0.0.102 p2p
exec ipsec sa add 15 spi 100015 crypto-alg aes-cbc-128 crypto-key 774d494a5447576c7a4178796b4e676b integ-alg sha-512-256 integ-key 6558544e74444b786a6c4e5755625749454873636c4753456e6d67717665494b6f59634d67495a77414368517268726f614e506b49794759784f4b686e6a6846 esp
exec ipsec sa add 100015 spi 200015 crypto-alg aes-cbc-128 crypto-key 774d494a5447576c7a4178796b4e676b integ-alg sha-512-256 integ-key 6558544e74444b786a6c4e5755625749454873636c4753456e6d67717665494b6f59634d67495a77414368517268726f614e506b49794759784f4b686e6a6846 esp
exec ipsec tunnel protect ipip15 sa-out 15 sa-in 100015 add
exec set interface ip address loop0 100.0.16.1/32
exec create ipip tunnel src 100.0.16.1 dst 200.0.0.102 p2p
exec ipsec sa add 16 spi 100016 crypto-alg aes-cbc-128 crypto-key 616d4d79686f417656436c7773597352 integ-alg sha-512-256 integ-key 444c587a484c704a414b55694c524f4163736d7a534168664e746b4c64694b466173616266616c5254524d4475476f6270596c5a564e5167724e696e486b7556 esp
exec ipsec sa add 100016 spi 200016 crypto-alg aes-cbc-128 crypto-key 616d4d79686f417656436c7773597352 integ-alg sha-512-256 integ-key 444c587a484c704a414b55694c524f4163736d7a534168664e746b4c64694b466173616266616c5254524d4475476f6270596c5a564e5167724e696e486b7556 esp
exec ipsec tunnel protect ipip16 sa-out 16 sa-in 100016 add
exec set interface ip address loop0 100.0.17.1/32
exec create ipip tunnel src 100.0.17.1 dst 200.0.0.102 p2p
exec ipsec sa add 17 spi 100017 crypto-alg aes-cbc-128 crypto-key 7677786e574a5372654b50795753797a integ-alg sha-512-256 integ-key 7a4561467675435366635a50674442495651787041725862704648777153564374414f4e6972686f4e767047576350425853474b65704d4b4552456e64774457 esp
exec ipsec sa add 100017 spi 200017 crypto-alg aes-cbc-128 crypto-key 7677786e574a5372654b50795753797a integ-alg sha-512-256 integ-key 7a4561467675435366635a50674442495651787041725862704648777153564374414f4e6972686f4e767047576350425853474b65704d4b4552456e64774457 esp
exec ipsec tunnel protect ipip17 sa-out 17 sa-in 100017 add
exec set interface ip address loop0 100.0.18.1/32
exec create ipip tunnel src 100.0.18.1 dst 200.0.0.102 p2p
exec ipsec sa add 18 spi 100018 crypto-alg aes-cbc-128 crypto-key 4d71636d4a6b656e524f7653436b724b integ-alg sha-512-256 integ-key 6770585150516677694f766e5278575a5469454d6c75636f6262514b6370494f696b4a65494d5366714c4d78744e595375774c616c4949747757626443536a42 esp
exec ipsec sa add 100018 spi 200018 crypto-alg aes-cbc-128 crypto-key 4d71636d4a6b656e524f7653436b724b integ-alg sha-512-256 integ-key 6770585150516677694f766e5278575a5469454d6c75636f6262514b6370494f696b4a65494d5366714c4d78744e595375774c616c4949747757626443536a42 esp
exec ipsec tunnel protect ipip18 sa-out 18 sa-in 100018 add
exec set interface ip address loop0 100.0.19.1/32
exec create ipip tunnel src 100.0.19.1 dst 200.0.0.102 p2p
exec ipsec sa add 19 spi 100019 crypto-alg aes-cbc-128 crypto-key 644f4b6a7a5046724f4e774957735a73 integ-alg sha-512-256 integ-key 6a7451576a64507a69644873644541595942626b536f42666a57586f6e744e646f7651656d6645554448644651636175634966537548556c5147564e6e6f4841 esp
exec ipsec sa add 100019 spi 200019 crypto-alg aes-cbc-128 crypto-key 644f4b6a7a5046724f4e774957735a73 integ-alg sha-512-256 integ-key 6a7451576a64507a69644873644541595942626b536f42666a57586f6e744e646f7651656d6645554448644651636175634966537548556c5147564e6e6f4841 esp
exec ipsec tunnel protect ipip19 sa-out 19 sa-in 100019 add
exec set interface ip address loop0 100.0.20.1/32
exec create ipip tunnel src 100.0.20.1 dst 200.0.0.102 p2p
exec ipsec sa add 20 spi 100020 crypto-alg aes-cbc-128 crypto-key 5876434a5a6678594369486869584f75 integ-alg sha-512-256 integ-key 6969634f686476614e4e75704e435069664645576644644e665444796448556c6f4163716b46776e437a746c4e6f4f776e4e527a716849415954655651706b75 esp
exec ipsec sa add 100020 spi 200020 crypto-alg aes-cbc-128 crypto-key 5876434a5a6678594369486869584f75 integ-alg sha-512-256 integ-key 6969634f686476614e4e75704e435069664645576644644e665444796448556c6f4163716b46776e437a746c4e6f4f776e4e527a716849415954655651706b75 esp
exec ipsec tunnel protect ipip20 sa-out 20 sa-in 100020 add
exec set interface ip address loop0 100.0.21.1/32
exec create ipip tunnel src 100.0.21.1 dst 200.0.0.102 p2p
exec ipsec sa add 21 spi 100021 crypto-alg aes-cbc-128 crypto-key 536a466356495342647642704241716a integ-alg sha-512-256 integ-key 497641796b5743517a42704d4e726d6d61727765657167726178645453686f56784755644354516675634e6e7756786f6657756361676a464d746a544b424d4f esp
exec ipsec sa add 100021 spi 200021 crypto-alg aes-cbc-128 crypto-key 536a466356495342647642704241716a integ-alg sha-512-256 integ-key 497641796b5743517a42704d4e726d6d61727765657167726178645453686f56784755644354516675634e6e7756786f6657756361676a464d746a544b424d4f esp
exec ipsec tunnel protect ipip21 sa-out 21 sa-in 100021 add
exec set interface ip address loop0 100.0.22.1/32
exec create ipip tunnel src 100.0.22.1 dst 200.0.0.102 p2p
exec ipsec sa add 22 spi 100022 crypto-alg aes-cbc-128 crypto-key 4246644d5169586b757a526e7442786a integ-alg sha-512-256 integ-key 4d6e4d454a61465873665179637175686b4d51587361785168477469675578485975774f794a6a576776647a617a65524e51474f735669426c5673524e754b4c esp
exec ipsec sa add 100022 spi 200022 crypto-alg aes-cbc-128 crypto-key 4246644d5169586b757a526e7442786a integ-alg sha-512-256 integ-key 4d6e4d454a61465873665179637175686b4d51587361785168477469675578485975774f794a6a576776647a617a65524e51474f735669426c5673524e754b4c esp
exec ipsec tunnel protect ipip22 sa-out 22 sa-in 100022 add
exec set interface ip address loop0 100.0.23.1/32
exec create ipip tunnel src 100.0.23.1 dst 200.0.0.102 p2p
exec ipsec sa add 23 spi 100023 crypto-alg aes-cbc-128 crypto-key 584565516b4f6c546a635a486f41584e integ-alg sha-512-256 integ-key 70736c5a59776a6470574a67714b7a54746553416e586661496c4d57646e484166596d6b636a64464c5457464a65777241444146517a50556c547179767a424d esp
exec ipsec sa add 100023 spi 200023 crypto-alg aes-cbc-128 crypto-key 584565516b4f6c546a635a486f41584e integ-alg sha-512-256 integ-key 70736c5a59776a6470574a67714b7a54746553416e586661496c4d57646e484166596d6b636a64464c5457464a65777241444146517a50556c547179767a424d esp
exec ipsec tunnel protect ipip23 sa-out 23 sa-in 100023 add
exec set interface ip address loop0 100.0.24.1/32
exec create ipip tunnel src 100.0.24.1 dst 200.0.0.102 p2p
exec ipsec sa add 24 spi 100024 crypto-alg aes-cbc-128 crypto-key 587367456842754a72705a716d43654c integ-alg sha-512-256 integ-key 42686f636a527a66774342466e4f596f65716a63684a784b44544a4e56436a4a6b71776c577452667064526d4f746d674a58786b5a644553664478576a724270 esp
exec ipsec sa add 100024 spi 200024 crypto-alg aes-cbc-128 crypto-key 587367456842754a72705a716d43654c integ-alg sha-512-256 integ-key 42686f636a527a66774342466e4f596f65716a63684a784b44544a4e56436a4a6b71776c577452667064526d4f746d674a58786b5a644553664478576a724270 esp
exec ipsec tunnel protect ipip24 sa-out 24 sa-in 100024 add
exec set interface ip address loop0 100.0.25.1/32
exec create ipip tunnel src 100.0.25.1 dst 200.0.0.102 p2p
exec ipsec sa add 25 spi 100025 crypto-alg aes-cbc-128 crypto-key 7248654149536d4b6950446a6e644843 integ-alg sha-512-256 integ-key 7656554b7a596c7570536d565a625944534e524f6c4c61575354464753504d4b6d624a784b43485854654550556a736d577a4e5456516d424757777344424458 esp
exec ipsec sa add 100025 spi 200025 crypto-alg aes-cbc-128 crypto-key 7248654149536d4b6950446a6e644843 integ-alg sha-512-256 integ-key 7656554b7a596c7570536d565a625944534e524f6c4c61575354464753504d4b6d624a784b43485854654550556a736d577a4e5456516d424757777344424458 esp
exec ipsec tunnel protect ipip25 sa-out 25 sa-in 100025 add
exec set interface ip address loop0 100.0.26.1/32
exec create ipip tunnel src 100.0.26.1 dst 200.0.0.102 p2p
exec ipsec sa add 26 spi 100026 crypto-alg aes-cbc-128 crypto-key 5a707247687173624b49666a69627776 integ-alg sha-512-256 integ-key 7261624b4b78594e6e6641506d6d4a49554e4875687171416d4d7a557177796d546d7948664358584776786f647773577a756e437661787742454f6c777a4279 esp
exec ipsec sa add 100026 spi 200026 crypto-alg aes-cbc-128 crypto-key 5a707247687173624b49666a69627776 integ-alg sha-512-256 integ-key 7261624b4b78594e6e6641506d6d4a49554e4875687171416d4d7a557177796d546d7948664358584776786f647773577a756e437661787742454f6c777a4279 esp
exec ipsec tunnel protect ipip26 sa-out 26 sa-in 100026 add
exec set interface ip address loop0 100.0.27.1/32
exec create ipip tunnel src 100.0.27.1 dst 200.0.0.102 p2p
exec ipsec sa add 27 spi 100027 crypto-alg aes-cbc-128 crypto-key 50665448567547694b426a734b694466 integ-alg sha-512-256 integ-key 785a524872457256444d54447a70414b635743786d556a5a527651744f506f6f4b75616b725179544377517455545151474642794664457478585a4275794965 esp
exec ipsec sa add 100027 spi 200027 crypto-alg aes-cbc-128 crypto-key 50665448567547694b426a734b694466 integ-alg sha-512-256 integ-key 785a524872457256444d54447a70414b635743786d556a5a527651744f506f6f4b75616b725179544377517455545151474642794664457478585a4275794965 esp
exec ipsec tunnel protect ipip27 sa-out 27 sa-in 100027 add
exec set interface ip address loop0 100.0.28.1/32
exec create ipip tunnel src 100.0.28.1 dst 200.0.0.102 p2p
exec ipsec sa add 28 spi 100028 crypto-alg aes-cbc-128 crypto-key 49475561674b7666434a6c4e72777948 integ-alg sha-512-256 integ-key 7276506956534b6646756865614e6b4b4f5949697862434e51706c666d544d6a416c515066544c6c6e476654486e515a56656d757455464c5171726b546f586d esp
exec ipsec sa add 100028 spi 200028 crypto-alg aes-cbc-128 crypto-key 49475561674b7666434a6c4e72777948 integ-alg sha-512-256 integ-key 7276506956534b6646756865614e6b4b4f5949697862434e51706c666d544d6a416c515066544c6c6e476654486e515a56656d757455464c5171726b546f586d esp
exec ipsec tunnel protect ipip28 sa-out 28 sa-in 100028 add
exec set interface ip address loop0 100.0.29.1/32
exec create ipip tunnel src 100.0.29.1 dst 200.0.0.102 p2p
exec ipsec sa add 29 spi 100029 crypto-alg aes-cbc-128 crypto-key 4e7a68715659764843524a794f4e7567 integ-alg sha-512-256 integ-key 545a67697a6242596663517059524c4f64794f6f7657566e4177756e4a494d5a627265574d706e664456414248655857557550545351734d696d794d4d594a47 esp
exec ipsec sa add 100029 spi 200029 crypto-alg aes-cbc-128 crypto-key 4e7a68715659764843524a794f4e7567 integ-alg sha-512-256 integ-key 545a67697a6242596663517059524c4f64794f6f7657566e4177756e4a494d5a627265574d706e664456414248655857557550545351734d696d794d4d594a47 esp
exec ipsec tunnel protect ipip29 sa-out 29 sa-in 100029 add
exec set interface ip address loop0 100.0.30.1/32
exec create ipip tunnel src 100.0.30.1 dst 200.0.0.102 p2p
exec ipsec sa add 30 spi 100030 crypto-alg aes-cbc-128 crypto-key 5766426d757058765662474279627353 integ-alg sha-512-256 integ-key 59575053684354446f537772547a7943714b69424879644f6675695361436d4f5062744f417748554e59516e555161516459486c484c45734c73635153686d47 esp
exec ipsec sa add 100030 spi 200030 crypto-alg aes-cbc-128 crypto-key 5766426d757058765662474279627353 integ-alg sha-512-256 integ-key 59575053684354446f537772547a7943714b69424879644f6675695361436d4f5062744f417748554e59516e555161516459486c484c45734c73635153686d47 esp
exec ipsec tunnel protect ipip30 sa-out 30 sa-in 100030 add
exec set interface ip address loop0 100.0.31.1/32
exec create ipip tunnel src 100.0.31.1 dst 200.0.0.102 p2p
exec ipsec sa add 31 spi 100031 crypto-alg aes-cbc-128 crypto-key 4e625569734b785170464168594d6150 integ-alg sha-512-256 integ-key 6b4c4e65776d767a47654b4858724370614d4a587962587a626d4264717052667961664475744874557a4e74504d4e47466f4f7a7a5a66686761584d52727359 esp
exec ipsec sa add 100031 spi 200031 crypto-alg aes-cbc-128 crypto-key 4e625569734b785170464168594d6150 integ-alg sha-512-256 integ-key 6b4c4e65776d767a47654b4858724370614d4a587962587a626d4264717052667961664475744874557a4e74504d4e47466f4f7a7a5a66686761584d52727359 esp
exec ipsec tunnel protect ipip31 sa-out 31 sa-in 100031 add
exec set interface ip address loop0 100.0.32.1/32
exec create ipip tunnel src 100.0.32.1 dst 200.0.0.102 p2p
exec ipsec sa add 32 spi 100032 crypto-alg aes-cbc-128 crypto-key 556e765a4a4c43546465717268725854 integ-alg sha-512-256 integ-key 6b64696446485356634768784664416d766947754a664c5872584b635a4c6552534e70625173434e77464f4c47664f7268575749645251456b52714d69684b75 esp
exec ipsec sa add 100032 spi 200032 crypto-alg aes-cbc-128 crypto-key 556e765a4a4c43546465717268725854 integ-alg sha-512-256 integ-key 6b64696446485356634768784664416d766947754a664c5872584b635a4c6552534e70625173434e77464f4c47664f7268575749645251456b52714d69684b75 esp
exec ipsec tunnel protect ipip32 sa-out 32 sa-in 100032 add
exec set interface ip address loop0 100.0.33.1/32
exec create ipip tunnel src 100.0.33.1 dst 200.0.0.102 p2p
exec ipsec sa add 33 spi 100033 crypto-alg aes-cbc-128 crypto-key 6f655376745859624e6a78436f696b6c integ-alg sha-512-256 integ-key 464355485153736d6f65486d4d7379765678554174446a587370564771655866516474644f6f577a4c6a6345785147616f654458504e4a58486d5762756e544a esp
exec ipsec sa add 100033 spi 200033 crypto-alg aes-cbc-128 crypto-key 6f655376745859624e6a78436f696b6c integ-alg sha-512-256 integ-key 464355485153736d6f65486d4d7379765678554174446a587370564771655866516474644f6f577a4c6a6345785147616f654458504e4a58486d5762756e544a esp
exec ipsec tunnel protect ipip33 sa-out 33 sa-in 100033 add
exec set interface ip address loop0 100.0.34.1/32
exec create ipip tunnel src 100.0.34.1 dst 200.0.0.102 p2p
exec ipsec sa add 34 spi 100034 crypto-alg aes-cbc-128 crypto-key 64674f784b7179635268446b6c4b556c integ-alg sha-512-256 integ-key 415a4d546f5a4a49736c7274664d46777676637654686c6576694b4f66614e477a59586e72657354586d56427945426551554a4d786b68614547444d435a7641 esp
exec ipsec sa add 100034 spi 200034 crypto-alg aes-cbc-128 crypto-key 64674f784b7179635268446b6c4b556c integ-alg sha-512-256 integ-key 415a4d546f5a4a49736c7274664d46777676637654686c6576694b4f66614e477a59586e72657354586d56427945426551554a4d786b68614547444d435a7641 esp
exec ipsec tunnel protect ipip34 sa-out 34 sa-in 100034 add
exec set interface ip address loop0 100.0.35.1/32
exec create ipip tunnel src 100.0.35.1 dst 200.0.0.102 p2p
exec ipsec sa add 35 spi 100035 crypto-alg aes-cbc-128 crypto-key 6b68654841446744784143636a4a6a44 integ-alg sha-512-256 integ-key 6a597650597153534e544b4c54427976586367514a4479757173444b45616d73796257435257414f626a6f6b4553524272767959644e6b74645955475364484f esp
exec ipsec sa add 100035 spi 200035 crypto-alg aes-cbc-128 crypto-key 6b68654841446744784143636a4a6a44 integ-alg sha-512-256 integ-key 6a597650597153534e544b4c54427976586367514a4479757173444b45616d73796257435257414f626a6f6b4553524272767959644e6b74645955475364484f esp
exec ipsec tunnel protect ipip35 sa-out 35 sa-in 100035 add
exec set interface ip address loop0 100.0.36.1/32
exec create ipip tunnel src 100.0.36.1 dst 200.0.0.102 p2p
exec ipsec sa add 36 spi 100036 crypto-alg aes-cbc-128 crypto-key 6f487179684656466a4f4449704b4c62 integ-alg sha-512-256 integ-key 734e796c4b7052776c515a744b507a6a4d72534845694e4b4a6a59477166627652486677754e67644e67574e4c77445a777046727742646c6b5355506c79736e esp
exec ipsec sa add 100036 spi 200036 crypto-alg aes-cbc-128 crypto-key 6f487179684656466a4f4449704b4c62 integ-alg sha-512-256 integ-key 734e796c4b7052776c515a744b507a6a4d72534845694e4b4a6a59477166627652486677754e67644e67574e4c77445a777046727742646c6b5355506c79736e esp
exec ipsec tunnel protect ipip36 sa-out 36 sa-in 100036 add
exec set interface ip address loop0 100.0.37.1/32
exec create ipip tunnel src 100.0.37.1 dst 200.0.0.102 p2p
exec ipsec sa add 37 spi 100037 crypto-alg aes-cbc-128 crypto-key 7970457576774e4e574556736b476741 integ-alg sha-512-256 integ-key 567563516c786e6846724f636d57617861757a63626f5959437376505653416b6872715662676a6b646452746c6a536258566174705a634f72667150496d4254 esp
exec ipsec sa add 100037 spi 200037 crypto-alg aes-cbc-128 crypto-key 7970457576774e4e574556736b476741 integ-alg sha-512-256 integ-key 567563516c786e6846724f636d57617861757a63626f5959437376505653416b6872715662676a6b646452746c6a536258566174705a634f72667150496d4254 esp
exec ipsec tunnel protect ipip37 sa-out 37 sa-in 100037 add
exec set interface ip address loop0 100.0.38.1/32
exec create ipip tunnel src 100.0.38.1 dst 200.0.0.102 p2p
exec ipsec sa add 38 spi 100038 crypto-alg aes-cbc-128 crypto-key 764c4d64436352764d74644e52646571 integ-alg sha-512-256 integ-key 7558446f75625a4d6469567953534c4c4a69536553584263656a445468765a416d6a674e5a667078625a6a615746505672776f4f765a57704458635673484f62 esp
exec ipsec sa add 100038 spi 200038 crypto-alg aes-cbc-128 crypto-key 764c4d64436352764d74644e52646571 integ-alg sha-512-256 integ-key 7558446f75625a4d6469567953534c4c4a69536553584263656a445468765a416d6a674e5a667078625a6a615746505672776f4f765a57704458635673484f62 esp
exec ipsec tunnel protect ipip38 sa-out 38 sa-in 100038 add
exec set interface ip address loop0 100.0.39.1/32
exec create ipip tunnel src 100.0.39.1 dst 200.0.0.102 p2p
exec ipsec sa add 39 spi 100039 crypto-alg aes-cbc-128 crypto-key 496662765545425050706b4b4c425651 integ-alg sha-512-256 integ-key 41587574666c4c66436a756b636452584d796f4462427779616b435a514a53647a6b4e6c586e7758736a5648586b7867676c6a725443586e69536b7665484e70 esp
exec ipsec sa add 100039 spi 200039 crypto-alg aes-cbc-128 crypto-key 496662765545425050706b4b4c425651 integ-alg sha-512-256 integ-key 41587574666c4c66436a756b636452584d796f4462427779616b435a514a53647a6b4e6c586e7758736a5648586b7867676c6a725443586e69536b7665484e70 esp
exec ipsec tunnel protect ipip39 sa-out 39 sa-in 100039 add
exec set interface unnumbered ipip0 use TenGigabitEthernet8/0/0
exec set interface state ipip0 up
exec ip route add 20.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use TenGigabitEthernet8/0/0
exec set interface state ipip1 up
exec ip route add 20.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use TenGigabitEthernet8/0/0
exec set interface state ipip2 up
exec ip route add 20.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use TenGigabitEthernet8/0/0
exec set interface state ipip3 up
exec ip route add 20.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use TenGigabitEthernet8/0/0
exec set interface state ipip4 up
exec ip route add 20.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use TenGigabitEthernet8/0/0
exec set interface state ipip5 up
exec ip route add 20.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use TenGigabitEthernet8/0/0
exec set interface state ipip6 up
exec ip route add 20.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use TenGigabitEthernet8/0/0
exec set interface state ipip7 up
exec ip route add 20.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use TenGigabitEthernet8/0/0
exec set interface state ipip8 up
exec ip route add 20.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use TenGigabitEthernet8/0/0
exec set interface state ipip9 up
exec ip route add 20.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use TenGigabitEthernet8/0/0
exec set interface state ipip10 up
exec ip route add 20.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use TenGigabitEthernet8/0/0
exec set interface state ipip11 up
exec ip route add 20.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use TenGigabitEthernet8/0/0
exec set interface state ipip12 up
exec ip route add 20.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use TenGigabitEthernet8/0/0
exec set interface state ipip13 up
exec ip route add 20.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use TenGigabitEthernet8/0/0
exec set interface state ipip14 up
exec ip route add 20.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use TenGigabitEthernet8/0/0
exec set interface state ipip15 up
exec ip route add 20.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use TenGigabitEthernet8/0/0
exec set interface state ipip16 up
exec ip route add 20.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use TenGigabitEthernet8/0/0
exec set interface state ipip17 up
exec ip route add 20.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use TenGigabitEthernet8/0/0
exec set interface state ipip18 up
exec ip route add 20.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use TenGigabitEthernet8/0/0
exec set interface state ipip19 up
exec ip route add 20.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use TenGigabitEthernet8/0/0
exec set interface state ipip20 up
exec ip route add 20.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use TenGigabitEthernet8/0/0
exec set interface state ipip21 up
exec ip route add 20.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use TenGigabitEthernet8/0/0
exec set interface state ipip22 up
exec ip route add 20.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use TenGigabitEthernet8/0/0
exec set interface state ipip23 up
exec ip route add 20.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use TenGigabitEthernet8/0/0
exec set interface state ipip24 up
exec ip route add 20.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use TenGigabitEthernet8/0/0
exec set interface state ipip25 up
exec ip route add 20.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use TenGigabitEthernet8/0/0
exec set interface state ipip26 up
exec ip route add 20.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use TenGigabitEthernet8/0/0
exec set interface state ipip27 up
exec ip route add 20.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use TenGigabitEthernet8/0/0
exec set interface state ipip28 up
exec ip route add 20.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use TenGigabitEthernet8/0/0
exec set interface state ipip29 up
exec ip route add 20.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use TenGigabitEthernet8/0/0
exec set interface state ipip30 up
exec ip route add 20.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use TenGigabitEthernet8/0/0
exec set interface state ipip31 up
exec ip route add 20.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use TenGigabitEthernet8/0/0
exec set interface state ipip32 up
exec ip route add 20.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use TenGigabitEthernet8/0/0
exec set interface state ipip33 up
exec ip route add 20.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use TenGigabitEthernet8/0/0
exec set interface state ipip34 up
exec ip route add 20.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use TenGigabitEthernet8/0/0
exec set interface state ipip35 up
exec ip route add 20.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use TenGigabitEthernet8/0/0
exec set interface state ipip36 up
exec ip route add 20.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use TenGigabitEthernet8/0/0
exec set interface state ipip37 up
exec ip route add 20.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use TenGigabitEthernet8/0/0
exec set interface state ipip38 up
exec ip route add 20.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use TenGigabitEthernet8/0/0
exec set interface state ipip39 up
exec ip route add 20.0.0.39/32 via ipip39
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec set interface ip address TenGigabitEthernet8/0/0 200.0.0.102/24.0
exec create ipip tunnel src 200.0.0.102 dst 100.0.0.1 p2p
exec ipsec sa add 100000 spi 200000 crypto-alg aes-cbc-128 crypto-key 64634b7869776f565078435063596566 integ-alg sha-512-256 integ-key 516279454f46706f59554a784a675947467a53757178534a474d4a76705a6b6b465875566a457a7352614b4a515a7a58774e545655507968504d53754b586758 esp
exec ipsec sa add 0 spi 100000 crypto-alg aes-cbc-128 crypto-key 64634b7869776f565078435063596566 integ-alg sha-512-256 integ-key 516279454f46706f59554a784a675947467a53757178534a474d4a76705a6b6b465875566a457a7352614b4a515a7a58774e545655507968504d53754b586758 esp
exec ipsec tunnel protect ipip0 sa-out 100000 sa-in 0 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.1.1 p2p
exec ipsec sa add 100001 spi 200001 crypto-alg aes-cbc-128 crypto-key 415447434f50696b505a79516a76716b integ-alg sha-512-256 integ-key 71416f4a62736a79594c6e4e6d5a546d45695674744d4e4a6d4856785657626f6854424244614b53695766754d634664626b694e5066616c67686e494461637a esp
exec ipsec sa add 1 spi 100001 crypto-alg aes-cbc-128 crypto-key 415447434f50696b505a79516a76716b integ-alg sha-512-256 integ-key 71416f4a62736a79594c6e4e6d5a546d45695674744d4e4a6d4856785657626f6854424244614b53695766754d634664626b694e5066616c67686e494461637a esp
exec ipsec tunnel protect ipip1 sa-out 100001 sa-in 1 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.2.1 p2p
exec ipsec sa add 100002 spi 200002 crypto-alg aes-cbc-128 crypto-key 446c694c654e4462726e48516f65756e integ-alg sha-512-256 integ-key 6245566c5578577175436942576b436c6655577559434a4b7556616e594c6b6f6d61796b5678694877526a704749424d6a48586e62474573436b686167547577 esp
exec ipsec sa add 2 spi 100002 crypto-alg aes-cbc-128 crypto-key 446c694c654e4462726e48516f65756e integ-alg sha-512-256 integ-key 6245566c5578577175436942576b436c6655577559434a4b7556616e594c6b6f6d61796b5678694877526a704749424d6a48586e62474573436b686167547577 esp
exec ipsec tunnel protect ipip2 sa-out 100002 sa-in 2 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.3.1 p2p
exec ipsec sa add 100003 spi 200003 crypto-alg aes-cbc-128 crypto-key 6d67534c6b7673477341516a5468566c integ-alg sha-512-256 integ-key 6b72666a594e41785963654855635368797375776669484e674b4a614a67774559657a737948584a616a474556785267435374657861514247475751796e6d58 esp
exec ipsec sa add 3 spi 100003 crypto-alg aes-cbc-128 crypto-key 6d67534c6b7673477341516a5468566c integ-alg sha-512-256 integ-key 6b72666a594e41785963654855635368797375776669484e674b4a614a67774559657a737948584a616a474556785267435374657861514247475751796e6d58 esp
exec ipsec tunnel protect ipip3 sa-out 100003 sa-in 3 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.4.1 p2p
exec ipsec sa add 100004 spi 200004 crypto-alg aes-cbc-128 crypto-key 745465786a64524d6a4a726f7755694c integ-alg sha-512-256 integ-key 52644c51645475754e615a7371656e4e6c556c7a69644f636a766b5a4b6b4d7059496875776e6a54516b4b5454786d55506c58587173626c56486a6e70504c6c esp
exec ipsec sa add 4 spi 100004 crypto-alg aes-cbc-128 crypto-key 745465786a64524d6a4a726f7755694c integ-alg sha-512-256 integ-key 52644c51645475754e615a7371656e4e6c556c7a69644f636a766b5a4b6b4d7059496875776e6a54516b4b5454786d55506c58587173626c56486a6e70504c6c esp
exec ipsec tunnel protect ipip4 sa-out 100004 sa-in 4 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.5.1 p2p
exec ipsec sa add 100005 spi 200005 crypto-alg aes-cbc-128 crypto-key 555a5369794a77596c6d5262616b4f42 integ-alg sha-512-256 integ-key 594e6b476e6f67614f49795a5673526373704344434474484d6f585a6947536e56674d575248766a6362506b7875664868425146526b72786d4f4f7a43585a56 esp
exec ipsec sa add 5 spi 100005 crypto-alg aes-cbc-128 crypto-key 555a5369794a77596c6d5262616b4f42 integ-alg sha-512-256 integ-key 594e6b476e6f67614f49795a5673526373704344434474484d6f585a6947536e56674d575248766a6362506b7875664868425146526b72786d4f4f7a43585a56 esp
exec ipsec tunnel protect ipip5 sa-out 100005 sa-in 5 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.6.1 p2p
exec ipsec sa add 100006 spi 200006 crypto-alg aes-cbc-128 crypto-key 536d62597a72726945527457476b6e6c integ-alg sha-512-256 integ-key 4d525a6c4a4a736b78774e557858435268457357554441587a6443786851684852784e54484454566e51766c4277686b4463416d6c784d534e78615677677650 esp
exec ipsec sa add 6 spi 100006 crypto-alg aes-cbc-128 crypto-key 536d62597a72726945527457476b6e6c integ-alg sha-512-256 integ-key 4d525a6c4a4a736b78774e557858435268457357554441587a6443786851684852784e54484454566e51766c4277686b4463416d6c784d534e78615677677650 esp
exec ipsec tunnel protect ipip6 sa-out 100006 sa-in 6 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.7.1 p2p
exec ipsec sa add 100007 spi 200007 crypto-alg aes-cbc-128 crypto-key 4b7150786b4c6479464257646b4d6e72 integ-alg sha-512-256 integ-key 554a724473666778797a4c644958426b7a735a7654764261444177466f796a44436578734a506672575754414d4267454c43576f4b4e6b675679695067574970 esp
exec ipsec sa add 7 spi 100007 crypto-alg aes-cbc-128 crypto-key 4b7150786b4c6479464257646b4d6e72 integ-alg sha-512-256 integ-key 554a724473666778797a4c644958426b7a735a7654764261444177466f796a44436578734a506672575754414d4267454c43576f4b4e6b675679695067574970 esp
exec ipsec tunnel protect ipip7 sa-out 100007 sa-in 7 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.8.1 p2p
exec ipsec sa add 100008 spi 200008 crypto-alg aes-cbc-128 crypto-key 4d5875716952746a57554650495a4b73 integ-alg sha-512-256 integ-key 4c45694b746b6f4e6b64704947736a4e5061414d716c6e67556b7567526e6345447073726a4c59776f57504e486f566370696d7144614e566462644869786473 esp
exec ipsec sa add 8 spi 100008 crypto-alg aes-cbc-128 crypto-key 4d5875716952746a57554650495a4b73 integ-alg sha-512-256 integ-key 4c45694b746b6f4e6b64704947736a4e5061414d716c6e67556b7567526e6345447073726a4c59776f57504e486f566370696d7144614e566462644869786473 esp
exec ipsec tunnel protect ipip8 sa-out 100008 sa-in 8 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.9.1 p2p
exec ipsec sa add 100009 spi 200009 crypto-alg aes-cbc-128 crypto-key 74646858765a59626563474f75565370 integ-alg sha-512-256 integ-key 626a547868514b59454e634273516d547677655662595a4d765569646f4a4f51674b54727778427157795a5941626c654a575a75514d624a7575484548714c49 esp
exec ipsec sa add 9 spi 100009 crypto-alg aes-cbc-128 crypto-key 74646858765a59626563474f75565370 integ-alg sha-512-256 integ-key 626a547868514b59454e634273516d547677655662595a4d765569646f4a4f51674b54727778427157795a5941626c654a575a75514d624a7575484548714c49 esp
exec ipsec tunnel protect ipip9 sa-out 100009 sa-in 9 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.10.1 p2p
exec ipsec sa add 100010 spi 200010 crypto-alg aes-cbc-128 crypto-key 7273585275744d674c45766156545764 integ-alg sha-512-256 integ-key 42577a657a476b416f4471616d6f4f6d7258687048415270616c5479587265695177744842747257444f7a577a6e734667446d5842585a6458507a6552534c48 esp
exec ipsec sa add 10 spi 100010 crypto-alg aes-cbc-128 crypto-key 7273585275744d674c45766156545764 integ-alg sha-512-256 integ-key 42577a657a476b416f4471616d6f4f6d7258687048415270616c5479587265695177744842747257444f7a577a6e734667446d5842585a6458507a6552534c48 esp
exec ipsec tunnel protect ipip10 sa-out 100010 sa-in 10 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.11.1 p2p
exec ipsec sa add 100011 spi 200011 crypto-alg aes-cbc-128 crypto-key 57444a71694346797846576e71574876 integ-alg sha-512-256 integ-key 695956496861547a5272525a42664c525974676f4869496a6b5572796a4c434b6e6d436f77564a6f4e4a70485a6c7277514d686b7a7441486d426d6365754f41 esp
exec ipsec sa add 11 spi 100011 crypto-alg aes-cbc-128 crypto-key 57444a71694346797846576e71574876 integ-alg sha-512-256 integ-key 695956496861547a5272525a42664c525974676f4869496a6b5572796a4c434b6e6d436f77564a6f4e4a70485a6c7277514d686b7a7441486d426d6365754f41 esp
exec ipsec tunnel protect ipip11 sa-out 100011 sa-in 11 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.12.1 p2p
exec ipsec sa add 100012 spi 200012 crypto-alg aes-cbc-128 crypto-key 736252786151555071774a4e75624c72 integ-alg sha-512-256 integ-key 45777655677577707853517743535561427a524352674344754876687559616f4f6a797644486b7470496a7366774375427978416f4b44786d77744b4a566454 esp
exec ipsec sa add 12 spi 100012 crypto-alg aes-cbc-128 crypto-key 736252786151555071774a4e75624c72 integ-alg sha-512-256 integ-key 45777655677577707853517743535561427a524352674344754876687559616f4f6a797644486b7470496a7366774375427978416f4b44786d77744b4a566454 esp
exec ipsec tunnel protect ipip12 sa-out 100012 sa-in 12 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.13.1 p2p
exec ipsec sa add 100013 spi 200013 crypto-alg aes-cbc-128 crypto-key 476f5247576b654d43566144537a656f integ-alg sha-512-256 integ-key 524778786e436e50444358506d47636e794d6e7a4d41666a754c685066546c514b6b63464d766876434b7a495552747376425a544e415879744965655879595a esp
exec ipsec sa add 13 spi 100013 crypto-alg aes-cbc-128 crypto-key 476f5247576b654d43566144537a656f integ-alg sha-512-256 integ-key 524778786e436e50444358506d47636e794d6e7a4d41666a754c685066546c514b6b63464d766876434b7a495552747376425a544e415879744965655879595a esp
exec ipsec tunnel protect ipip13 sa-out 100013 sa-in 13 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.14.1 p2p
exec ipsec sa add 100014 spi 200014 crypto-alg aes-cbc-128 crypto-key 5974436b4d595a7148754362767a4f46 integ-alg sha-512-256 integ-key 706c7857504e4368647357556b4d445341444c486d65457363534a524e4e477a627a7877626e6241687a737a4c485945776468747252506b7a6744674e756758 esp
exec ipsec sa add 14 spi 100014 crypto-alg aes-cbc-128 crypto-key 5974436b4d595a7148754362767a4f46 integ-alg sha-512-256 integ-key 706c7857504e4368647357556b4d445341444c486d65457363534a524e4e477a627a7877626e6241687a737a4c485945776468747252506b7a6744674e756758 esp
exec ipsec tunnel protect ipip14 sa-out 100014 sa-in 14 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.15.1 p2p
exec ipsec sa add 100015 spi 200015 crypto-alg aes-cbc-128 crypto-key 774d494a5447576c7a4178796b4e676b integ-alg sha-512-256 integ-key 6558544e74444b786a6c4e5755625749454873636c4753456e6d67717665494b6f59634d67495a77414368517268726f614e506b49794759784f4b686e6a6846 esp
exec ipsec sa add 15 spi 100015 crypto-alg aes-cbc-128 crypto-key 774d494a5447576c7a4178796b4e676b integ-alg sha-512-256 integ-key 6558544e74444b786a6c4e5755625749454873636c4753456e6d67717665494b6f59634d67495a77414368517268726f614e506b49794759784f4b686e6a6846 esp
exec ipsec tunnel protect ipip15 sa-out 100015 sa-in 15 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.16.1 p2p
exec ipsec sa add 100016 spi 200016 crypto-alg aes-cbc-128 crypto-key 616d4d79686f417656436c7773597352 integ-alg sha-512-256 integ-key 444c587a484c704a414b55694c524f4163736d7a534168664e746b4c64694b466173616266616c5254524d4475476f6270596c5a564e5167724e696e486b7556 esp
exec ipsec sa add 16 spi 100016 crypto-alg aes-cbc-128 crypto-key 616d4d79686f417656436c7773597352 integ-alg sha-512-256 integ-key 444c587a484c704a414b55694c524f4163736d7a534168664e746b4c64694b466173616266616c5254524d4475476f6270596c5a564e5167724e696e486b7556 esp
exec ipsec tunnel protect ipip16 sa-out 100016 sa-in 16 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.17.1 p2p
exec ipsec sa add 100017 spi 200017 crypto-alg aes-cbc-128 crypto-key 7677786e574a5372654b50795753797a integ-alg sha-512-256 integ-key 7a4561467675435366635a50674442495651787041725862704648777153564374414f4e6972686f4e767047576350425853474b65704d4b4552456e64774457 esp
exec ipsec sa add 17 spi 100017 crypto-alg aes-cbc-128 crypto-key 7677786e574a5372654b50795753797a integ-alg sha-512-256 integ-key 7a4561467675435366635a50674442495651787041725862704648777153564374414f4e6972686f4e767047576350425853474b65704d4b4552456e64774457 esp
exec ipsec tunnel protect ipip17 sa-out 100017 sa-in 17 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.18.1 p2p
exec ipsec sa add 100018 spi 200018 crypto-alg aes-cbc-128 crypto-key 4d71636d4a6b656e524f7653436b724b integ-alg sha-512-256 integ-key 6770585150516677694f766e5278575a5469454d6c75636f6262514b6370494f696b4a65494d5366714c4d78744e595375774c616c4949747757626443536a42 esp
exec ipsec sa add 18 spi 100018 crypto-alg aes-cbc-128 crypto-key 4d71636d4a6b656e524f7653436b724b integ-alg sha-512-256 integ-key 6770585150516677694f766e5278575a5469454d6c75636f6262514b6370494f696b4a65494d5366714c4d78744e595375774c616c4949747757626443536a42 esp
exec ipsec tunnel protect ipip18 sa-out 100018 sa-in 18 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.19.1 p2p
exec ipsec sa add 100019 spi 200019 crypto-alg aes-cbc-128 crypto-key 644f4b6a7a5046724f4e774957735a73 integ-alg sha-512-256 integ-key 6a7451576a64507a69644873644541595942626b536f42666a57586f6e744e646f7651656d6645554448644651636175634966537548556c5147564e6e6f4841 esp
exec ipsec sa add 19 spi 100019 crypto-alg aes-cbc-128 crypto-key 644f4b6a7a5046724f4e774957735a73 integ-alg sha-512-256 integ-key 6a7451576a64507a69644873644541595942626b536f42666a57586f6e744e646f7651656d6645554448644651636175634966537548556c5147564e6e6f4841 esp
exec ipsec tunnel protect ipip19 sa-out 100019 sa-in 19 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.20.1 p2p
exec ipsec sa add 100020 spi 200020 crypto-alg aes-cbc-128 crypto-key 5876434a5a6678594369486869584f75 integ-alg sha-512-256 integ-key 6969634f686476614e4e75704e435069664645576644644e665444796448556c6f4163716b46776e437a746c4e6f4f776e4e527a716849415954655651706b75 esp
exec ipsec sa add 20 spi 100020 crypto-alg aes-cbc-128 crypto-key 5876434a5a6678594369486869584f75 integ-alg sha-512-256 integ-key 6969634f686476614e4e75704e435069664645576644644e665444796448556c6f4163716b46776e437a746c4e6f4f776e4e527a716849415954655651706b75 esp
exec ipsec tunnel protect ipip20 sa-out 100020 sa-in 20 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.21.1 p2p
exec ipsec sa add 100021 spi 200021 crypto-alg aes-cbc-128 crypto-key 536a466356495342647642704241716a integ-alg sha-512-256 integ-key 497641796b5743517a42704d4e726d6d61727765657167726178645453686f56784755644354516675634e6e7756786f6657756361676a464d746a544b424d4f esp
exec ipsec sa add 21 spi 100021 crypto-alg aes-cbc-128 crypto-key 536a466356495342647642704241716a integ-alg sha-512-256 integ-key 497641796b5743517a42704d4e726d6d61727765657167726178645453686f56784755644354516675634e6e7756786f6657756361676a464d746a544b424d4f esp
exec ipsec tunnel protect ipip21 sa-out 100021 sa-in 21 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.22.1 p2p
exec ipsec sa add 100022 spi 200022 crypto-alg aes-cbc-128 crypto-key 4246644d5169586b757a526e7442786a integ-alg sha-512-256 integ-key 4d6e4d454a61465873665179637175686b4d51587361785168477469675578485975774f794a6a576776647a617a65524e51474f735669426c5673524e754b4c esp
exec ipsec sa add 22 spi 100022 crypto-alg aes-cbc-128 crypto-key 4246644d5169586b757a526e7442786a integ-alg sha-512-256 integ-key 4d6e4d454a61465873665179637175686b4d51587361785168477469675578485975774f794a6a576776647a617a65524e51474f735669426c5673524e754b4c esp
exec ipsec tunnel protect ipip22 sa-out 100022 sa-in 22 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.23.1 p2p
exec ipsec sa add 100023 spi 200023 crypto-alg aes-cbc-128 crypto-key 584565516b4f6c546a635a486f41584e integ-alg sha-512-256 integ-key 70736c5a59776a6470574a67714b7a54746553416e586661496c4d57646e484166596d6b636a64464c5457464a65777241444146517a50556c547179767a424d esp
exec ipsec sa add 23 spi 100023 crypto-alg aes-cbc-128 crypto-key 584565516b4f6c546a635a486f41584e integ-alg sha-512-256 integ-key 70736c5a59776a6470574a67714b7a54746553416e586661496c4d57646e484166596d6b636a64464c5457464a65777241444146517a50556c547179767a424d esp
exec ipsec tunnel protect ipip23 sa-out 100023 sa-in 23 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.24.1 p2p
exec ipsec sa add 100024 spi 200024 crypto-alg aes-cbc-128 crypto-key 587367456842754a72705a716d43654c integ-alg sha-512-256 integ-key 42686f636a527a66774342466e4f596f65716a63684a784b44544a4e56436a4a6b71776c577452667064526d4f746d674a58786b5a644553664478576a724270 esp
exec ipsec sa add 24 spi 100024 crypto-alg aes-cbc-128 crypto-key 587367456842754a72705a716d43654c integ-alg sha-512-256 integ-key 42686f636a527a66774342466e4f596f65716a63684a784b44544a4e56436a4a6b71776c577452667064526d4f746d674a58786b5a644553664478576a724270 esp
exec ipsec tunnel protect ipip24 sa-out 100024 sa-in 24 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.25.1 p2p
exec ipsec sa add 100025 spi 200025 crypto-alg aes-cbc-128 crypto-key 7248654149536d4b6950446a6e644843 integ-alg sha-512-256 integ-key 7656554b7a596c7570536d565a625944534e524f6c4c61575354464753504d4b6d624a784b43485854654550556a736d577a4e5456516d424757777344424458 esp
exec ipsec sa add 25 spi 100025 crypto-alg aes-cbc-128 crypto-key 7248654149536d4b6950446a6e644843 integ-alg sha-512-256 integ-key 7656554b7a596c7570536d565a625944534e524f6c4c61575354464753504d4b6d624a784b43485854654550556a736d577a4e5456516d424757777344424458 esp
exec ipsec tunnel protect ipip25 sa-out 100025 sa-in 25 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.26.1 p2p
exec ipsec sa add 100026 spi 200026 crypto-alg aes-cbc-128 crypto-key 5a707247687173624b49666a69627776 integ-alg sha-512-256 integ-key 7261624b4b78594e6e6641506d6d4a49554e4875687171416d4d7a557177796d546d7948664358584776786f647773577a756e437661787742454f6c777a4279 esp
exec ipsec sa add 26 spi 100026 crypto-alg aes-cbc-128 crypto-key 5a707247687173624b49666a69627776 integ-alg sha-512-256 integ-key 7261624b4b78594e6e6641506d6d4a49554e4875687171416d4d7a557177796d546d7948664358584776786f647773577a756e437661787742454f6c777a4279 esp
exec ipsec tunnel protect ipip26 sa-out 100026 sa-in 26 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.27.1 p2p
exec ipsec sa add 100027 spi 200027 crypto-alg aes-cbc-128 crypto-key 50665448567547694b426a734b694466 integ-alg sha-512-256 integ-key 785a524872457256444d54447a70414b635743786d556a5a527651744f506f6f4b75616b725179544377517455545151474642794664457478585a4275794965 esp
exec ipsec sa add 27 spi 100027 crypto-alg aes-cbc-128 crypto-key 50665448567547694b426a734b694466 integ-alg sha-512-256 integ-key 785a524872457256444d54447a70414b635743786d556a5a527651744f506f6f4b75616b725179544377517455545151474642794664457478585a4275794965 esp
exec ipsec tunnel protect ipip27 sa-out 100027 sa-in 27 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.28.1 p2p
exec ipsec sa add 100028 spi 200028 crypto-alg aes-cbc-128 crypto-key 49475561674b7666434a6c4e72777948 integ-alg sha-512-256 integ-key 7276506956534b6646756865614e6b4b4f5949697862434e51706c666d544d6a416c515066544c6c6e476654486e515a56656d757455464c5171726b546f586d esp
exec ipsec sa add 28 spi 100028 crypto-alg aes-cbc-128 crypto-key 49475561674b7666434a6c4e72777948 integ-alg sha-512-256 integ-key 7276506956534b6646756865614e6b4b4f5949697862434e51706c666d544d6a416c515066544c6c6e476654486e515a56656d757455464c5171726b546f586d esp
exec ipsec tunnel protect ipip28 sa-out 100028 sa-in 28 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.29.1 p2p
exec ipsec sa add 100029 spi 200029 crypto-alg aes-cbc-128 crypto-key 4e7a68715659764843524a794f4e7567 integ-alg sha-512-256 integ-key 545a67697a6242596663517059524c4f64794f6f7657566e4177756e4a494d5a627265574d706e664456414248655857557550545351734d696d794d4d594a47 esp
exec ipsec sa add 29 spi 100029 crypto-alg aes-cbc-128 crypto-key 4e7a68715659764843524a794f4e7567 integ-alg sha-512-256 integ-key 545a67697a6242596663517059524c4f64794f6f7657566e4177756e4a494d5a627265574d706e664456414248655857557550545351734d696d794d4d594a47 esp
exec ipsec tunnel protect ipip29 sa-out 100029 sa-in 29 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.30.1 p2p
exec ipsec sa add 100030 spi 200030 crypto-alg aes-cbc-128 crypto-key 5766426d757058765662474279627353 integ-alg sha-512-256 integ-key 59575053684354446f537772547a7943714b69424879644f6675695361436d4f5062744f417748554e59516e555161516459486c484c45734c73635153686d47 esp
exec ipsec sa add 30 spi 100030 crypto-alg aes-cbc-128 crypto-key 5766426d757058765662474279627353 integ-alg sha-512-256 integ-key 59575053684354446f537772547a7943714b69424879644f6675695361436d4f5062744f417748554e59516e555161516459486c484c45734c73635153686d47 esp
exec ipsec tunnel protect ipip30 sa-out 100030 sa-in 30 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.31.1 p2p
exec ipsec sa add 100031 spi 200031 crypto-alg aes-cbc-128 crypto-key 4e625569734b785170464168594d6150 integ-alg sha-512-256 integ-key 6b4c4e65776d767a47654b4858724370614d4a587962587a626d4264717052667961664475744874557a4e74504d4e47466f4f7a7a5a66686761584d52727359 esp
exec ipsec sa add 31 spi 100031 crypto-alg aes-cbc-128 crypto-key 4e625569734b785170464168594d6150 integ-alg sha-512-256 integ-key 6b4c4e65776d767a47654b4858724370614d4a587962587a626d4264717052667961664475744874557a4e74504d4e47466f4f7a7a5a66686761584d52727359 esp
exec ipsec tunnel protect ipip31 sa-out 100031 sa-in 31 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.32.1 p2p
exec ipsec sa add 100032 spi 200032 crypto-alg aes-cbc-128 crypto-key 556e765a4a4c43546465717268725854 integ-alg sha-512-256 integ-key 6b64696446485356634768784664416d766947754a664c5872584b635a4c6552534e70625173434e77464f4c47664f7268575749645251456b52714d69684b75 esp
exec ipsec sa add 32 spi 100032 crypto-alg aes-cbc-128 crypto-key 556e765a4a4c43546465717268725854 integ-alg sha-512-256 integ-key 6b64696446485356634768784664416d766947754a664c5872584b635a4c6552534e70625173434e77464f4c47664f7268575749645251456b52714d69684b75 esp
exec ipsec tunnel protect ipip32 sa-out 100032 sa-in 32 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.33.1 p2p
exec ipsec sa add 100033 spi 200033 crypto-alg aes-cbc-128 crypto-key 6f655376745859624e6a78436f696b6c integ-alg sha-512-256 integ-key 464355485153736d6f65486d4d7379765678554174446a587370564771655866516474644f6f577a4c6a6345785147616f654458504e4a58486d5762756e544a esp
exec ipsec sa add 33 spi 100033 crypto-alg aes-cbc-128 crypto-key 6f655376745859624e6a78436f696b6c integ-alg sha-512-256 integ-key 464355485153736d6f65486d4d7379765678554174446a587370564771655866516474644f6f577a4c6a6345785147616f654458504e4a58486d5762756e544a esp
exec ipsec tunnel protect ipip33 sa-out 100033 sa-in 33 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.34.1 p2p
exec ipsec sa add 100034 spi 200034 crypto-alg aes-cbc-128 crypto-key 64674f784b7179635268446b6c4b556c integ-alg sha-512-256 integ-key 415a4d546f5a4a49736c7274664d46777676637654686c6576694b4f66614e477a59586e72657354586d56427945426551554a4d786b68614547444d435a7641 esp
exec ipsec sa add 34 spi 100034 crypto-alg aes-cbc-128 crypto-key 64674f784b7179635268446b6c4b556c integ-alg sha-512-256 integ-key 415a4d546f5a4a49736c7274664d46777676637654686c6576694b4f66614e477a59586e72657354586d56427945426551554a4d786b68614547444d435a7641 esp
exec ipsec tunnel protect ipip34 sa-out 100034 sa-in 34 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.35.1 p2p
exec ipsec sa add 100035 spi 200035 crypto-alg aes-cbc-128 crypto-key 6b68654841446744784143636a4a6a44 integ-alg sha-512-256 integ-key 6a597650597153534e544b4c54427976586367514a4479757173444b45616d73796257435257414f626a6f6b4553524272767959644e6b74645955475364484f esp
exec ipsec sa add 35 spi 100035 crypto-alg aes-cbc-128 crypto-key 6b68654841446744784143636a4a6a44 integ-alg sha-512-256 integ-key 6a597650597153534e544b4c54427976586367514a4479757173444b45616d73796257435257414f626a6f6b4553524272767959644e6b74645955475364484f esp
exec ipsec tunnel protect ipip35 sa-out 100035 sa-in 35 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.36.1 p2p
exec ipsec sa add 100036 spi 200036 crypto-alg aes-cbc-128 crypto-key 6f487179684656466a4f4449704b4c62 integ-alg sha-512-256 integ-key 734e796c4b7052776c515a744b507a6a4d72534845694e4b4a6a59477166627652486677754e67644e67574e4c77445a777046727742646c6b5355506c79736e esp
exec ipsec sa add 36 spi 100036 crypto-alg aes-cbc-128 crypto-key 6f487179684656466a4f4449704b4c62 integ-alg sha-512-256 integ-key 734e796c4b7052776c515a744b507a6a4d72534845694e4b4a6a59477166627652486677754e67644e67574e4c77445a777046727742646c6b5355506c79736e esp
exec ipsec tunnel protect ipip36 sa-out 100036 sa-in 36 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.37.1 p2p
exec ipsec sa add 100037 spi 200037 crypto-alg aes-cbc-128 crypto-key 7970457576774e4e574556736b476741 integ-alg sha-512-256 integ-key 567563516c786e6846724f636d57617861757a63626f5959437376505653416b6872715662676a6b646452746c6a536258566174705a634f72667150496d4254 esp
exec ipsec sa add 37 spi 100037 crypto-alg aes-cbc-128 crypto-key 7970457576774e4e574556736b476741 integ-alg sha-512-256 integ-key 567563516c786e6846724f636d57617861757a63626f5959437376505653416b6872715662676a6b646452746c6a536258566174705a634f72667150496d4254 esp
exec ipsec tunnel protect ipip37 sa-out 100037 sa-in 37 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.38.1 p2p
exec ipsec sa add 100038 spi 200038 crypto-alg aes-cbc-128 crypto-key 764c4d64436352764d74644e52646571 integ-alg sha-512-256 integ-key 7558446f75625a4d6469567953534c4c4a69536553584263656a445468765a416d6a674e5a667078625a6a615746505672776f4f765a57704458635673484f62 esp
exec ipsec sa add 38 spi 100038 crypto-alg aes-cbc-128 crypto-key 764c4d64436352764d74644e52646571 integ-alg sha-512-256 integ-key 7558446f75625a4d6469567953534c4c4a69536553584263656a445468765a416d6a674e5a667078625a6a615746505672776f4f765a57704458635673484f62 esp
exec ipsec tunnel protect ipip38 sa-out 100038 sa-in 38 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.39.1 p2p
exec ipsec sa add 100039 spi 200039 crypto-alg aes-cbc-128 crypto-key 496662765545425050706b4b4c425651 integ-alg sha-512-256 integ-key 41587574666c4c66436a756b636452584d796f4462427779616b435a514a53647a6b4e6c586e7758736a5648586b7867676c6a725443586e69536b7665484e70 esp
exec ipsec sa add 39 spi 100039 crypto-alg aes-cbc-128 crypto-key 496662765545425050706b4b4c425651 integ-alg sha-512-256 integ-key 41587574666c4c66436a756b636452584d796f4462427779616b435a514a53647a6b4e6c586e7758736a5648586b7867676c6a725443586e69536b7665484e70 esp
exec ipsec tunnel protect ipip39 sa-out 100039 sa-in 39 add
exec ip route add 100.0.0.1/8 via 200.0.0.101 TenGigabitEthernet8/0/0
exec set interface unnumbered ipip0 use TenGigabitEthernet8/0/0
exec set interface state ipip0 up
exec ip route add 10.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use TenGigabitEthernet8/0/0
exec set interface state ipip1 up
exec ip route add 10.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use TenGigabitEthernet8/0/0
exec set interface state ipip2 up
exec ip route add 10.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use TenGigabitEthernet8/0/0
exec set interface state ipip3 up
exec ip route add 10.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use TenGigabitEthernet8/0/0
exec set interface state ipip4 up
exec ip route add 10.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use TenGigabitEthernet8/0/0
exec set interface state ipip5 up
exec ip route add 10.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use TenGigabitEthernet8/0/0
exec set interface state ipip6 up
exec ip route add 10.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use TenGigabitEthernet8/0/0
exec set interface state ipip7 up
exec ip route add 10.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use TenGigabitEthernet8/0/0
exec set interface state ipip8 up
exec ip route add 10.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use TenGigabitEthernet8/0/0
exec set interface state ipip9 up
exec ip route add 10.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use TenGigabitEthernet8/0/0
exec set interface state ipip10 up
exec ip route add 10.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use TenGigabitEthernet8/0/0
exec set interface state ipip11 up
exec ip route add 10.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use TenGigabitEthernet8/0/0
exec set interface state ipip12 up
exec ip route add 10.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use TenGigabitEthernet8/0/0
exec set interface state ipip13 up
exec ip route add 10.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use TenGigabitEthernet8/0/0
exec set interface state ipip14 up
exec ip route add 10.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use TenGigabitEthernet8/0/0
exec set interface state ipip15 up
exec ip route add 10.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use TenGigabitEthernet8/0/0
exec set interface state ipip16 up
exec ip route add 10.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use TenGigabitEthernet8/0/0
exec set interface state ipip17 up
exec ip route add 10.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use TenGigabitEthernet8/0/0
exec set interface state ipip18 up
exec ip route add 10.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use TenGigabitEthernet8/0/0
exec set interface state ipip19 up
exec ip route add 10.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use TenGigabitEthernet8/0/0
exec set interface state ipip20 up
exec ip route add 10.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use TenGigabitEthernet8/0/0
exec set interface state ipip21 up
exec ip route add 10.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use TenGigabitEthernet8/0/0
exec set interface state ipip22 up
exec ip route add 10.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use TenGigabitEthernet8/0/0
exec set interface state ipip23 up
exec ip route add 10.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use TenGigabitEthernet8/0/0
exec set interface state ipip24 up
exec ip route add 10.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use TenGigabitEthernet8/0/0
exec set interface state ipip25 up
exec ip route add 10.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use TenGigabitEthernet8/0/0
exec set interface state ipip26 up
exec ip route add 10.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use TenGigabitEthernet8/0/0
exec set interface state ipip27 up
exec ip route add 10.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use TenGigabitEthernet8/0/0
exec set interface state ipip28 up
exec ip route add 10.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use TenGigabitEthernet8/0/0
exec set interface state ipip29 up
exec ip route add 10.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use TenGigabitEthernet8/0/0
exec set interface state ipip30 up
exec ip route add 10.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use TenGigabitEthernet8/0/0
exec set interface state ipip31 up
exec ip route add 10.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use TenGigabitEthernet8/0/0
exec set interface state ipip32 up
exec ip route add 10.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use TenGigabitEthernet8/0/0
exec set interface state ipip33 up
exec ip route add 10.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use TenGigabitEthernet8/0/0
exec set interface state ipip34 up
exec ip route add 10.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use TenGigabitEthernet8/0/0
exec set interface state ipip35 up
exec ip route add 10.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use TenGigabitEthernet8/0/0
exec set interface state ipip36 up
exec ip route add 10.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use TenGigabitEthernet8/0/0
exec set interface state ipip37 up
exec ip route add 10.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use TenGigabitEthernet8/0/0
exec set interface state ipip38 up
exec ip route add 10.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use TenGigabitEthernet8/0/0
exec set interface state ipip39 up
exec ip route add 10.0.0.39/32 via ipip39

 imix-4t4c-ethip4ipsec40tnlsw-ip4base- 
int-aes128cbc-hmac512sha-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec create loopback interface
exec set interface state loop0 up
exec set interface ip address TenGigabitEthernet8/0/0 200.0.0.101/24
exec set ip neighbor TenGigabitEthernet8/0/0 200.0.0.102 ac:1f:6b:57:57:fe static
exec set interface ip address loop0 100.0.0.1/32
exec create ipip tunnel src 100.0.0.1 dst 200.0.0.102 p2p
exec ipsec sa add 0 spi 100000 crypto-alg aes-cbc-128 crypto-key 497a7766676c7a6e6c52526f76634969 integ-alg sha-512-256 integ-key 4a554243714b4b49704f6559756c58517552704c6651426a6d6775536e6e626c614d715a447673454f6747455a567178544c654d7247446665544e6b4b654a75 esp
exec ipsec sa add 100000 spi 200000 crypto-alg aes-cbc-128 crypto-key 497a7766676c7a6e6c52526f76634969 integ-alg sha-512-256 integ-key 4a554243714b4b49704f6559756c58517552704c6651426a6d6775536e6e626c614d715a447673454f6747455a567178544c654d7247446665544e6b4b654a75 esp
exec ipsec tunnel protect ipip0 sa-out 0 sa-in 100000 add
exec set interface ip address loop0 100.0.1.1/32
exec create ipip tunnel src 100.0.1.1 dst 200.0.0.102 p2p
exec ipsec sa add 1 spi 100001 crypto-alg aes-cbc-128 crypto-key 534a564d66696f6e5a45477069576f77 integ-alg sha-512-256 integ-key 754d6467496558784e76737679524c49784e7249776645506d4e4b55674c6a637a474f774c6f626e496f495268657852474e617563556e61634b496758564c7a esp
exec ipsec sa add 100001 spi 200001 crypto-alg aes-cbc-128 crypto-key 534a564d66696f6e5a45477069576f77 integ-alg sha-512-256 integ-key 754d6467496558784e76737679524c49784e7249776645506d4e4b55674c6a637a474f774c6f626e496f495268657852474e617563556e61634b496758564c7a esp
exec ipsec tunnel protect ipip1 sa-out 1 sa-in 100001 add
exec set interface ip address loop0 100.0.2.1/32
exec create ipip tunnel src 100.0.2.1 dst 200.0.0.102 p2p
exec ipsec sa add 2 spi 100002 crypto-alg aes-cbc-128 crypto-key 714779476f466a69504d46426b616a51 integ-alg sha-512-256 integ-key 6a434b4175595078466e726b7655416e69736941626d4a475645596a547847436d526e744f4e6b6465597a6244495651554a726c7073507a717649416f636652 esp
exec ipsec sa add 100002 spi 200002 crypto-alg aes-cbc-128 crypto-key 714779476f466a69504d46426b616a51 integ-alg sha-512-256 integ-key 6a434b4175595078466e726b7655416e69736941626d4a475645596a547847436d526e744f4e6b6465597a6244495651554a726c7073507a717649416f636652 esp
exec ipsec tunnel protect ipip2 sa-out 2 sa-in 100002 add
exec set interface ip address loop0 100.0.3.1/32
exec create ipip tunnel src 100.0.3.1 dst 200.0.0.102 p2p
exec ipsec sa add 3 spi 100003 crypto-alg aes-cbc-128 crypto-key 75547a4a57586379644171794c6a5552 integ-alg sha-512-256 integ-key 504e744272724b625864457267564a676976517963637555566a4d676a78484e6b76765167705a71724b4775656e694a6b4d4a7753766a756e474b6d4c647a43 esp
exec ipsec sa add 100003 spi 200003 crypto-alg aes-cbc-128 crypto-key 75547a4a57586379644171794c6a5552 integ-alg sha-512-256 integ-key 504e744272724b625864457267564a676976517963637555566a4d676a78484e6b76765167705a71724b4775656e694a6b4d4a7753766a756e474b6d4c647a43 esp
exec ipsec tunnel protect ipip3 sa-out 3 sa-in 100003 add
exec set interface ip address loop0 100.0.4.1/32
exec create ipip tunnel src 100.0.4.1 dst 200.0.0.102 p2p
exec ipsec sa add 4 spi 100004 crypto-alg aes-cbc-128 crypto-key 4e7248556165585a584348796f6d6343 integ-alg sha-512-256 integ-key 4d78705244446c59594354497a6771507a7663654465616c42764a7371436b4d736a526354586b70684e716e676b656f4e466e657a4347626471715944757243 esp
exec ipsec sa add 100004 spi 200004 crypto-alg aes-cbc-128 crypto-key 4e7248556165585a584348796f6d6343 integ-alg sha-512-256 integ-key 4d78705244446c59594354497a6771507a7663654465616c42764a7371436b4d736a526354586b70684e716e676b656f4e466e657a4347626471715944757243 esp
exec ipsec tunnel protect ipip4 sa-out 4 sa-in 100004 add
exec set interface ip address loop0 100.0.5.1/32
exec create ipip tunnel src 100.0.5.1 dst 200.0.0.102 p2p
exec ipsec sa add 5 spi 100005 crypto-alg aes-cbc-128 crypto-key 6d414e754243464553787677684b4371 integ-alg sha-512-256 integ-key 51765478436e4f61654a4f754d66734a53777165484e7752597279416f524d6f7669756f4952534f7041625354464348676271645a7066717749456d58717848 esp
exec ipsec sa add 100005 spi 200005 crypto-alg aes-cbc-128 crypto-key 6d414e754243464553787677684b4371 integ-alg sha-512-256 integ-key 51765478436e4f61654a4f754d66734a53777165484e7752597279416f524d6f7669756f4952534f7041625354464348676271645a7066717749456d58717848 esp
exec ipsec tunnel protect ipip5 sa-out 5 sa-in 100005 add
exec set interface ip address loop0 100.0.6.1/32
exec create ipip tunnel src 100.0.6.1 dst 200.0.0.102 p2p
exec ipsec sa add 6 spi 100006 crypto-alg aes-cbc-128 crypto-key 79796f55584776726b747345794d586d integ-alg sha-512-256 integ-key 6b6668414d4d54754f6f49614341624b734f44576c6b7a64575a5252416479735955687a76564f78716f7a41766f494475576d4b6965454e5766756e4f465767 esp
exec ipsec sa add 100006 spi 200006 crypto-alg aes-cbc-128 crypto-key 79796f55584776726b747345794d586d integ-alg sha-512-256 integ-key 6b6668414d4d54754f6f49614341624b734f44576c6b7a64575a5252416479735955687a76564f78716f7a41766f494475576d4b6965454e5766756e4f465767 esp
exec ipsec tunnel protect ipip6 sa-out 6 sa-in 100006 add
exec set interface ip address loop0 100.0.7.1/32
exec create ipip tunnel src 100.0.7.1 dst 200.0.0.102 p2p
exec ipsec sa add 7 spi 100007 crypto-alg aes-cbc-128 crypto-key 755a5677484c4f7369474441774c7753 integ-alg sha-512-256 integ-key 7a635173707363595056616e45475479616354534b466e78726d6e77744d6a5154654f41786f527741414b444a484d58576c57584b79654341566f785061754f esp
exec ipsec sa add 100007 spi 200007 crypto-alg aes-cbc-128 crypto-key 755a5677484c4f7369474441774c7753 integ-alg sha-512-256 integ-key 7a635173707363595056616e45475479616354534b466e78726d6e77744d6a5154654f41786f527741414b444a484d58576c57584b79654341566f785061754f esp
exec ipsec tunnel protect ipip7 sa-out 7 sa-in 100007 add
exec set interface ip address loop0 100.0.8.1/32
exec create ipip tunnel src 100.0.8.1 dst 200.0.0.102 p2p
exec ipsec sa add 8 spi 100008 crypto-alg aes-cbc-128 crypto-key 6d434c6757796e457a4d6a5263464c4a integ-alg sha-512-256 integ-key 4656626b6a736759555a4f6b437658724e436f42584162574d72557668415742446e56754949734c514a706879726d577a4a5753477077417849696e73616457 esp
exec ipsec sa add 100008 spi 200008 crypto-alg aes-cbc-128 crypto-key 6d434c6757796e457a4d6a5263464c4a integ-alg sha-512-256 integ-key 4656626b6a736759555a4f6b437658724e436f42584162574d72557668415742446e56754949734c514a706879726d577a4a5753477077417849696e73616457 esp
exec ipsec tunnel protect ipip8 sa-out 8 sa-in 100008 add
exec set interface ip address loop0 100.0.9.1/32
exec create ipip tunnel src 100.0.9.1 dst 200.0.0.102 p2p
exec ipsec sa add 9 spi 100009 crypto-alg aes-cbc-128 crypto-key 424e7267657a6544745a5952564e6261 integ-alg sha-512-256 integ-key 726176776574596d4f6e68566257754f65766d716f4a4b426a5978717567785646747876686d6d49526e64695648726a7a6a67647a73696367694e6a71584d52 esp
exec ipsec sa add 100009 spi 200009 crypto-alg aes-cbc-128 crypto-key 424e7267657a6544745a5952564e6261 integ-alg sha-512-256 integ-key 726176776574596d4f6e68566257754f65766d716f4a4b426a5978717567785646747876686d6d49526e64695648726a7a6a67647a73696367694e6a71584d52 esp
exec ipsec tunnel protect ipip9 sa-out 9 sa-in 100009 add
exec set interface ip address loop0 100.0.10.1/32
exec create ipip tunnel src 100.0.10.1 dst 200.0.0.102 p2p
exec ipsec sa add 10 spi 100010 crypto-alg aes-cbc-128 crypto-key 51475a7a5366786171447257504f5370 integ-alg sha-512-256 integ-key 79666f6c646b73595373536573536c784c5175744f766e687854426666697741674b7172696749556b6e5a4c68556f74446854746a66524e764556645a71734c esp
exec ipsec sa add 100010 spi 200010 crypto-alg aes-cbc-128 crypto-key 51475a7a5366786171447257504f5370 integ-alg sha-512-256 integ-key 79666f6c646b73595373536573536c784c5175744f766e687854426666697741674b7172696749556b6e5a4c68556f74446854746a66524e764556645a71734c esp
exec ipsec tunnel protect ipip10 sa-out 10 sa-in 100010 add
exec set interface ip address loop0 100.0.11.1/32
exec create ipip tunnel src 100.0.11.1 dst 200.0.0.102 p2p
exec ipsec sa add 11 spi 100011 crypto-alg aes-cbc-128 crypto-key 494a664a564277744b6c6c64526b7361 integ-alg sha-512-256 integ-key 464d56415847677247764b7a514a6b427a4d5276566c54656259644641576356636a767148795754747667415a54674d456555544a66784c4c514a4c5a635255 esp
exec ipsec sa add 100011 spi 200011 crypto-alg aes-cbc-128 crypto-key 494a664a564277744b6c6c64526b7361 integ-alg sha-512-256 integ-key 464d56415847677247764b7a514a6b427a4d5276566c54656259644641576356636a767148795754747667415a54674d456555544a66784c4c514a4c5a635255 esp
exec ipsec tunnel protect ipip11 sa-out 11 sa-in 100011 add
exec set interface ip address loop0 100.0.12.1/32
exec create ipip tunnel src 100.0.12.1 dst 200.0.0.102 p2p
exec ipsec sa add 12 spi 100012 crypto-alg aes-cbc-128 crypto-key 725344436f4461416141677179585262 integ-alg sha-512-256 integ-key 4d506f447542686d48567a4c62424a74417979687a75566553486e755a6c746c41724f464d5074756743737859694b447a79534846574c556658495a7a6b784e esp
exec ipsec sa add 100012 spi 200012 crypto-alg aes-cbc-128 crypto-key 725344436f4461416141677179585262 integ-alg sha-512-256 integ-key 4d506f447542686d48567a4c62424a74417979687a75566553486e755a6c746c41724f464d5074756743737859694b447a79534846574c556658495a7a6b784e esp
exec ipsec tunnel protect ipip12 sa-out 12 sa-in 100012 add
exec set interface ip address loop0 100.0.13.1/32
exec create ipip tunnel src 100.0.13.1 dst 200.0.0.102 p2p
exec ipsec sa add 13 spi 100013 crypto-alg aes-cbc-128 crypto-key 714e4571726370755478745550697565 integ-alg sha-512-256 integ-key 687a69795051596743645a527646446c6d51556661446444645542547249746f55576f6278625674497178755972766f7a50524e73534f627557626548415167 esp
exec ipsec sa add 100013 spi 200013 crypto-alg aes-cbc-128 crypto-key 714e4571726370755478745550697565 integ-alg sha-512-256 integ-key 687a69795051596743645a527646446c6d51556661446444645542547249746f55576f6278625674497178755972766f7a50524e73534f627557626548415167 esp
exec ipsec tunnel protect ipip13 sa-out 13 sa-in 100013 add
exec set interface ip address loop0 100.0.14.1/32
exec create ipip tunnel src 100.0.14.1 dst 200.0.0.102 p2p
exec ipsec sa add 14 spi 100014 crypto-alg aes-cbc-128 crypto-key 736c45476a625144545451486e6a4f75 integ-alg sha-512-256 integ-key 6163777443736e454d4148594c4b517446437152555179616a4d4d4b764a4e565966716c52646c564b4c4f514a544e576c7143586d6777545679516163744777 esp
exec ipsec sa add 100014 spi 200014 crypto-alg aes-cbc-128 crypto-key 736c45476a625144545451486e6a4f75 integ-alg sha-512-256 integ-key 6163777443736e454d4148594c4b517446437152555179616a4d4d4b764a4e565966716c52646c564b4c4f514a544e576c7143586d6777545679516163744777 esp
exec ipsec tunnel protect ipip14 sa-out 14 sa-in 100014 add
exec set interface ip address loop0 100.0.15.1/32
exec create ipip tunnel src 100.0.15.1 dst 200.0.0.102 p2p
exec ipsec sa add 15 spi 100015 crypto-alg aes-cbc-128 crypto-key 4f5678684d774d534976594b454b437a integ-alg sha-512-256 integ-key 65587764557050526b565076586974764d5a694d694a59504d4d425846544a61445775487a756b6d4243776e695151467351786c6d6a78417047474355516362 esp
exec ipsec sa add 100015 spi 200015 crypto-alg aes-cbc-128 crypto-key 4f5678684d774d534976594b454b437a integ-alg sha-512-256 integ-key 65587764557050526b565076586974764d5a694d694a59504d4d425846544a61445775487a756b6d4243776e695151467351786c6d6a78417047474355516362 esp
exec ipsec tunnel protect ipip15 sa-out 15 sa-in 100015 add
exec set interface ip address loop0 100.0.16.1/32
exec create ipip tunnel src 100.0.16.1 dst 200.0.0.102 p2p
exec ipsec sa add 16 spi 100016 crypto-alg aes-cbc-128 crypto-key 50764f54757a425a64705454486a536c integ-alg sha-512-256 integ-key 4b4564664b4e6974646357436e6d67737871654776504969664a4f586d424a50775a456f6f426145717a4664416463655755516c627a565559497762496d786d esp
exec ipsec sa add 100016 spi 200016 crypto-alg aes-cbc-128 crypto-key 50764f54757a425a64705454486a536c integ-alg sha-512-256 integ-key 4b4564664b4e6974646357436e6d67737871654776504969664a4f586d424a50775a456f6f426145717a4664416463655755516c627a565559497762496d786d esp
exec ipsec tunnel protect ipip16 sa-out 16 sa-in 100016 add
exec set interface ip address loop0 100.0.17.1/32
exec create ipip tunnel src 100.0.17.1 dst 200.0.0.102 p2p
exec ipsec sa add 17 spi 100017 crypto-alg aes-cbc-128 crypto-key 616970617059654464616d537a4b4c6e integ-alg sha-512-256 integ-key 6b4d647146497a5971744b75535a53486e4e526d44426e4a686b44685271586d69574c625947534670745a6e5450467357745268634a5552684446634c7a4250 esp
exec ipsec sa add 100017 spi 200017 crypto-alg aes-cbc-128 crypto-key 616970617059654464616d537a4b4c6e integ-alg sha-512-256 integ-key 6b4d647146497a5971744b75535a53486e4e526d44426e4a686b44685271586d69574c625947534670745a6e5450467357745268634a5552684446634c7a4250 esp
exec ipsec tunnel protect ipip17 sa-out 17 sa-in 100017 add
exec set interface ip address loop0 100.0.18.1/32
exec create ipip tunnel src 100.0.18.1 dst 200.0.0.102 p2p
exec ipsec sa add 18 spi 100018 crypto-alg aes-cbc-128 crypto-key 79654451594f79656f4e4d6b6b744954 integ-alg sha-512-256 integ-key 72704f4b5673666d6971675078506a6d62536355634258576b53786e706f5844786a43525172456c47746e4f5454714658584e7878775341784d70596b495078 esp
exec ipsec sa add 100018 spi 200018 crypto-alg aes-cbc-128 crypto-key 79654451594f79656f4e4d6b6b744954 integ-alg sha-512-256 integ-key 72704f4b5673666d6971675078506a6d62536355634258576b53786e706f5844786a43525172456c47746e4f5454714658584e7878775341784d70596b495078 esp
exec ipsec tunnel protect ipip18 sa-out 18 sa-in 100018 add
exec set interface ip address loop0 100.0.19.1/32
exec create ipip tunnel src 100.0.19.1 dst 200.0.0.102 p2p
exec ipsec sa add 19 spi 100019 crypto-alg aes-cbc-128 crypto-key 7962734d7a67545743624a4256647257 integ-alg sha-512-256 integ-key 7747425550754b446d716c6553466259655766515855585942584b5a4467475462786e6f77526a4b7178477168727a496b71494b49785a7a52436a72686d4856 esp
exec ipsec sa add 100019 spi 200019 crypto-alg aes-cbc-128 crypto-key 7962734d7a67545743624a4256647257 integ-alg sha-512-256 integ-key 7747425550754b446d716c6553466259655766515855585942584b5a4467475462786e6f77526a4b7178477168727a496b71494b49785a7a52436a72686d4856 esp
exec ipsec tunnel protect ipip19 sa-out 19 sa-in 100019 add
exec set interface ip address loop0 100.0.20.1/32
exec create ipip tunnel src 100.0.20.1 dst 200.0.0.102 p2p
exec ipsec sa add 20 spi 100020 crypto-alg aes-cbc-128 crypto-key 7a6649504c4d6b514d666852616e5053 integ-alg sha-512-256 integ-key 7a7367434a4875794945777a774c415944717854645472666b7a4b5045755a707358784f73655a7a486c4d63516242784c4872414e5871465868575a55446750 esp
exec ipsec sa add 100020 spi 200020 crypto-alg aes-cbc-128 crypto-key 7a6649504c4d6b514d666852616e5053 integ-alg sha-512-256 integ-key 7a7367434a4875794945777a774c415944717854645472666b7a4b5045755a707358784f73655a7a486c4d63516242784c4872414e5871465868575a55446750 esp
exec ipsec tunnel protect ipip20 sa-out 20 sa-in 100020 add
exec set interface ip address loop0 100.0.21.1/32
exec create ipip tunnel src 100.0.21.1 dst 200.0.0.102 p2p
exec ipsec sa add 21 spi 100021 crypto-alg aes-cbc-128 crypto-key 494f714b444d774c6f614f5648565150 integ-alg sha-512-256 integ-key 474e4e7059784175507878635242724661424248684a674761514c4d466c4e62704a484f694e777270755666575343716a534f4a4e64736171496d5141725057 esp
exec ipsec sa add 100021 spi 200021 crypto-alg aes-cbc-128 crypto-key 494f714b444d774c6f614f5648565150 integ-alg sha-512-256 integ-key 474e4e7059784175507878635242724661424248684a674761514c4d466c4e62704a484f694e777270755666575343716a534f4a4e64736171496d5141725057 esp
exec ipsec tunnel protect ipip21 sa-out 21 sa-in 100021 add
exec set interface ip address loop0 100.0.22.1/32
exec create ipip tunnel src 100.0.22.1 dst 200.0.0.102 p2p
exec ipsec sa add 22 spi 100022 crypto-alg aes-cbc-128 crypto-key 6b534c68706253594e4b4847736d4d4e integ-alg sha-512-256 integ-key 5348496e74616e4771514e617741536e7374545a564a636f4a776c526a484c6164514f73644241684d62557a6f7171456b774676586f436b45676a757755446e esp
exec ipsec sa add 100022 spi 200022 crypto-alg aes-cbc-128 crypto-key 6b534c68706253594e4b4847736d4d4e integ-alg sha-512-256 integ-key 5348496e74616e4771514e617741536e7374545a564a636f4a776c526a484c6164514f73644241684d62557a6f7171456b774676586f436b45676a757755446e esp
exec ipsec tunnel protect ipip22 sa-out 22 sa-in 100022 add
exec set interface ip address loop0 100.0.23.1/32
exec create ipip tunnel src 100.0.23.1 dst 200.0.0.102 p2p
exec ipsec sa add 23 spi 100023 crypto-alg aes-cbc-128 crypto-key 6c6d715a584d786f75726f6262676858 integ-alg sha-512-256 integ-key 785042435879435066466f58434c4762665a6c79444a5754674f7357506c46746164666243564a457551535674774a4f6a527458584b6e6c4d5575694459684a esp
exec ipsec sa add 100023 spi 200023 crypto-alg aes-cbc-128 crypto-key 6c6d715a584d786f75726f6262676858 integ-alg sha-512-256 integ-key 785042435879435066466f58434c4762665a6c79444a5754674f7357506c46746164666243564a457551535674774a4f6a527458584b6e6c4d5575694459684a esp
exec ipsec tunnel protect ipip23 sa-out 23 sa-in 100023 add
exec set interface ip address loop0 100.0.24.1/32
exec create ipip tunnel src 100.0.24.1 dst 200.0.0.102 p2p
exec ipsec sa add 24 spi 100024 crypto-alg aes-cbc-128 crypto-key 6943795349755056646e44646553624f integ-alg sha-512-256 integ-key 4d44684d4e41456365766f716f6a6771626873757074505a4b49444a547158647751477a465576684874414d68585a56724f754d76566c6d584745496e547466 esp
exec ipsec sa add 100024 spi 200024 crypto-alg aes-cbc-128 crypto-key 6943795349755056646e44646553624f integ-alg sha-512-256 integ-key 4d44684d4e41456365766f716f6a6771626873757074505a4b49444a547158647751477a465576684874414d68585a56724f754d76566c6d584745496e547466 esp
exec ipsec tunnel protect ipip24 sa-out 24 sa-in 100024 add
exec set interface ip address loop0 100.0.25.1/32
exec create ipip tunnel src 100.0.25.1 dst 200.0.0.102 p2p
exec ipsec sa add 25 spi 100025 crypto-alg aes-cbc-128 crypto-key 6542426669424377786e5677636f5363 integ-alg sha-512-256 integ-key 4148706c6b496b6649734f725762426675547644614a7050564a724c6a47484e487153495a6157616f794e6a684f63535a594444556178726970666342666674 esp
exec ipsec sa add 100025 spi 200025 crypto-alg aes-cbc-128 crypto-key 6542426669424377786e5677636f5363 integ-alg sha-512-256 integ-key 4148706c6b496b6649734f725762426675547644614a7050564a724c6a47484e487153495a6157616f794e6a684f63535a594444556178726970666342666674 esp
exec ipsec tunnel protect ipip25 sa-out 25 sa-in 100025 add
exec set interface ip address loop0 100.0.26.1/32
exec create ipip tunnel src 100.0.26.1 dst 200.0.0.102 p2p
exec ipsec sa add 26 spi 100026 crypto-alg aes-cbc-128 crypto-key 737157685a6d416f634b666754594650 integ-alg sha-512-256 integ-key 5761566b626772776e664d636753624a6970787274797151726355435071696257574b726c654a63644857516a6147674e41656d50784e716477576365426152 esp
exec ipsec sa add 100026 spi 200026 crypto-alg aes-cbc-128 crypto-key 737157685a6d416f634b666754594650 integ-alg sha-512-256 integ-key 5761566b626772776e664d636753624a6970787274797151726355435071696257574b726c654a63644857516a6147674e41656d50784e716477576365426152 esp
exec ipsec tunnel protect ipip26 sa-out 26 sa-in 100026 add
exec set interface ip address loop0 100.0.27.1/32
exec create ipip tunnel src 100.0.27.1 dst 200.0.0.102 p2p
exec ipsec sa add 27 spi 100027 crypto-alg aes-cbc-128 crypto-key 76534b4c6c7653574564756e48787372 integ-alg sha-512-256 integ-key 6e786e726748634665555a6261475564444c4d62757944655177544876544749436c4f726c444e77436a71414e546a6d746851727175496a5342786274767275 esp
exec ipsec sa add 100027 spi 200027 crypto-alg aes-cbc-128 crypto-key 76534b4c6c7653574564756e48787372 integ-alg sha-512-256 integ-key 6e786e726748634665555a6261475564444c4d62757944655177544876544749436c4f726c444e77436a71414e546a6d746851727175496a5342786274767275 esp
exec ipsec tunnel protect ipip27 sa-out 27 sa-in 100027 add
exec set interface ip address loop0 100.0.28.1/32
exec create ipip tunnel src 100.0.28.1 dst 200.0.0.102 p2p
exec ipsec sa add 28 spi 100028 crypto-alg aes-cbc-128 crypto-key 4964416767697277767a746e6f644947 integ-alg sha-512-256 integ-key 5a72646a66554c6b7774746a70467043457a4e7869504e51617072485a6c486c6674534d545a664e74726b726a4b426d6f71636d62736d686c59596b5358696e esp
exec ipsec sa add 100028 spi 200028 crypto-alg aes-cbc-128 crypto-key 4964416767697277767a746e6f644947 integ-alg sha-512-256 integ-key 5a72646a66554c6b7774746a70467043457a4e7869504e51617072485a6c486c6674534d545a664e74726b726a4b426d6f71636d62736d686c59596b5358696e esp
exec ipsec tunnel protect ipip28 sa-out 28 sa-in 100028 add
exec set interface ip address loop0 100.0.29.1/32
exec create ipip tunnel src 100.0.29.1 dst 200.0.0.102 p2p
exec ipsec sa add 29 spi 100029 crypto-alg aes-cbc-128 crypto-key 46757470774e6b537174476b6c6b674b integ-alg sha-512-256 integ-key 734e64704a496c7a704f6b734b734a706767436f6c5558684c596259505973726b4f4e7569456e535557686c6655725448445865776c7577454657426652706c esp
exec ipsec sa add 100029 spi 200029 crypto-alg aes-cbc-128 crypto-key 46757470774e6b537174476b6c6b674b integ-alg sha-512-256 integ-key 734e64704a496c7a704f6b734b734a706767436f6c5558684c596259505973726b4f4e7569456e535557686c6655725448445865776c7577454657426652706c esp
exec ipsec tunnel protect ipip29 sa-out 29 sa-in 100029 add
exec set interface ip address loop0 100.0.30.1/32
exec create ipip tunnel src 100.0.30.1 dst 200.0.0.102 p2p
exec ipsec sa add 30 spi 100030 crypto-alg aes-cbc-128 crypto-key 7a426e47425654516744534647576263 integ-alg sha-512-256 integ-key 534c65766858756a4f634c7357427655784b684642714f68494b636b6365567568476465577264754f44556a73676366735043436d6562554a4c725851566b77 esp
exec ipsec sa add 100030 spi 200030 crypto-alg aes-cbc-128 crypto-key 7a426e47425654516744534647576263 integ-alg sha-512-256 integ-key 534c65766858756a4f634c7357427655784b684642714f68494b636b6365567568476465577264754f44556a73676366735043436d6562554a4c725851566b77 esp
exec ipsec tunnel protect ipip30 sa-out 30 sa-in 100030 add
exec set interface ip address loop0 100.0.31.1/32
exec create ipip tunnel src 100.0.31.1 dst 200.0.0.102 p2p
exec ipsec sa add 31 spi 100031 crypto-alg aes-cbc-128 crypto-key 55785375744b5879485044586d704742 integ-alg sha-512-256 integ-key 627551716670714f736a7862536f6e6242694a75696e694670746b494a5a70484c634e714b636f6642474a52714f4c774974757578526b664251626f64687977 esp
exec ipsec sa add 100031 spi 200031 crypto-alg aes-cbc-128 crypto-key 55785375744b5879485044586d704742 integ-alg sha-512-256 integ-key 627551716670714f736a7862536f6e6242694a75696e694670746b494a5a70484c634e714b636f6642474a52714f4c774974757578526b664251626f64687977 esp
exec ipsec tunnel protect ipip31 sa-out 31 sa-in 100031 add
exec set interface ip address loop0 100.0.32.1/32
exec create ipip tunnel src 100.0.32.1 dst 200.0.0.102 p2p
exec ipsec sa add 32 spi 100032 crypto-alg aes-cbc-128 crypto-key 535345576f48567363577a58486f7646 integ-alg sha-512-256 integ-key 5462676e496b5461684c6a4d764f676e466e6c6e7a4966774d4d53636b494970747862624b54544a63506d66584c4c4d616e564c664d7a467057495a51516949 esp
exec ipsec sa add 100032 spi 200032 crypto-alg aes-cbc-128 crypto-key 535345576f48567363577a58486f7646 integ-alg sha-512-256 integ-key 5462676e496b5461684c6a4d764f676e466e6c6e7a4966774d4d53636b494970747862624b54544a63506d66584c4c4d616e564c664d7a467057495a51516949 esp
exec ipsec tunnel protect ipip32 sa-out 32 sa-in 100032 add
exec set interface ip address loop0 100.0.33.1/32
exec create ipip tunnel src 100.0.33.1 dst 200.0.0.102 p2p
exec ipsec sa add 33 spi 100033 crypto-alg aes-cbc-128 crypto-key 5746734e6f796776515a624d6d596471 integ-alg sha-512-256 integ-key 6e6a727844724e4251496d536865694c666253566d5567674a784d6c595a7255725a52584a564f4f6978704d575975544f6c63614e4f744c42664f4c5a734a6f esp
exec ipsec sa add 100033 spi 200033 crypto-alg aes-cbc-128 crypto-key 5746734e6f796776515a624d6d596471 integ-alg sha-512-256 integ-key 6e6a727844724e4251496d536865694c666253566d5567674a784d6c595a7255725a52584a564f4f6978704d575975544f6c63614e4f744c42664f4c5a734a6f esp
exec ipsec tunnel protect ipip33 sa-out 33 sa-in 100033 add
exec set interface ip address loop0 100.0.34.1/32
exec create ipip tunnel src 100.0.34.1 dst 200.0.0.102 p2p
exec ipsec sa add 34 spi 100034 crypto-alg aes-cbc-128 crypto-key 67496b79616a6761754f575464785257 integ-alg sha-512-256 integ-key 4e48675449574d61594d465966696c59764a44626578584c75635054574d4c4b786b73786b4742464779656a6a4658726276636e4a4a67537a56657552474d47 esp
exec ipsec sa add 100034 spi 200034 crypto-alg aes-cbc-128 crypto-key 67496b79616a6761754f575464785257 integ-alg sha-512-256 integ-key 4e48675449574d61594d465966696c59764a44626578584c75635054574d4c4b786b73786b4742464779656a6a4658726276636e4a4a67537a56657552474d47 esp
exec ipsec tunnel protect ipip34 sa-out 34 sa-in 100034 add
exec set interface ip address loop0 100.0.35.1/32
exec create ipip tunnel src 100.0.35.1 dst 200.0.0.102 p2p
exec ipsec sa add 35 spi 100035 crypto-alg aes-cbc-128 crypto-key 6a57666a4a6b4947514e45564e4b7342 integ-alg sha-512-256 integ-key 4f795742654e716644615259714d5976694e416a7466615152666a5847744b584e53594e527370574e4a716978577343646e79797a6d48507771694d43767349 esp
exec ipsec sa add 100035 spi 200035 crypto-alg aes-cbc-128 crypto-key 6a57666a4a6b4947514e45564e4b7342 integ-alg sha-512-256 integ-key 4f795742654e716644615259714d5976694e416a7466615152666a5847744b584e53594e527370574e4a716978577343646e79797a6d48507771694d43767349 esp
exec ipsec tunnel protect ipip35 sa-out 35 sa-in 100035 add
exec set interface ip address loop0 100.0.36.1/32
exec create ipip tunnel src 100.0.36.1 dst 200.0.0.102 p2p
exec ipsec sa add 36 spi 100036 crypto-alg aes-cbc-128 crypto-key 754c7269504c577362475858426f764f integ-alg sha-512-256 integ-key 5864757163774d535a67696c565a59684f6264724b5644574b585471777952574a42754f45754f564c715a58526e47686f57786c6953674d764f546765636642 esp
exec ipsec sa add 100036 spi 200036 crypto-alg aes-cbc-128 crypto-key 754c7269504c577362475858426f764f integ-alg sha-512-256 integ-key 5864757163774d535a67696c565a59684f6264724b5644574b585471777952574a42754f45754f564c715a58526e47686f57786c6953674d764f546765636642 esp
exec ipsec tunnel protect ipip36 sa-out 36 sa-in 100036 add
exec set interface ip address loop0 100.0.37.1/32
exec create ipip tunnel src 100.0.37.1 dst 200.0.0.102 p2p
exec ipsec sa add 37 spi 100037 crypto-alg aes-cbc-128 crypto-key 47737a4f7153684e6c69727a74456855 integ-alg sha-512-256 integ-key 6f41466672746f50755758416453746357456b74634649736b764f555851416b786e67577a63424b4362576e6d7646576e4e4e75534541614d55507262705161 esp
exec ipsec sa add 100037 spi 200037 crypto-alg aes-cbc-128 crypto-key 47737a4f7153684e6c69727a74456855 integ-alg sha-512-256 integ-key 6f41466672746f50755758416453746357456b74634649736b764f555851416b786e67577a63424b4362576e6d7646576e4e4e75534541614d55507262705161 esp
exec ipsec tunnel protect ipip37 sa-out 37 sa-in 100037 add
exec set interface ip address loop0 100.0.38.1/32
exec create ipip tunnel src 100.0.38.1 dst 200.0.0.102 p2p
exec ipsec sa add 38 spi 100038 crypto-alg aes-cbc-128 crypto-key 526857724e635a765a56667674424668 integ-alg sha-512-256 integ-key 74756c43744e66687079726f796d6347724369684953416661617a6a496e536f454d455466784867595561776b7479446a6f735673776b675a484b465870676a esp
exec ipsec sa add 100038 spi 200038 crypto-alg aes-cbc-128 crypto-key 526857724e635a765a56667674424668 integ-alg sha-512-256 integ-key 74756c43744e66687079726f796d6347724369684953416661617a6a496e536f454d455466784867595561776b7479446a6f735673776b675a484b465870676a esp
exec ipsec tunnel protect ipip38 sa-out 38 sa-in 100038 add
exec set interface ip address loop0 100.0.39.1/32
exec create ipip tunnel src 100.0.39.1 dst 200.0.0.102 p2p
exec ipsec sa add 39 spi 100039 crypto-alg aes-cbc-128 crypto-key 61705772787a6c7076434b4b6f684249 integ-alg sha-512-256 integ-key 7748587646656d417a61474d6266544f6173784877526967697a55524241566c6a4c546a67486d464757566c6354774865417569554e7a785161585958524a66 esp
exec ipsec sa add 100039 spi 200039 crypto-alg aes-cbc-128 crypto-key 61705772787a6c7076434b4b6f684249 integ-alg sha-512-256 integ-key 7748587646656d417a61474d6266544f6173784877526967697a55524241566c6a4c546a67486d464757566c6354774865417569554e7a785161585958524a66 esp
exec ipsec tunnel protect ipip39 sa-out 39 sa-in 100039 add
exec set interface unnumbered ipip0 use TenGigabitEthernet8/0/0
exec set interface state ipip0 up
exec ip route add 20.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use TenGigabitEthernet8/0/0
exec set interface state ipip1 up
exec ip route add 20.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use TenGigabitEthernet8/0/0
exec set interface state ipip2 up
exec ip route add 20.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use TenGigabitEthernet8/0/0
exec set interface state ipip3 up
exec ip route add 20.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use TenGigabitEthernet8/0/0
exec set interface state ipip4 up
exec ip route add 20.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use TenGigabitEthernet8/0/0
exec set interface state ipip5 up
exec ip route add 20.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use TenGigabitEthernet8/0/0
exec set interface state ipip6 up
exec ip route add 20.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use TenGigabitEthernet8/0/0
exec set interface state ipip7 up
exec ip route add 20.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use TenGigabitEthernet8/0/0
exec set interface state ipip8 up
exec ip route add 20.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use TenGigabitEthernet8/0/0
exec set interface state ipip9 up
exec ip route add 20.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use TenGigabitEthernet8/0/0
exec set interface state ipip10 up
exec ip route add 20.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use TenGigabitEthernet8/0/0
exec set interface state ipip11 up
exec ip route add 20.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use TenGigabitEthernet8/0/0
exec set interface state ipip12 up
exec ip route add 20.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use TenGigabitEthernet8/0/0
exec set interface state ipip13 up
exec ip route add 20.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use TenGigabitEthernet8/0/0
exec set interface state ipip14 up
exec ip route add 20.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use TenGigabitEthernet8/0/0
exec set interface state ipip15 up
exec ip route add 20.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use TenGigabitEthernet8/0/0
exec set interface state ipip16 up
exec ip route add 20.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use TenGigabitEthernet8/0/0
exec set interface state ipip17 up
exec ip route add 20.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use TenGigabitEthernet8/0/0
exec set interface state ipip18 up
exec ip route add 20.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use TenGigabitEthernet8/0/0
exec set interface state ipip19 up
exec ip route add 20.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use TenGigabitEthernet8/0/0
exec set interface state ipip20 up
exec ip route add 20.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use TenGigabitEthernet8/0/0
exec set interface state ipip21 up
exec ip route add 20.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use TenGigabitEthernet8/0/0
exec set interface state ipip22 up
exec ip route add 20.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use TenGigabitEthernet8/0/0
exec set interface state ipip23 up
exec ip route add 20.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use TenGigabitEthernet8/0/0
exec set interface state ipip24 up
exec ip route add 20.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use TenGigabitEthernet8/0/0
exec set interface state ipip25 up
exec ip route add 20.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use TenGigabitEthernet8/0/0
exec set interface state ipip26 up
exec ip route add 20.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use TenGigabitEthernet8/0/0
exec set interface state ipip27 up
exec ip route add 20.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use TenGigabitEthernet8/0/0
exec set interface state ipip28 up
exec ip route add 20.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use TenGigabitEthernet8/0/0
exec set interface state ipip29 up
exec ip route add 20.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use TenGigabitEthernet8/0/0
exec set interface state ipip30 up
exec ip route add 20.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use TenGigabitEthernet8/0/0
exec set interface state ipip31 up
exec ip route add 20.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use TenGigabitEthernet8/0/0
exec set interface state ipip32 up
exec ip route add 20.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use TenGigabitEthernet8/0/0
exec set interface state ipip33 up
exec ip route add 20.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use TenGigabitEthernet8/0/0
exec set interface state ipip34 up
exec ip route add 20.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use TenGigabitEthernet8/0/0
exec set interface state ipip35 up
exec ip route add 20.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use TenGigabitEthernet8/0/0
exec set interface state ipip36 up
exec ip route add 20.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use TenGigabitEthernet8/0/0
exec set interface state ipip37 up
exec ip route add 20.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use TenGigabitEthernet8/0/0
exec set interface state ipip38 up
exec ip route add 20.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use TenGigabitEthernet8/0/0
exec set interface state ipip39 up
exec ip route add 20.0.0.39/32 via ipip39
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec set interface ip address TenGigabitEthernet8/0/0 200.0.0.102/24.0
exec create ipip tunnel src 200.0.0.102 dst 100.0.0.1 p2p
exec ipsec sa add 100000 spi 200000 crypto-alg aes-cbc-128 crypto-key 497a7766676c7a6e6c52526f76634969 integ-alg sha-512-256 integ-key 4a554243714b4b49704f6559756c58517552704c6651426a6d6775536e6e626c614d715a447673454f6747455a567178544c654d7247446665544e6b4b654a75 esp
exec ipsec sa add 0 spi 100000 crypto-alg aes-cbc-128 crypto-key 497a7766676c7a6e6c52526f76634969 integ-alg sha-512-256 integ-key 4a554243714b4b49704f6559756c58517552704c6651426a6d6775536e6e626c614d715a447673454f6747455a567178544c654d7247446665544e6b4b654a75 esp
exec ipsec tunnel protect ipip0 sa-out 100000 sa-in 0 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.1.1 p2p
exec ipsec sa add 100001 spi 200001 crypto-alg aes-cbc-128 crypto-key 534a564d66696f6e5a45477069576f77 integ-alg sha-512-256 integ-key 754d6467496558784e76737679524c49784e7249776645506d4e4b55674c6a637a474f774c6f626e496f495268657852474e617563556e61634b496758564c7a esp
exec ipsec sa add 1 spi 100001 crypto-alg aes-cbc-128 crypto-key 534a564d66696f6e5a45477069576f77 integ-alg sha-512-256 integ-key 754d6467496558784e76737679524c49784e7249776645506d4e4b55674c6a637a474f774c6f626e496f495268657852474e617563556e61634b496758564c7a esp
exec ipsec tunnel protect ipip1 sa-out 100001 sa-in 1 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.2.1 p2p
exec ipsec sa add 100002 spi 200002 crypto-alg aes-cbc-128 crypto-key 714779476f466a69504d46426b616a51 integ-alg sha-512-256 integ-key 6a434b4175595078466e726b7655416e69736941626d4a475645596a547847436d526e744f4e6b6465597a6244495651554a726c7073507a717649416f636652 esp
exec ipsec sa add 2 spi 100002 crypto-alg aes-cbc-128 crypto-key 714779476f466a69504d46426b616a51 integ-alg sha-512-256 integ-key 6a434b4175595078466e726b7655416e69736941626d4a475645596a547847436d526e744f4e6b6465597a6244495651554a726c7073507a717649416f636652 esp
exec ipsec tunnel protect ipip2 sa-out 100002 sa-in 2 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.3.1 p2p
exec ipsec sa add 100003 spi 200003 crypto-alg aes-cbc-128 crypto-key 75547a4a57586379644171794c6a5552 integ-alg sha-512-256 integ-key 504e744272724b625864457267564a676976517963637555566a4d676a78484e6b76765167705a71724b4775656e694a6b4d4a7753766a756e474b6d4c647a43 esp
exec ipsec sa add 3 spi 100003 crypto-alg aes-cbc-128 crypto-key 75547a4a57586379644171794c6a5552 integ-alg sha-512-256 integ-key 504e744272724b625864457267564a676976517963637555566a4d676a78484e6b76765167705a71724b4775656e694a6b4d4a7753766a756e474b6d4c647a43 esp
exec ipsec tunnel protect ipip3 sa-out 100003 sa-in 3 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.4.1 p2p
exec ipsec sa add 100004 spi 200004 crypto-alg aes-cbc-128 crypto-key 4e7248556165585a584348796f6d6343 integ-alg sha-512-256 integ-key 4d78705244446c59594354497a6771507a7663654465616c42764a7371436b4d736a526354586b70684e716e676b656f4e466e657a4347626471715944757243 esp
exec ipsec sa add 4 spi 100004 crypto-alg aes-cbc-128 crypto-key 4e7248556165585a584348796f6d6343 integ-alg sha-512-256 integ-key 4d78705244446c59594354497a6771507a7663654465616c42764a7371436b4d736a526354586b70684e716e676b656f4e466e657a4347626471715944757243 esp
exec ipsec tunnel protect ipip4 sa-out 100004 sa-in 4 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.5.1 p2p
exec ipsec sa add 100005 spi 200005 crypto-alg aes-cbc-128 crypto-key 6d414e754243464553787677684b4371 integ-alg sha-512-256 integ-key 51765478436e4f61654a4f754d66734a53777165484e7752597279416f524d6f7669756f4952534f7041625354464348676271645a7066717749456d58717848 esp
exec ipsec sa add 5 spi 100005 crypto-alg aes-cbc-128 crypto-key 6d414e754243464553787677684b4371 integ-alg sha-512-256 integ-key 51765478436e4f61654a4f754d66734a53777165484e7752597279416f524d6f7669756f4952534f7041625354464348676271645a7066717749456d58717848 esp
exec ipsec tunnel protect ipip5 sa-out 100005 sa-in 5 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.6.1 p2p
exec ipsec sa add 100006 spi 200006 crypto-alg aes-cbc-128 crypto-key 79796f55584776726b747345794d586d integ-alg sha-512-256 integ-key 6b6668414d4d54754f6f49614341624b734f44576c6b7a64575a5252416479735955687a76564f78716f7a41766f494475576d4b6965454e5766756e4f465767 esp
exec ipsec sa add 6 spi 100006 crypto-alg aes-cbc-128 crypto-key 79796f55584776726b747345794d586d integ-alg sha-512-256 integ-key 6b6668414d4d54754f6f49614341624b734f44576c6b7a64575a5252416479735955687a76564f78716f7a41766f494475576d4b6965454e5766756e4f465767 esp
exec ipsec tunnel protect ipip6 sa-out 100006 sa-in 6 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.7.1 p2p
exec ipsec sa add 100007 spi 200007 crypto-alg aes-cbc-128 crypto-key 755a5677484c4f7369474441774c7753 integ-alg sha-512-256 integ-key 7a635173707363595056616e45475479616354534b466e78726d6e77744d6a5154654f41786f527741414b444a484d58576c57584b79654341566f785061754f esp
exec ipsec sa add 7 spi 100007 crypto-alg aes-cbc-128 crypto-key 755a5677484c4f7369474441774c7753 integ-alg sha-512-256 integ-key 7a635173707363595056616e45475479616354534b466e78726d6e77744d6a5154654f41786f527741414b444a484d58576c57584b79654341566f785061754f esp
exec ipsec tunnel protect ipip7 sa-out 100007 sa-in 7 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.8.1 p2p
exec ipsec sa add 100008 spi 200008 crypto-alg aes-cbc-128 crypto-key 6d434c6757796e457a4d6a5263464c4a integ-alg sha-512-256 integ-key 4656626b6a736759555a4f6b437658724e436f42584162574d72557668415742446e56754949734c514a706879726d577a4a5753477077417849696e73616457 esp
exec ipsec sa add 8 spi 100008 crypto-alg aes-cbc-128 crypto-key 6d434c6757796e457a4d6a5263464c4a integ-alg sha-512-256 integ-key 4656626b6a736759555a4f6b437658724e436f42584162574d72557668415742446e56754949734c514a706879726d577a4a5753477077417849696e73616457 esp
exec ipsec tunnel protect ipip8 sa-out 100008 sa-in 8 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.9.1 p2p
exec ipsec sa add 100009 spi 200009 crypto-alg aes-cbc-128 crypto-key 424e7267657a6544745a5952564e6261 integ-alg sha-512-256 integ-key 726176776574596d4f6e68566257754f65766d716f4a4b426a5978717567785646747876686d6d49526e64695648726a7a6a67647a73696367694e6a71584d52 esp
exec ipsec sa add 9 spi 100009 crypto-alg aes-cbc-128 crypto-key 424e7267657a6544745a5952564e6261 integ-alg sha-512-256 integ-key 726176776574596d4f6e68566257754f65766d716f4a4b426a5978717567785646747876686d6d49526e64695648726a7a6a67647a73696367694e6a71584d52 esp
exec ipsec tunnel protect ipip9 sa-out 100009 sa-in 9 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.10.1 p2p
exec ipsec sa add 100010 spi 200010 crypto-alg aes-cbc-128 crypto-key 51475a7a5366786171447257504f5370 integ-alg sha-512-256 integ-key 79666f6c646b73595373536573536c784c5175744f766e687854426666697741674b7172696749556b6e5a4c68556f74446854746a66524e764556645a71734c esp
exec ipsec sa add 10 spi 100010 crypto-alg aes-cbc-128 crypto-key 51475a7a5366786171447257504f5370 integ-alg sha-512-256 integ-key 79666f6c646b73595373536573536c784c5175744f766e687854426666697741674b7172696749556b6e5a4c68556f74446854746a66524e764556645a71734c esp
exec ipsec tunnel protect ipip10 sa-out 100010 sa-in 10 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.11.1 p2p
exec ipsec sa add 100011 spi 200011 crypto-alg aes-cbc-128 crypto-key 494a664a564277744b6c6c64526b7361 integ-alg sha-512-256 integ-key 464d56415847677247764b7a514a6b427a4d5276566c54656259644641576356636a767148795754747667415a54674d456555544a66784c4c514a4c5a635255 esp
exec ipsec sa add 11 spi 100011 crypto-alg aes-cbc-128 crypto-key 494a664a564277744b6c6c64526b7361 integ-alg sha-512-256 integ-key 464d56415847677247764b7a514a6b427a4d5276566c54656259644641576356636a767148795754747667415a54674d456555544a66784c4c514a4c5a635255 esp
exec ipsec tunnel protect ipip11 sa-out 100011 sa-in 11 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.12.1 p2p
exec ipsec sa add 100012 spi 200012 crypto-alg aes-cbc-128 crypto-key 725344436f4461416141677179585262 integ-alg sha-512-256 integ-key 4d506f447542686d48567a4c62424a74417979687a75566553486e755a6c746c41724f464d5074756743737859694b447a79534846574c556658495a7a6b784e esp
exec ipsec sa add 12 spi 100012 crypto-alg aes-cbc-128 crypto-key 725344436f4461416141677179585262 integ-alg sha-512-256 integ-key 4d506f447542686d48567a4c62424a74417979687a75566553486e755a6c746c41724f464d5074756743737859694b447a79534846574c556658495a7a6b784e esp
exec ipsec tunnel protect ipip12 sa-out 100012 sa-in 12 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.13.1 p2p
exec ipsec sa add 100013 spi 200013 crypto-alg aes-cbc-128 crypto-key 714e4571726370755478745550697565 integ-alg sha-512-256 integ-key 687a69795051596743645a527646446c6d51556661446444645542547249746f55576f6278625674497178755972766f7a50524e73534f627557626548415167 esp
exec ipsec sa add 13 spi 100013 crypto-alg aes-cbc-128 crypto-key 714e4571726370755478745550697565 integ-alg sha-512-256 integ-key 687a69795051596743645a527646446c6d51556661446444645542547249746f55576f6278625674497178755972766f7a50524e73534f627557626548415167 esp
exec ipsec tunnel protect ipip13 sa-out 100013 sa-in 13 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.14.1 p2p
exec ipsec sa add 100014 spi 200014 crypto-alg aes-cbc-128 crypto-key 736c45476a625144545451486e6a4f75 integ-alg sha-512-256 integ-key 6163777443736e454d4148594c4b517446437152555179616a4d4d4b764a4e565966716c52646c564b4c4f514a544e576c7143586d6777545679516163744777 esp
exec ipsec sa add 14 spi 100014 crypto-alg aes-cbc-128 crypto-key 736c45476a625144545451486e6a4f75 integ-alg sha-512-256 integ-key 6163777443736e454d4148594c4b517446437152555179616a4d4d4b764a4e565966716c52646c564b4c4f514a544e576c7143586d6777545679516163744777 esp
exec ipsec tunnel protect ipip14 sa-out 100014 sa-in 14 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.15.1 p2p
exec ipsec sa add 100015 spi 200015 crypto-alg aes-cbc-128 crypto-key 4f5678684d774d534976594b454b437a integ-alg sha-512-256 integ-key 65587764557050526b565076586974764d5a694d694a59504d4d425846544a61445775487a756b6d4243776e695151467351786c6d6a78417047474355516362 esp
exec ipsec sa add 15 spi 100015 crypto-alg aes-cbc-128 crypto-key 4f5678684d774d534976594b454b437a integ-alg sha-512-256 integ-key 65587764557050526b565076586974764d5a694d694a59504d4d425846544a61445775487a756b6d4243776e695151467351786c6d6a78417047474355516362 esp
exec ipsec tunnel protect ipip15 sa-out 100015 sa-in 15 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.16.1 p2p
exec ipsec sa add 100016 spi 200016 crypto-alg aes-cbc-128 crypto-key 50764f54757a425a64705454486a536c integ-alg sha-512-256 integ-key 4b4564664b4e6974646357436e6d67737871654776504969664a4f586d424a50775a456f6f426145717a4664416463655755516c627a565559497762496d786d esp
exec ipsec sa add 16 spi 100016 crypto-alg aes-cbc-128 crypto-key 50764f54757a425a64705454486a536c integ-alg sha-512-256 integ-key 4b4564664b4e6974646357436e6d67737871654776504969664a4f586d424a50775a456f6f426145717a4664416463655755516c627a565559497762496d786d esp
exec ipsec tunnel protect ipip16 sa-out 100016 sa-in 16 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.17.1 p2p
exec ipsec sa add 100017 spi 200017 crypto-alg aes-cbc-128 crypto-key 616970617059654464616d537a4b4c6e integ-alg sha-512-256 integ-key 6b4d647146497a5971744b75535a53486e4e526d44426e4a686b44685271586d69574c625947534670745a6e5450467357745268634a5552684446634c7a4250 esp
exec ipsec sa add 17 spi 100017 crypto-alg aes-cbc-128 crypto-key 616970617059654464616d537a4b4c6e integ-alg sha-512-256 integ-key 6b4d647146497a5971744b75535a53486e4e526d44426e4a686b44685271586d69574c625947534670745a6e5450467357745268634a5552684446634c7a4250 esp
exec ipsec tunnel protect ipip17 sa-out 100017 sa-in 17 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.18.1 p2p
exec ipsec sa add 100018 spi 200018 crypto-alg aes-cbc-128 crypto-key 79654451594f79656f4e4d6b6b744954 integ-alg sha-512-256 integ-key 72704f4b5673666d6971675078506a6d62536355634258576b53786e706f5844786a43525172456c47746e4f5454714658584e7878775341784d70596b495078 esp
exec ipsec sa add 18 spi 100018 crypto-alg aes-cbc-128 crypto-key 79654451594f79656f4e4d6b6b744954 integ-alg sha-512-256 integ-key 72704f4b5673666d6971675078506a6d62536355634258576b53786e706f5844786a43525172456c47746e4f5454714658584e7878775341784d70596b495078 esp
exec ipsec tunnel protect ipip18 sa-out 100018 sa-in 18 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.19.1 p2p
exec ipsec sa add 100019 spi 200019 crypto-alg aes-cbc-128 crypto-key 7962734d7a67545743624a4256647257 integ-alg sha-512-256 integ-key 7747425550754b446d716c6553466259655766515855585942584b5a4467475462786e6f77526a4b7178477168727a496b71494b49785a7a52436a72686d4856 esp
exec ipsec sa add 19 spi 100019 crypto-alg aes-cbc-128 crypto-key 7962734d7a67545743624a4256647257 integ-alg sha-512-256 integ-key 7747425550754b446d716c6553466259655766515855585942584b5a4467475462786e6f77526a4b7178477168727a496b71494b49785a7a52436a72686d4856 esp
exec ipsec tunnel protect ipip19 sa-out 100019 sa-in 19 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.20.1 p2p
exec ipsec sa add 100020 spi 200020 crypto-alg aes-cbc-128 crypto-key 7a6649504c4d6b514d666852616e5053 integ-alg sha-512-256 integ-key 7a7367434a4875794945777a774c415944717854645472666b7a4b5045755a707358784f73655a7a486c4d63516242784c4872414e5871465868575a55446750 esp
exec ipsec sa add 20 spi 100020 crypto-alg aes-cbc-128 crypto-key 7a6649504c4d6b514d666852616e5053 integ-alg sha-512-256 integ-key 7a7367434a4875794945777a774c415944717854645472666b7a4b5045755a707358784f73655a7a486c4d63516242784c4872414e5871465868575a55446750 esp
exec ipsec tunnel protect ipip20 sa-out 100020 sa-in 20 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.21.1 p2p
exec ipsec sa add 100021 spi 200021 crypto-alg aes-cbc-128 crypto-key 494f714b444d774c6f614f5648565150 integ-alg sha-512-256 integ-key 474e4e7059784175507878635242724661424248684a674761514c4d466c4e62704a484f694e777270755666575343716a534f4a4e64736171496d5141725057 esp
exec ipsec sa add 21 spi 100021 crypto-alg aes-cbc-128 crypto-key 494f714b444d774c6f614f5648565150 integ-alg sha-512-256 integ-key 474e4e7059784175507878635242724661424248684a674761514c4d466c4e62704a484f694e777270755666575343716a534f4a4e64736171496d5141725057 esp
exec ipsec tunnel protect ipip21 sa-out 100021 sa-in 21 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.22.1 p2p
exec ipsec sa add 100022 spi 200022 crypto-alg aes-cbc-128 crypto-key 6b534c68706253594e4b4847736d4d4e integ-alg sha-512-256 integ-key 5348496e74616e4771514e617741536e7374545a564a636f4a776c526a484c6164514f73644241684d62557a6f7171456b774676586f436b45676a757755446e esp
exec ipsec sa add 22 spi 100022 crypto-alg aes-cbc-128 crypto-key 6b534c68706253594e4b4847736d4d4e integ-alg sha-512-256 integ-key 5348496e74616e4771514e617741536e7374545a564a636f4a776c526a484c6164514f73644241684d62557a6f7171456b774676586f436b45676a757755446e esp
exec ipsec tunnel protect ipip22 sa-out 100022 sa-in 22 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.23.1 p2p
exec ipsec sa add 100023 spi 200023 crypto-alg aes-cbc-128 crypto-key 6c6d715a584d786f75726f6262676858 integ-alg sha-512-256 integ-key 785042435879435066466f58434c4762665a6c79444a5754674f7357506c46746164666243564a457551535674774a4f6a527458584b6e6c4d5575694459684a esp
exec ipsec sa add 23 spi 100023 crypto-alg aes-cbc-128 crypto-key 6c6d715a584d786f75726f6262676858 integ-alg sha-512-256 integ-key 785042435879435066466f58434c4762665a6c79444a5754674f7357506c46746164666243564a457551535674774a4f6a527458584b6e6c4d5575694459684a esp
exec ipsec tunnel protect ipip23 sa-out 100023 sa-in 23 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.24.1 p2p
exec ipsec sa add 100024 spi 200024 crypto-alg aes-cbc-128 crypto-key 6943795349755056646e44646553624f integ-alg sha-512-256 integ-key 4d44684d4e41456365766f716f6a6771626873757074505a4b49444a547158647751477a465576684874414d68585a56724f754d76566c6d584745496e547466 esp
exec ipsec sa add 24 spi 100024 crypto-alg aes-cbc-128 crypto-key 6943795349755056646e44646553624f integ-alg sha-512-256 integ-key 4d44684d4e41456365766f716f6a6771626873757074505a4b49444a547158647751477a465576684874414d68585a56724f754d76566c6d584745496e547466 esp
exec ipsec tunnel protect ipip24 sa-out 100024 sa-in 24 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.25.1 p2p
exec ipsec sa add 100025 spi 200025 crypto-alg aes-cbc-128 crypto-key 6542426669424377786e5677636f5363 integ-alg sha-512-256 integ-key 4148706c6b496b6649734f725762426675547644614a7050564a724c6a47484e487153495a6157616f794e6a684f63535a594444556178726970666342666674 esp
exec ipsec sa add 25 spi 100025 crypto-alg aes-cbc-128 crypto-key 6542426669424377786e5677636f5363 integ-alg sha-512-256 integ-key 4148706c6b496b6649734f725762426675547644614a7050564a724c6a47484e487153495a6157616f794e6a684f63535a594444556178726970666342666674 esp
exec ipsec tunnel protect ipip25 sa-out 100025 sa-in 25 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.26.1 p2p
exec ipsec sa add 100026 spi 200026 crypto-alg aes-cbc-128 crypto-key 737157685a6d416f634b666754594650 integ-alg sha-512-256 integ-key 5761566b626772776e664d636753624a6970787274797151726355435071696257574b726c654a63644857516a6147674e41656d50784e716477576365426152 esp
exec ipsec sa add 26 spi 100026 crypto-alg aes-cbc-128 crypto-key 737157685a6d416f634b666754594650 integ-alg sha-512-256 integ-key 5761566b626772776e664d636753624a6970787274797151726355435071696257574b726c654a63644857516a6147674e41656d50784e716477576365426152 esp
exec ipsec tunnel protect ipip26 sa-out 100026 sa-in 26 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.27.1 p2p
exec ipsec sa add 100027 spi 200027 crypto-alg aes-cbc-128 crypto-key 76534b4c6c7653574564756e48787372 integ-alg sha-512-256 integ-key 6e786e726748634665555a6261475564444c4d62757944655177544876544749436c4f726c444e77436a71414e546a6d746851727175496a5342786274767275 esp
exec ipsec sa add 27 spi 100027 crypto-alg aes-cbc-128 crypto-key 76534b4c6c7653574564756e48787372 integ-alg sha-512-256 integ-key 6e786e726748634665555a6261475564444c4d62757944655177544876544749436c4f726c444e77436a71414e546a6d746851727175496a5342786274767275 esp
exec ipsec tunnel protect ipip27 sa-out 100027 sa-in 27 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.28.1 p2p
exec ipsec sa add 100028 spi 200028 crypto-alg aes-cbc-128 crypto-key 4964416767697277767a746e6f644947 integ-alg sha-512-256 integ-key 5a72646a66554c6b7774746a70467043457a4e7869504e51617072485a6c486c6674534d545a664e74726b726a4b426d6f71636d62736d686c59596b5358696e esp
exec ipsec sa add 28 spi 100028 crypto-alg aes-cbc-128 crypto-key 4964416767697277767a746e6f644947 integ-alg sha-512-256 integ-key 5a72646a66554c6b7774746a70467043457a4e7869504e51617072485a6c486c6674534d545a664e74726b726a4b426d6f71636d62736d686c59596b5358696e esp
exec ipsec tunnel protect ipip28 sa-out 100028 sa-in 28 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.29.1 p2p
exec ipsec sa add 100029 spi 200029 crypto-alg aes-cbc-128 crypto-key 46757470774e6b537174476b6c6b674b integ-alg sha-512-256 integ-key 734e64704a496c7a704f6b734b734a706767436f6c5558684c596259505973726b4f4e7569456e535557686c6655725448445865776c7577454657426652706c esp
exec ipsec sa add 29 spi 100029 crypto-alg aes-cbc-128 crypto-key 46757470774e6b537174476b6c6b674b integ-alg sha-512-256 integ-key 734e64704a496c7a704f6b734b734a706767436f6c5558684c596259505973726b4f4e7569456e535557686c6655725448445865776c7577454657426652706c esp
exec ipsec tunnel protect ipip29 sa-out 100029 sa-in 29 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.30.1 p2p
exec ipsec sa add 100030 spi 200030 crypto-alg aes-cbc-128 crypto-key 7a426e47425654516744534647576263 integ-alg sha-512-256 integ-key 534c65766858756a4f634c7357427655784b684642714f68494b636b6365567568476465577264754f44556a73676366735043436d6562554a4c725851566b77 esp
exec ipsec sa add 30 spi 100030 crypto-alg aes-cbc-128 crypto-key 7a426e47425654516744534647576263 integ-alg sha-512-256 integ-key 534c65766858756a4f634c7357427655784b684642714f68494b636b6365567568476465577264754f44556a73676366735043436d6562554a4c725851566b77 esp
exec ipsec tunnel protect ipip30 sa-out 100030 sa-in 30 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.31.1 p2p
exec ipsec sa add 100031 spi 200031 crypto-alg aes-cbc-128 crypto-key 55785375744b5879485044586d704742 integ-alg sha-512-256 integ-key 627551716670714f736a7862536f6e6242694a75696e694670746b494a5a70484c634e714b636f6642474a52714f4c774974757578526b664251626f64687977 esp
exec ipsec sa add 31 spi 100031 crypto-alg aes-cbc-128 crypto-key 55785375744b5879485044586d704742 integ-alg sha-512-256 integ-key 627551716670714f736a7862536f6e6242694a75696e694670746b494a5a70484c634e714b636f6642474a52714f4c774974757578526b664251626f64687977 esp
exec ipsec tunnel protect ipip31 sa-out 100031 sa-in 31 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.32.1 p2p
exec ipsec sa add 100032 spi 200032 crypto-alg aes-cbc-128 crypto-key 535345576f48567363577a58486f7646 integ-alg sha-512-256 integ-key 5462676e496b5461684c6a4d764f676e466e6c6e7a4966774d4d53636b494970747862624b54544a63506d66584c4c4d616e564c664d7a467057495a51516949 esp
exec ipsec sa add 32 spi 100032 crypto-alg aes-cbc-128 crypto-key 535345576f48567363577a58486f7646 integ-alg sha-512-256 integ-key 5462676e496b5461684c6a4d764f676e466e6c6e7a4966774d4d53636b494970747862624b54544a63506d66584c4c4d616e564c664d7a467057495a51516949 esp
exec ipsec tunnel protect ipip32 sa-out 100032 sa-in 32 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.33.1 p2p
exec ipsec sa add 100033 spi 200033 crypto-alg aes-cbc-128 crypto-key 5746734e6f796776515a624d6d596471 integ-alg sha-512-256 integ-key 6e6a727844724e4251496d536865694c666253566d5567674a784d6c595a7255725a52584a564f4f6978704d575975544f6c63614e4f744c42664f4c5a734a6f esp
exec ipsec sa add 33 spi 100033 crypto-alg aes-cbc-128 crypto-key 5746734e6f796776515a624d6d596471 integ-alg sha-512-256 integ-key 6e6a727844724e4251496d536865694c666253566d5567674a784d6c595a7255725a52584a564f4f6978704d575975544f6c63614e4f744c42664f4c5a734a6f esp
exec ipsec tunnel protect ipip33 sa-out 100033 sa-in 33 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.34.1 p2p
exec ipsec sa add 100034 spi 200034 crypto-alg aes-cbc-128 crypto-key 67496b79616a6761754f575464785257 integ-alg sha-512-256 integ-key 4e48675449574d61594d465966696c59764a44626578584c75635054574d4c4b786b73786b4742464779656a6a4658726276636e4a4a67537a56657552474d47 esp
exec ipsec sa add 34 spi 100034 crypto-alg aes-cbc-128 crypto-key 67496b79616a6761754f575464785257 integ-alg sha-512-256 integ-key 4e48675449574d61594d465966696c59764a44626578584c75635054574d4c4b786b73786b4742464779656a6a4658726276636e4a4a67537a56657552474d47 esp
exec ipsec tunnel protect ipip34 sa-out 100034 sa-in 34 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.35.1 p2p
exec ipsec sa add 100035 spi 200035 crypto-alg aes-cbc-128 crypto-key 6a57666a4a6b4947514e45564e4b7342 integ-alg sha-512-256 integ-key 4f795742654e716644615259714d5976694e416a7466615152666a5847744b584e53594e527370574e4a716978577343646e79797a6d48507771694d43767349 esp
exec ipsec sa add 35 spi 100035 crypto-alg aes-cbc-128 crypto-key 6a57666a4a6b4947514e45564e4b7342 integ-alg sha-512-256 integ-key 4f795742654e716644615259714d5976694e416a7466615152666a5847744b584e53594e527370574e4a716978577343646e79797a6d48507771694d43767349 esp
exec ipsec tunnel protect ipip35 sa-out 100035 sa-in 35 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.36.1 p2p
exec ipsec sa add 100036 spi 200036 crypto-alg aes-cbc-128 crypto-key 754c7269504c577362475858426f764f integ-alg sha-512-256 integ-key 5864757163774d535a67696c565a59684f6264724b5644574b585471777952574a42754f45754f564c715a58526e47686f57786c6953674d764f546765636642 esp
exec ipsec sa add 36 spi 100036 crypto-alg aes-cbc-128 crypto-key 754c7269504c577362475858426f764f integ-alg sha-512-256 integ-key 5864757163774d535a67696c565a59684f6264724b5644574b585471777952574a42754f45754f564c715a58526e47686f57786c6953674d764f546765636642 esp
exec ipsec tunnel protect ipip36 sa-out 100036 sa-in 36 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.37.1 p2p
exec ipsec sa add 100037 spi 200037 crypto-alg aes-cbc-128 crypto-key 47737a4f7153684e6c69727a74456855 integ-alg sha-512-256 integ-key 6f41466672746f50755758416453746357456b74634649736b764f555851416b786e67577a63424b4362576e6d7646576e4e4e75534541614d55507262705161 esp
exec ipsec sa add 37 spi 100037 crypto-alg aes-cbc-128 crypto-key 47737a4f7153684e6c69727a74456855 integ-alg sha-512-256 integ-key 6f41466672746f50755758416453746357456b74634649736b764f555851416b786e67577a63424b4362576e6d7646576e4e4e75534541614d55507262705161 esp
exec ipsec tunnel protect ipip37 sa-out 100037 sa-in 37 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.38.1 p2p
exec ipsec sa add 100038 spi 200038 crypto-alg aes-cbc-128 crypto-key 526857724e635a765a56667674424668 integ-alg sha-512-256 integ-key 74756c43744e66687079726f796d6347724369684953416661617a6a496e536f454d455466784867595561776b7479446a6f735673776b675a484b465870676a esp
exec ipsec sa add 38 spi 100038 crypto-alg aes-cbc-128 crypto-key 526857724e635a765a56667674424668 integ-alg sha-512-256 integ-key 74756c43744e66687079726f796d6347724369684953416661617a6a496e536f454d455466784867595561776b7479446a6f735673776b675a484b465870676a esp
exec ipsec tunnel protect ipip38 sa-out 100038 sa-in 38 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.39.1 p2p
exec ipsec sa add 100039 spi 200039 crypto-alg aes-cbc-128 crypto-key 61705772787a6c7076434b4b6f684249 integ-alg sha-512-256 integ-key 7748587646656d417a61474d6266544f6173784877526967697a55524241566c6a4c546a67486d464757566c6354774865417569554e7a785161585958524a66 esp
exec ipsec sa add 39 spi 100039 crypto-alg aes-cbc-128 crypto-key 61705772787a6c7076434b4b6f684249 integ-alg sha-512-256 integ-key 7748587646656d417a61474d6266544f6173784877526967697a55524241566c6a4c546a67486d464757566c6354774865417569554e7a785161585958524a66 esp
exec ipsec tunnel protect ipip39 sa-out 100039 sa-in 39 add
exec ip route add 100.0.0.1/8 via 200.0.0.101 TenGigabitEthernet8/0/0
exec set interface unnumbered ipip0 use TenGigabitEthernet8/0/0
exec set interface state ipip0 up
exec ip route add 10.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use TenGigabitEthernet8/0/0
exec set interface state ipip1 up
exec ip route add 10.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use TenGigabitEthernet8/0/0
exec set interface state ipip2 up
exec ip route add 10.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use TenGigabitEthernet8/0/0
exec set interface state ipip3 up
exec ip route add 10.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use TenGigabitEthernet8/0/0
exec set interface state ipip4 up
exec ip route add 10.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use TenGigabitEthernet8/0/0
exec set interface state ipip5 up
exec ip route add 10.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use TenGigabitEthernet8/0/0
exec set interface state ipip6 up
exec ip route add 10.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use TenGigabitEthernet8/0/0
exec set interface state ipip7 up
exec ip route add 10.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use TenGigabitEthernet8/0/0
exec set interface state ipip8 up
exec ip route add 10.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use TenGigabitEthernet8/0/0
exec set interface state ipip9 up
exec ip route add 10.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use TenGigabitEthernet8/0/0
exec set interface state ipip10 up
exec ip route add 10.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use TenGigabitEthernet8/0/0
exec set interface state ipip11 up
exec ip route add 10.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use TenGigabitEthernet8/0/0
exec set interface state ipip12 up
exec ip route add 10.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use TenGigabitEthernet8/0/0
exec set interface state ipip13 up
exec ip route add 10.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use TenGigabitEthernet8/0/0
exec set interface state ipip14 up
exec ip route add 10.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use TenGigabitEthernet8/0/0
exec set interface state ipip15 up
exec ip route add 10.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use TenGigabitEthernet8/0/0
exec set interface state ipip16 up
exec ip route add 10.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use TenGigabitEthernet8/0/0
exec set interface state ipip17 up
exec ip route add 10.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use TenGigabitEthernet8/0/0
exec set interface state ipip18 up
exec ip route add 10.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use TenGigabitEthernet8/0/0
exec set interface state ipip19 up
exec ip route add 10.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use TenGigabitEthernet8/0/0
exec set interface state ipip20 up
exec ip route add 10.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use TenGigabitEthernet8/0/0
exec set interface state ipip21 up
exec ip route add 10.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use TenGigabitEthernet8/0/0
exec set interface state ipip22 up
exec ip route add 10.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use TenGigabitEthernet8/0/0
exec set interface state ipip23 up
exec ip route add 10.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use TenGigabitEthernet8/0/0
exec set interface state ipip24 up
exec ip route add 10.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use TenGigabitEthernet8/0/0
exec set interface state ipip25 up
exec ip route add 10.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use TenGigabitEthernet8/0/0
exec set interface state ipip26 up
exec ip route add 10.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use TenGigabitEthernet8/0/0
exec set interface state ipip27 up
exec ip route add 10.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use TenGigabitEthernet8/0/0
exec set interface state ipip28 up
exec ip route add 10.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use TenGigabitEthernet8/0/0
exec set interface state ipip29 up
exec ip route add 10.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use TenGigabitEthernet8/0/0
exec set interface state ipip30 up
exec ip route add 10.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use TenGigabitEthernet8/0/0
exec set interface state ipip31 up
exec ip route add 10.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use TenGigabitEthernet8/0/0
exec set interface state ipip32 up
exec ip route add 10.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use TenGigabitEthernet8/0/0
exec set interface state ipip33 up
exec ip route add 10.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use TenGigabitEthernet8/0/0
exec set interface state ipip34 up
exec ip route add 10.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use TenGigabitEthernet8/0/0
exec set interface state ipip35 up
exec ip route add 10.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use TenGigabitEthernet8/0/0
exec set interface state ipip36 up
exec ip route add 10.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use TenGigabitEthernet8/0/0
exec set interface state ipip37 up
exec ip route add 10.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use TenGigabitEthernet8/0/0
exec set interface state ipip38 up
exec ip route add 10.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use TenGigabitEthernet8/0/0
exec set interface state ipip39 up
exec ip route add 10.0.0.39/32 via ipip39

10ge2p1x553-ethip4ipsec40tnlsw-ip4base-int-aes128gcm-ndrpdr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular topology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG verification: TG finds and reports throughput NDR (Non Drop Rate) with zero packet loss tolerance and throughput PDR (Partial Drop Rate) with non-zero packet loss tolerance (LT) expressed in percentage of packets transmitted. NDR and PDR are discovered for different Ethernet L2 frame sizes using MLRsearch library.

Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to number of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG node interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 64b-1t1c-ethip4ipsec40tnlsw- 
ip4base-int-aes128gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec create loopback interface
exec set interface state loop0 up
exec set interface ip address TenGigabitEthernet8/0/0 200.0.0.101/24
exec set ip neighbor TenGigabitEthernet8/0/0 200.0.0.102 ac:1f:6b:57:57:fe static
exec set interface ip address loop0 100.0.0.1/32
exec create ipip tunnel src 100.0.0.1 dst 200.0.0.102 p2p
exec ipsec sa add 0 spi 100000 crypto-alg aes-gcm-128 crypto-key 6e574c534f6d56445364726e4e695a53 esp
exec ipsec sa add 100000 spi 200000 crypto-alg aes-gcm-128 crypto-key 6e574c534f6d56445364726e4e695a53 esp
exec ipsec tunnel protect ipip0 sa-out 0 sa-in 100000 add
exec set interface ip address loop0 100.0.1.1/32
exec create ipip tunnel src 100.0.1.1 dst 200.0.0.102 p2p
exec ipsec sa add 1 spi 100001 crypto-alg aes-gcm-128 crypto-key 595a6c5075434a7045676c5459527976 esp
exec ipsec sa add 100001 spi 200001 crypto-alg aes-gcm-128 crypto-key 595a6c5075434a7045676c5459527976 esp
exec ipsec tunnel protect ipip1 sa-out 1 sa-in 100001 add
exec set interface ip address loop0 100.0.2.1/32
exec create ipip tunnel src 100.0.2.1 dst 200.0.0.102 p2p
exec ipsec sa add 2 spi 100002 crypto-alg aes-gcm-128 crypto-key 67727779627a5949446976446f427758 esp
exec ipsec sa add 100002 spi 200002 crypto-alg aes-gcm-128 crypto-key 67727779627a5949446976446f427758 esp
exec ipsec tunnel protect ipip2 sa-out 2 sa-in 100002 add
exec set interface ip address loop0 100.0.3.1/32
exec create ipip tunnel src 100.0.3.1 dst 200.0.0.102 p2p
exec ipsec sa add 3 spi 100003 crypto-alg aes-gcm-128 crypto-key 6465417055715169696561594a556369 esp
exec ipsec sa add 100003 spi 200003 crypto-alg aes-gcm-128 crypto-key 6465417055715169696561594a556369 esp
exec ipsec tunnel protect ipip3 sa-out 3 sa-in 100003 add
exec set interface ip address loop0 100.0.4.1/32
exec create ipip tunnel src 100.0.4.1 dst 200.0.0.102 p2p
exec ipsec sa add 4 spi 100004 crypto-alg aes-gcm-128 crypto-key 414b634350466d6341586d6b53564a6e esp
exec ipsec sa add 100004 spi 200004 crypto-alg aes-gcm-128 crypto-key 414b634350466d6341586d6b53564a6e esp
exec ipsec tunnel protect ipip4 sa-out 4 sa-in 100004 add
exec set interface ip address loop0 100.0.5.1/32
exec create ipip tunnel src 100.0.5.1 dst 200.0.0.102 p2p
exec ipsec sa add 5 spi 100005 crypto-alg aes-gcm-128 crypto-key 4b57636e4f526e45465045544d4e4f68 esp
exec ipsec sa add 100005 spi 200005 crypto-alg aes-gcm-128 crypto-key 4b57636e4f526e45465045544d4e4f68 esp
exec ipsec tunnel protect ipip5 sa-out 5 sa-in 100005 add
exec set interface ip address loop0 100.0.6.1/32
exec create ipip tunnel src 100.0.6.1 dst 200.0.0.102 p2p
exec ipsec sa add 6 spi 100006 crypto-alg aes-gcm-128 crypto-key 424b734c7a4874416979415964444c65 esp
exec ipsec sa add 100006 spi 200006 crypto-alg aes-gcm-128 crypto-key 424b734c7a4874416979415964444c65 esp
exec ipsec tunnel protect ipip6 sa-out 6 sa-in 100006 add
exec set interface ip address loop0 100.0.7.1/32
exec create ipip tunnel src 100.0.7.1 dst 200.0.0.102 p2p
exec ipsec sa add 7 spi 100007 crypto-alg aes-gcm-128 crypto-key 4f594359497654666451514c77644675 esp
exec ipsec sa add 100007 spi 200007 crypto-alg aes-gcm-128 crypto-key 4f594359497654666451514c77644675 esp
exec ipsec tunnel protect ipip7 sa-out 7 sa-in 100007 add
exec set interface ip address loop0 100.0.8.1/32
exec create ipip tunnel src 100.0.8.1 dst 200.0.0.102 p2p
exec ipsec sa add 8 spi 100008 crypto-alg aes-gcm-128 crypto-key 7858454855784d50554949776768446d esp
exec ipsec sa add 100008 spi 200008 crypto-alg aes-gcm-128 crypto-key 7858454855784d50554949776768446d esp
exec ipsec tunnel protect ipip8 sa-out 8 sa-in 100008 add
exec set interface ip address loop0 100.0.9.1/32
exec create ipip tunnel src 100.0.9.1 dst 200.0.0.102 p2p
exec ipsec sa add 9 spi 100009 crypto-alg aes-gcm-128 crypto-key 5378495a59584941764b6c6b745a417a esp
exec ipsec sa add 100009 spi 200009 crypto-alg aes-gcm-128 crypto-key 5378495a59584941764b6c6b745a417a esp
exec ipsec tunnel protect ipip9 sa-out 9 sa-in 100009 add
exec set interface ip address loop0 100.0.10.1/32
exec create ipip tunnel src 100.0.10.1 dst 200.0.0.102 p2p
exec ipsec sa add 10 spi 100010 crypto-alg aes-gcm-128 crypto-key 664e4b64494b684b58666a566d724d42 esp
exec ipsec sa add 100010 spi 200010 crypto-alg aes-gcm-128 crypto-key 664e4b64494b684b58666a566d724d42 esp
exec ipsec tunnel protect ipip10 sa-out 10 sa-in 100010 add
exec set interface ip address loop0 100.0.11.1/32
exec create ipip tunnel src 100.0.11.1 dst 200.0.0.102 p2p
exec ipsec sa add 11 spi 100011 crypto-alg aes-gcm-128 crypto-key 76596a706d6279707a49557675665464 esp
exec ipsec sa add 100011 spi 200011 crypto-alg aes-gcm-128 crypto-key 76596a706d6279707a49557675665464 esp
exec ipsec tunnel protect ipip11 sa-out 11 sa-in 100011 add
exec set interface ip address loop0 100.0.12.1/32
exec create ipip tunnel src 100.0.12.1 dst 200.0.0.102 p2p
exec ipsec sa add 12 spi 100012 crypto-alg aes-gcm-128 crypto-key 4a4147556962567363464b6c68507a4a esp
exec ipsec sa add 100012 spi 200012 crypto-alg aes-gcm-128 crypto-key 4a4147556962567363464b6c68507a4a esp
exec ipsec tunnel protect ipip12 sa-out 12 sa-in 100012 add
exec set interface ip address loop0 100.0.13.1/32
exec create ipip tunnel src 100.0.13.1 dst 200.0.0.102 p2p
exec ipsec sa add 13 spi 100013 crypto-alg aes-gcm-128 crypto-key 754b4273637a54634d49634849465942 esp
exec ipsec sa add 100013 spi 200013 crypto-alg aes-gcm-128 crypto-key 754b4273637a54634d49634849465942 esp
exec ipsec tunnel protect ipip13 sa-out 13 sa-in 100013 add
exec set interface ip address loop0 100.0.14.1/32
exec create ipip tunnel src 100.0.14.1 dst 200.0.0.102 p2p
exec ipsec sa add 14 spi 100014 crypto-alg aes-gcm-128 crypto-key 6c6a4742655449424a517953487a4f6e esp
exec ipsec sa add 100014 spi 200014 crypto-alg aes-gcm-128 crypto-key 6c6a4742655449424a517953487a4f6e esp
exec ipsec tunnel protect ipip14 sa-out 14 sa-in 100014 add
exec set interface ip address loop0 100.0.15.1/32
exec create ipip tunnel src 100.0.15.1 dst 200.0.0.102 p2p
exec ipsec sa add 15 spi 100015 crypto-alg aes-gcm-128 crypto-key 4d6a714c69676e425a6a434358504564 esp
exec ipsec sa add 100015 spi 200015 crypto-alg aes-gcm-128 crypto-key 4d6a714c69676e425a6a434358504564 esp
exec ipsec tunnel protect ipip15 sa-out 15 sa-in 100015 add
exec set interface ip address loop0 100.0.16.1/32
exec create ipip tunnel src 100.0.16.1 dst 200.0.0.102 p2p
exec ipsec sa add 16 spi 100016 crypto-alg aes-gcm-128 crypto-key 75624f5a51574575506c734f66416271 esp
exec ipsec sa add 100016 spi 200016 crypto-alg aes-gcm-128 crypto-key 75624f5a51574575506c734f66416271 esp
exec ipsec tunnel protect ipip16 sa-out 16 sa-in 100016 add
exec set interface ip address loop0 100.0.17.1/32
exec create ipip tunnel src 100.0.17.1 dst 200.0.0.102 p2p
exec ipsec sa add 17 spi 100017 crypto-alg aes-gcm-128 crypto-key 61484f59455871735343726f4e626578 esp
exec ipsec sa add 100017 spi 200017 crypto-alg aes-gcm-128 crypto-key 61484f59455871735343726f4e626578 esp
exec ipsec tunnel protect ipip17 sa-out 17 sa-in 100017 add
exec set interface ip address loop0 100.0.18.1/32
exec create ipip tunnel src 100.0.18.1 dst 200.0.0.102 p2p
exec ipsec sa add 18 spi 100018 crypto-alg aes-gcm-128 crypto-key 474662596b465379556755456a465269 esp
exec ipsec sa add 100018 spi 200018 crypto-alg aes-gcm-128 crypto-key 474662596b465379556755456a465269 esp
exec ipsec tunnel protect ipip18 sa-out 18 sa-in 100018 add
exec set interface ip address loop0 100.0.19.1/32
exec create ipip tunnel src 100.0.19.1 dst 200.0.0.102 p2p
exec ipsec sa add 19 spi 100019 crypto-alg aes-gcm-128 crypto-key 4171654949627464456b696542696546 esp
exec ipsec sa add 100019 spi 200019 crypto-alg aes-gcm-128 crypto-key 4171654949627464456b696542696546 esp
exec ipsec tunnel protect ipip19 sa-out 19 sa-in 100019 add
exec set interface ip address loop0 100.0.20.1/32
exec create ipip tunnel src 100.0.20.1 dst 200.0.0.102 p2p
exec ipsec sa add 20 spi 100020 crypto-alg aes-gcm-128 crypto-key 7447516d6177716e774275646d765a4f esp
exec ipsec sa add 100020 spi 200020 crypto-alg aes-gcm-128 crypto-key 7447516d6177716e774275646d765a4f esp
exec ipsec tunnel protect ipip20 sa-out 20 sa-in 100020 add
exec set interface ip address loop0 100.0.21.1/32
exec create ipip tunnel src 100.0.21.1 dst 200.0.0.102 p2p
exec ipsec sa add 21 spi 100021 crypto-alg aes-gcm-128 crypto-key 584d644647567463596247715a6a6174 esp
exec ipsec sa add 100021 spi 200021 crypto-alg aes-gcm-128 crypto-key 584d644647567463596247715a6a6174 esp
exec ipsec tunnel protect ipip21 sa-out 21 sa-in 100021 add
exec set interface ip address loop0 100.0.22.1/32
exec create ipip tunnel src 100.0.22.1 dst 200.0.0.102 p2p
exec ipsec sa add 22 spi 100022 crypto-alg aes-gcm-128 crypto-key 48527a4a4b54425777514f41434f5446 esp
exec ipsec sa add 100022 spi 200022 crypto-alg aes-gcm-128 crypto-key 48527a4a4b54425777514f41434f5446 esp
exec ipsec tunnel protect ipip22 sa-out 22 sa-in 100022 add
exec set interface ip address loop0 100.0.23.1/32
exec create ipip tunnel src 100.0.23.1 dst 200.0.0.102 p2p
exec ipsec sa add 23 spi 100023 crypto-alg aes-gcm-128 crypto-key 495571777251436172576f455a556f43 esp
exec ipsec sa add 100023 spi 200023 crypto-alg aes-gcm-128 crypto-key 495571777251436172576f455a556f43 esp
exec ipsec tunnel protect ipip23 sa-out 23 sa-in 100023 add
exec set interface ip address loop0 100.0.24.1/32
exec create ipip tunnel src 100.0.24.1 dst 200.0.0.102 p2p
exec ipsec sa add 24 spi 100024 crypto-alg aes-gcm-128 crypto-key 67796866644f4b616647546b4c717656 esp
exec ipsec sa add 100024 spi 200024 crypto-alg aes-gcm-128 crypto-key 67796866644f4b616647546b4c717656 esp
exec ipsec tunnel protect ipip24 sa-out 24 sa-in 100024 add
exec set interface ip address loop0 100.0.25.1/32
exec create ipip tunnel src 100.0.25.1 dst 200.0.0.102 p2p
exec ipsec sa add 25 spi 100025 crypto-alg aes-gcm-128 crypto-key 69516450726b4f72597043464b49594b esp
exec ipsec sa add 100025 spi 200025 crypto-alg aes-gcm-128 crypto-key 69516450726b4f72597043464b49594b esp
exec ipsec tunnel protect ipip25 sa-out 25 sa-in 100025 add
exec set interface ip address loop0 100.0.26.1/32
exec create ipip tunnel src 100.0.26.1 dst 200.0.0.102 p2p
exec ipsec sa add 26 spi 100026 crypto-alg aes-gcm-128 crypto-key 4d6d6e67736e676f6f59554f6e537379 esp
exec ipsec sa add 100026 spi 200026 crypto-alg aes-gcm-128 crypto-key 4d6d6e67736e676f6f59554f6e537379 esp
exec ipsec tunnel protect ipip26 sa-out 26 sa-in 100026 add
exec set interface ip address loop0 100.0.27.1/32
exec create ipip tunnel src 100.0.27.1 dst 200.0.0.102 p2p
exec ipsec sa add 27 spi 100027 crypto-alg aes-gcm-128 crypto-key 6567655967414650674d456374685775 esp
exec ipsec sa add 100027 spi 200027 crypto-alg aes-gcm-128 crypto-key 6567655967414650674d456374685775 esp
exec ipsec tunnel protect ipip27 sa-out 27 sa-in 100027 add
exec set interface ip address loop0 100.0.28.1/32
exec create ipip tunnel src 100.0.28.1 dst 200.0.0.102 p2p
exec ipsec sa add 28 spi 100028 crypto-alg aes-gcm-128 crypto-key 7141544d4c7a5064717463556f64736f esp
exec ipsec sa add 100028 spi 200028 crypto-alg aes-gcm-128 crypto-key 7141544d4c7a5064717463556f64736f esp
exec ipsec tunnel protect ipip28 sa-out 28 sa-in 100028 add
exec set interface ip address loop0 100.0.29.1/32
exec create ipip tunnel src 100.0.29.1 dst 200.0.0.102 p2p
exec ipsec sa add 29 spi 100029 crypto-alg aes-gcm-128 crypto-key 466b6852765a665170774374544e4f4d esp
exec ipsec sa add 100029 spi 200029 crypto-alg aes-gcm-128 crypto-key 466b6852765a665170774374544e4f4d esp
exec ipsec tunnel protect ipip29 sa-out 29 sa-in 100029 add
exec set interface ip address loop0 100.0.30.1/32
exec create ipip tunnel src 100.0.30.1 dst 200.0.0.102 p2p
exec ipsec sa add 30 spi 100030 crypto-alg aes-gcm-128 crypto-key 4e746c6c414c674678587651495a7149 esp
exec ipsec sa add 100030 spi 200030 crypto-alg aes-gcm-128 crypto-key 4e746c6c414c674678587651495a7149 esp
exec ipsec tunnel protect ipip30 sa-out 30 sa-in 100030 add
exec set interface ip address loop0 100.0.31.1/32
exec create ipip tunnel src 100.0.31.1 dst 200.0.0.102 p2p
exec ipsec sa add 31 spi 100031 crypto-alg aes-gcm-128 crypto-key 63727a5858614f6f58554a7854746f76 esp
exec ipsec sa add 100031 spi 200031 crypto-alg aes-gcm-128 crypto-key 63727a5858614f6f58554a7854746f76 esp
exec ipsec tunnel protect ipip31 sa-out 31 sa-in 100031 add
exec set interface ip address loop0 100.0.32.1/32
exec create ipip tunnel src 100.0.32.1 dst 200.0.0.102 p2p
exec ipsec sa add 32 spi 100032 crypto-alg aes-gcm-128 crypto-key 7554754b4756626d62617447654e4c4e esp
exec ipsec sa add 100032 spi 200032 crypto-alg aes-gcm-128 crypto-key 7554754b4756626d62617447654e4c4e esp
exec ipsec tunnel protect ipip32 sa-out 32 sa-in 100032 add
exec set interface ip address loop0 100.0.33.1/32
exec create ipip tunnel src 100.0.33.1 dst 200.0.0.102 p2p
exec ipsec sa add 33 spi 100033 crypto-alg aes-gcm-128 crypto-key 59654f4a6d754461786f6843656d5943 esp
exec ipsec sa add 100033 spi 200033 crypto-alg aes-gcm-128 crypto-key 59654f4a6d754461786f6843656d5943 esp
exec ipsec tunnel protect ipip33 sa-out 33 sa-in 100033 add
exec set interface ip address loop0 100.0.34.1/32
exec create ipip tunnel src 100.0.34.1 dst 200.0.0.102 p2p
exec ipsec sa add 34 spi 100034 crypto-alg aes-gcm-128 crypto-key 797570675474635661696566696d5247 esp
exec ipsec sa add 100034 spi 200034 crypto-alg aes-gcm-128 crypto-key 797570675474635661696566696d5247 esp
exec ipsec tunnel protect ipip34 sa-out 34 sa-in 100034 add
exec set interface ip address loop0 100.0.35.1/32
exec create ipip tunnel src 100.0.35.1 dst 200.0.0.102 p2p
exec ipsec sa add 35 spi 100035 crypto-alg aes-gcm-128 crypto-key 47614c62506b6c425051667447486469 esp
exec ipsec sa add 100035 spi 200035 crypto-alg aes-gcm-128 crypto-key 47614c62506b6c425051667447486469 esp
exec ipsec tunnel protect ipip35 sa-out 35 sa-in 100035 add
exec set interface ip address loop0 100.0.36.1/32
exec create ipip tunnel src 100.0.36.1 dst 200.0.0.102 p2p
exec ipsec sa add 36 spi 100036 crypto-alg aes-gcm-128 crypto-key 476e54634a427a4a474b565943776975 esp
exec ipsec sa add 100036 spi 200036 crypto-alg aes-gcm-128 crypto-key 476e54634a427a4a474b565943776975 esp
exec ipsec tunnel protect ipip36 sa-out 36 sa-in 100036 add
exec set interface ip address loop0 100.0.37.1/32
exec create ipip tunnel src 100.0.37.1 dst 200.0.0.102 p2p
exec ipsec sa add 37 spi 100037 crypto-alg aes-gcm-128 crypto-key 4d695554466c6777674c4a51485a576f esp
exec ipsec sa add 100037 spi 200037 crypto-alg aes-gcm-128 crypto-key 4d695554466c6777674c4a51485a576f esp
exec ipsec tunnel protect ipip37 sa-out 37 sa-in 100037 add
exec set interface ip address loop0 100.0.38.1/32
exec create ipip tunnel src 100.0.38.1 dst 200.0.0.102 p2p
exec ipsec sa add 38 spi 100038 crypto-alg aes-gcm-128 crypto-key 686b6458786448747157714342756373 esp
exec ipsec sa add 100038 spi 200038 crypto-alg aes-gcm-128 crypto-key 686b6458786448747157714342756373 esp
exec ipsec tunnel protect ipip38 sa-out 38 sa-in 100038 add
exec set interface ip address loop0 100.0.39.1/32
exec create ipip tunnel src 100.0.39.1 dst 200.0.0.102 p2p
exec ipsec sa add 39 spi 100039 crypto-alg aes-gcm-128 crypto-key 55674d6f6361546f4e774447774c4c77 esp
exec ipsec sa add 100039 spi 200039 crypto-alg aes-gcm-128 crypto-key 55674d6f6361546f4e774447774c4c77 esp
exec ipsec tunnel protect ipip39 sa-out 39 sa-in 100039 add
exec set interface unnumbered ipip0 use TenGigabitEthernet8/0/0
exec set interface state ipip0 up
exec ip route add 20.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use TenGigabitEthernet8/0/0
exec set interface state ipip1 up
exec ip route add 20.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use TenGigabitEthernet8/0/0
exec set interface state ipip2 up
exec ip route add 20.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use TenGigabitEthernet8/0/0
exec set interface state ipip3 up
exec ip route add 20.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use TenGigabitEthernet8/0/0
exec set interface state ipip4 up
exec ip route add 20.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use TenGigabitEthernet8/0/0
exec set interface state ipip5 up
exec ip route add 20.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use TenGigabitEthernet8/0/0
exec set interface state ipip6 up
exec ip route add 20.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use TenGigabitEthernet8/0/0
exec set interface state ipip7 up
exec ip route add 20.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use TenGigabitEthernet8/0/0
exec set interface state ipip8 up
exec ip route add 20.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use TenGigabitEthernet8/0/0
exec set interface state ipip9 up
exec ip route add 20.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use TenGigabitEthernet8/0/0
exec set interface state ipip10 up
exec ip route add 20.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use TenGigabitEthernet8/0/0
exec set interface state ipip11 up
exec ip route add 20.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use TenGigabitEthernet8/0/0
exec set interface state ipip12 up
exec ip route add 20.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use TenGigabitEthernet8/0/0
exec set interface state ipip13 up
exec ip route add 20.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use TenGigabitEthernet8/0/0
exec set interface state ipip14 up
exec ip route add 20.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use TenGigabitEthernet8/0/0
exec set interface state ipip15 up
exec ip route add 20.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use TenGigabitEthernet8/0/0
exec set interface state ipip16 up
exec ip route add 20.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use TenGigabitEthernet8/0/0
exec set interface state ipip17 up
exec ip route add 20.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use TenGigabitEthernet8/0/0
exec set interface state ipip18 up
exec ip route add 20.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use TenGigabitEthernet8/0/0
exec set interface state ipip19 up
exec ip route add 20.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use TenGigabitEthernet8/0/0
exec set interface state ipip20 up
exec ip route add 20.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use TenGigabitEthernet8/0/0
exec set interface state ipip21 up
exec ip route add 20.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use TenGigabitEthernet8/0/0
exec set interface state ipip22 up
exec ip route add 20.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use TenGigabitEthernet8/0/0
exec set interface state ipip23 up
exec ip route add 20.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use TenGigabitEthernet8/0/0
exec set interface state ipip24 up
exec ip route add 20.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use TenGigabitEthernet8/0/0
exec set interface state ipip25 up
exec ip route add 20.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use TenGigabitEthernet8/0/0
exec set interface state ipip26 up
exec ip route add 20.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use TenGigabitEthernet8/0/0
exec set interface state ipip27 up
exec ip route add 20.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use TenGigabitEthernet8/0/0
exec set interface state ipip28 up
exec ip route add 20.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use TenGigabitEthernet8/0/0
exec set interface state ipip29 up
exec ip route add 20.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use TenGigabitEthernet8/0/0
exec set interface state ipip30 up
exec ip route add 20.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use TenGigabitEthernet8/0/0
exec set interface state ipip31 up
exec ip route add 20.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use TenGigabitEthernet8/0/0
exec set interface state ipip32 up
exec ip route add 20.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use TenGigabitEthernet8/0/0
exec set interface state ipip33 up
exec ip route add 20.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use TenGigabitEthernet8/0/0
exec set interface state ipip34 up
exec ip route add 20.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use TenGigabitEthernet8/0/0
exec set interface state ipip35 up
exec ip route add 20.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use TenGigabitEthernet8/0/0
exec set interface state ipip36 up
exec ip route add 20.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use TenGigabitEthernet8/0/0
exec set interface state ipip37 up
exec ip route add 20.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use TenGigabitEthernet8/0/0
exec set interface state ipip38 up
exec ip route add 20.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use TenGigabitEthernet8/0/0
exec set interface state ipip39 up
exec ip route add 20.0.0.39/32 via ipip39
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec set interface ip address TenGigabitEthernet8/0/0 200.0.0.102/24.0
exec create ipip tunnel src 200.0.0.102 dst 100.0.0.1 p2p
exec ipsec sa add 100000 spi 200000 crypto-alg aes-gcm-128 crypto-key 6e574c534f6d56445364726e4e695a53 esp
exec ipsec sa add 0 spi 100000 crypto-alg aes-gcm-128 crypto-key 6e574c534f6d56445364726e4e695a53 esp
exec ipsec tunnel protect ipip0 sa-out 100000 sa-in 0 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.1.1 p2p
exec ipsec sa add 100001 spi 200001 crypto-alg aes-gcm-128 crypto-key 595a6c5075434a7045676c5459527976 esp
exec ipsec sa add 1 spi 100001 crypto-alg aes-gcm-128 crypto-key 595a6c5075434a7045676c5459527976 esp
exec ipsec tunnel protect ipip1 sa-out 100001 sa-in 1 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.2.1 p2p
exec ipsec sa add 100002 spi 200002 crypto-alg aes-gcm-128 crypto-key 67727779627a5949446976446f427758 esp
exec ipsec sa add 2 spi 100002 crypto-alg aes-gcm-128 crypto-key 67727779627a5949446976446f427758 esp
exec ipsec tunnel protect ipip2 sa-out 100002 sa-in 2 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.3.1 p2p
exec ipsec sa add 100003 spi 200003 crypto-alg aes-gcm-128 crypto-key 6465417055715169696561594a556369 esp
exec ipsec sa add 3 spi 100003 crypto-alg aes-gcm-128 crypto-key 6465417055715169696561594a556369 esp
exec ipsec tunnel protect ipip3 sa-out 100003 sa-in 3 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.4.1 p2p
exec ipsec sa add 100004 spi 200004 crypto-alg aes-gcm-128 crypto-key 414b634350466d6341586d6b53564a6e esp
exec ipsec sa add 4 spi 100004 crypto-alg aes-gcm-128 crypto-key 414b634350466d6341586d6b53564a6e esp
exec ipsec tunnel protect ipip4 sa-out 100004 sa-in 4 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.5.1 p2p
exec ipsec sa add 100005 spi 200005 crypto-alg aes-gcm-128 crypto-key 4b57636e4f526e45465045544d4e4f68 esp
exec ipsec sa add 5 spi 100005 crypto-alg aes-gcm-128 crypto-key 4b57636e4f526e45465045544d4e4f68 esp
exec ipsec tunnel protect ipip5 sa-out 100005 sa-in 5 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.6.1 p2p
exec ipsec sa add 100006 spi 200006 crypto-alg aes-gcm-128 crypto-key 424b734c7a4874416979415964444c65 esp
exec ipsec sa add 6 spi 100006 crypto-alg aes-gcm-128 crypto-key 424b734c7a4874416979415964444c65 esp
exec ipsec tunnel protect ipip6 sa-out 100006 sa-in 6 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.7.1 p2p
exec ipsec sa add 100007 spi 200007 crypto-alg aes-gcm-128 crypto-key 4f594359497654666451514c77644675 esp
exec ipsec sa add 7 spi 100007 crypto-alg aes-gcm-128 crypto-key 4f594359497654666451514c77644675 esp
exec ipsec tunnel protect ipip7 sa-out 100007 sa-in 7 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.8.1 p2p
exec ipsec sa add 100008 spi 200008 crypto-alg aes-gcm-128 crypto-key 7858454855784d50554949776768446d esp
exec ipsec sa add 8 spi 100008 crypto-alg aes-gcm-128 crypto-key 7858454855784d50554949776768446d esp
exec ipsec tunnel protect ipip8 sa-out 100008 sa-in 8 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.9.1 p2p
exec ipsec sa add 100009 spi 200009 crypto-alg aes-gcm-128 crypto-key 5378495a59584941764b6c6b745a417a esp
exec ipsec sa add 9 spi 100009 crypto-alg aes-gcm-128 crypto-key 5378495a59584941764b6c6b745a417a esp
exec ipsec tunnel protect ipip9 sa-out 100009 sa-in 9 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.10.1 p2p
exec ipsec sa add 100010 spi 200010 crypto-alg aes-gcm-128 crypto-key 664e4b64494b684b58666a566d724d42 esp
exec ipsec sa add 10 spi 100010 crypto-alg aes-gcm-128 crypto-key 664e4b64494b684b58666a566d724d42 esp
exec ipsec tunnel protect ipip10 sa-out 100010 sa-in 10 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.11.1 p2p
exec ipsec sa add 100011 spi 200011 crypto-alg aes-gcm-128 crypto-key 76596a706d6279707a49557675665464 esp
exec ipsec sa add 11 spi 100011 crypto-alg aes-gcm-128 crypto-key 76596a706d6279707a49557675665464 esp
exec ipsec tunnel protect ipip11 sa-out 100011 sa-in 11 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.12.1 p2p
exec ipsec sa add 100012 spi 200012 crypto-alg aes-gcm-128 crypto-key 4a4147556962567363464b6c68507a4a esp
exec ipsec sa add 12 spi 100012 crypto-alg aes-gcm-128 crypto-key 4a4147556962567363464b6c68507a4a esp
exec ipsec tunnel protect ipip12 sa-out 100012 sa-in 12 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.13.1 p2p
exec ipsec sa add 100013 spi 200013 crypto-alg aes-gcm-128 crypto-key 754b4273637a54634d49634849465942 esp
exec ipsec sa add 13 spi 100013 crypto-alg aes-gcm-128 crypto-key 754b4273637a54634d49634849465942 esp
exec ipsec tunnel protect ipip13 sa-out 100013 sa-in 13 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.14.1 p2p
exec ipsec sa add 100014 spi 200014 crypto-alg aes-gcm-128 crypto-key 6c6a4742655449424a517953487a4f6e esp
exec ipsec sa add 14 spi 100014 crypto-alg aes-gcm-128 crypto-key 6c6a4742655449424a517953487a4f6e esp
exec ipsec tunnel protect ipip14 sa-out 100014 sa-in 14 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.15.1 p2p
exec ipsec sa add 100015 spi 200015 crypto-alg aes-gcm-128 crypto-key 4d6a714c69676e425a6a434358504564 esp
exec ipsec sa add 15 spi 100015 crypto-alg aes-gcm-128 crypto-key 4d6a714c69676e425a6a434358504564 esp
exec ipsec tunnel protect ipip15 sa-out 100015 sa-in 15 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.16.1 p2p
exec ipsec sa add 100016 spi 200016 crypto-alg aes-gcm-128 crypto-key 75624f5a51574575506c734f66416271 esp
exec ipsec sa add 16 spi 100016 crypto-alg aes-gcm-128 crypto-key 75624f5a51574575506c734f66416271 esp
exec ipsec tunnel protect ipip16 sa-out 100016 sa-in 16 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.17.1 p2p
exec ipsec sa add 100017 spi 200017 crypto-alg aes-gcm-128 crypto-key 61484f59455871735343726f4e626578 esp
exec ipsec sa add 17 spi 100017 crypto-alg aes-gcm-128 crypto-key 61484f59455871735343726f4e626578 esp
exec ipsec tunnel protect ipip17 sa-out 100017 sa-in 17 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.18.1 p2p
exec ipsec sa add 100018 spi 200018 crypto-alg aes-gcm-128 crypto-key 474662596b465379556755456a465269 esp
exec ipsec sa add 18 spi 100018 crypto-alg aes-gcm-128 crypto-key 474662596b465379556755456a465269 esp
exec ipsec tunnel protect ipip18 sa-out 100018 sa-in 18 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.19.1 p2p
exec ipsec sa add 100019 spi 200019 crypto-alg aes-gcm-128 crypto-key 4171654949627464456b696542696546 esp
exec ipsec sa add 19 spi 100019 crypto-alg aes-gcm-128 crypto-key 4171654949627464456b696542696546 esp
exec ipsec tunnel protect ipip19 sa-out 100019 sa-in 19 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.20.1 p2p
exec ipsec sa add 100020 spi 200020 crypto-alg aes-gcm-128 crypto-key 7447516d6177716e774275646d765a4f esp
exec ipsec sa add 20 spi 100020 crypto-alg aes-gcm-128 crypto-key 7447516d6177716e774275646d765a4f esp
exec ipsec tunnel protect ipip20 sa-out 100020 sa-in 20 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.21.1 p2p
exec ipsec sa add 100021 spi 200021 crypto-alg aes-gcm-128 crypto-key 584d644647567463596247715a6a6174 esp
exec ipsec sa add 21 spi 100021 crypto-alg aes-gcm-128 crypto-key 584d644647567463596247715a6a6174 esp
exec ipsec tunnel protect ipip21 sa-out 100021 sa-in 21 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.22.1 p2p
exec ipsec sa add 100022 spi 200022 crypto-alg aes-gcm-128 crypto-key 48527a4a4b54425777514f41434f5446 esp
exec ipsec sa add 22 spi 100022 crypto-alg aes-gcm-128 crypto-key 48527a4a4b54425777514f41434f5446 esp
exec ipsec tunnel protect ipip22 sa-out 100022 sa-in 22 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.23.1 p2p
exec ipsec sa add 100023 spi 200023 crypto-alg aes-gcm-128 crypto-key 495571777251436172576f455a556f43 esp
exec ipsec sa add 23 spi 100023 crypto-alg aes-gcm-128 crypto-key 495571777251436172576f455a556f43 esp
exec ipsec tunnel protect ipip23 sa-out 100023 sa-in 23 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.24.1 p2p
exec ipsec sa add 100024 spi 200024 crypto-alg aes-gcm-128 crypto-key 67796866644f4b616647546b4c717656 esp
exec ipsec sa add 24 spi 100024 crypto-alg aes-gcm-128 crypto-key 67796866644f4b616647546b4c717656 esp
exec ipsec tunnel protect ipip24 sa-out 100024 sa-in 24 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.25.1 p2p
exec ipsec sa add 100025 spi 200025 crypto-alg aes-gcm-128 crypto-key 69516450726b4f72597043464b49594b esp
exec ipsec sa add 25 spi 100025 crypto-alg aes-gcm-128 crypto-key 69516450726b4f72597043464b49594b esp
exec ipsec tunnel protect ipip25 sa-out 100025 sa-in 25 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.26.1 p2p
exec ipsec sa add 100026 spi 200026 crypto-alg aes-gcm-128 crypto-key 4d6d6e67736e676f6f59554f6e537379 esp
exec ipsec sa add 26 spi 100026 crypto-alg aes-gcm-128 crypto-key 4d6d6e67736e676f6f59554f6e537379 esp
exec ipsec tunnel protect ipip26 sa-out 100026 sa-in 26 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.27.1 p2p
exec ipsec sa add 100027 spi 200027 crypto-alg aes-gcm-128 crypto-key 6567655967414650674d456374685775 esp
exec ipsec sa add 27 spi 100027 crypto-alg aes-gcm-128 crypto-key 6567655967414650674d456374685775 esp
exec ipsec tunnel protect ipip27 sa-out 100027 sa-in 27 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.28.1 p2p
exec ipsec sa add 100028 spi 200028 crypto-alg aes-gcm-128 crypto-key 7141544d4c7a5064717463556f64736f esp
exec ipsec sa add 28 spi 100028 crypto-alg aes-gcm-128 crypto-key 7141544d4c7a5064717463556f64736f esp
exec ipsec tunnel protect ipip28 sa-out 100028 sa-in 28 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.29.1 p2p
exec ipsec sa add 100029 spi 200029 crypto-alg aes-gcm-128 crypto-key 466b6852765a665170774374544e4f4d esp
exec ipsec sa add 29 spi 100029 crypto-alg aes-gcm-128 crypto-key 466b6852765a665170774374544e4f4d esp
exec ipsec tunnel protect ipip29 sa-out 100029 sa-in 29 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.30.1 p2p
exec ipsec sa add 100030 spi 200030 crypto-alg aes-gcm-128 crypto-key 4e746c6c414c674678587651495a7149 esp
exec ipsec sa add 30 spi 100030 crypto-alg aes-gcm-128 crypto-key 4e746c6c414c674678587651495a7149 esp
exec ipsec tunnel protect ipip30 sa-out 100030 sa-in 30 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.31.1 p2p
exec ipsec sa add 100031 spi 200031 crypto-alg aes-gcm-128 crypto-key 63727a5858614f6f58554a7854746f76 esp
exec ipsec sa add 31 spi 100031 crypto-alg aes-gcm-128 crypto-key 63727a5858614f6f58554a7854746f76 esp
exec ipsec tunnel protect ipip31 sa-out 100031 sa-in 31 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.32.1 p2p
exec ipsec sa add 100032 spi 200032 crypto-alg aes-gcm-128 crypto-key 7554754b4756626d62617447654e4c4e esp
exec ipsec sa add 32 spi 100032 crypto-alg aes-gcm-128 crypto-key 7554754b4756626d62617447654e4c4e esp
exec ipsec tunnel protect ipip32 sa-out 100032 sa-in 32 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.33.1 p2p
exec ipsec sa add 100033 spi 200033 crypto-alg aes-gcm-128 crypto-key 59654f4a6d754461786f6843656d5943 esp
exec ipsec sa add 33 spi 100033 crypto-alg aes-gcm-128 crypto-key 59654f4a6d754461786f6843656d5943 esp
exec ipsec tunnel protect ipip33 sa-out 100033 sa-in 33 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.34.1 p2p
exec ipsec sa add 100034 spi 200034 crypto-alg aes-gcm-128 crypto-key 797570675474635661696566696d5247 esp
exec ipsec sa add 34 spi 100034 crypto-alg aes-gcm-128 crypto-key 797570675474635661696566696d5247 esp
exec ipsec tunnel protect ipip34 sa-out 100034 sa-in 34 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.35.1 p2p
exec ipsec sa add 100035 spi 200035 crypto-alg aes-gcm-128 crypto-key 47614c62506b6c425051667447486469 esp
exec ipsec sa add 35 spi 100035 crypto-alg aes-gcm-128 crypto-key 47614c62506b6c425051667447486469 esp
exec ipsec tunnel protect ipip35 sa-out 100035 sa-in 35 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.36.1 p2p
exec ipsec sa add 100036 spi 200036 crypto-alg aes-gcm-128 crypto-key 476e54634a427a4a474b565943776975 esp
exec ipsec sa add 36 spi 100036 crypto-alg aes-gcm-128 crypto-key 476e54634a427a4a474b565943776975 esp
exec ipsec tunnel protect ipip36 sa-out 100036 sa-in 36 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.37.1 p2p
exec ipsec sa add 100037 spi 200037 crypto-alg aes-gcm-128 crypto-key 4d695554466c6777674c4a51485a576f esp
exec ipsec sa add 37 spi 100037 crypto-alg aes-gcm-128 crypto-key 4d695554466c6777674c4a51485a576f esp
exec ipsec tunnel protect ipip37 sa-out 100037 sa-in 37 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.38.1 p2p
exec ipsec sa add 100038 spi 200038 crypto-alg aes-gcm-128 crypto-key 686b6458786448747157714342756373 esp
exec ipsec sa add 38 spi 100038 crypto-alg aes-gcm-128 crypto-key 686b6458786448747157714342756373 esp
exec ipsec tunnel protect ipip38 sa-out 100038 sa-in 38 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.39.1 p2p
exec ipsec sa add 100039 spi 200039 crypto-alg aes-gcm-128 crypto-key 55674d6f6361546f4e774447774c4c77 esp
exec ipsec sa add 39 spi 100039 crypto-alg aes-gcm-128 crypto-key 55674d6f6361546f4e774447774c4c77 esp
exec ipsec tunnel protect ipip39 sa-out 100039 sa-in 39 add
exec ip route add 100.0.0.1/8 via 200.0.0.101 TenGigabitEthernet8/0/0
exec set interface unnumbered ipip0 use TenGigabitEthernet8/0/0
exec set interface state ipip0 up
exec ip route add 10.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use TenGigabitEthernet8/0/0
exec set interface state ipip1 up
exec ip route add 10.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use TenGigabitEthernet8/0/0
exec set interface state ipip2 up
exec ip route add 10.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use TenGigabitEthernet8/0/0
exec set interface state ipip3 up
exec ip route add 10.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use TenGigabitEthernet8/0/0
exec set interface state ipip4 up
exec ip route add 10.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use TenGigabitEthernet8/0/0
exec set interface state ipip5 up
exec ip route add 10.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use TenGigabitEthernet8/0/0
exec set interface state ipip6 up
exec ip route add 10.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use TenGigabitEthernet8/0/0
exec set interface state ipip7 up
exec ip route add 10.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use TenGigabitEthernet8/0/0
exec set interface state ipip8 up
exec ip route add 10.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use TenGigabitEthernet8/0/0
exec set interface state ipip9 up
exec ip route add 10.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use TenGigabitEthernet8/0/0
exec set interface state ipip10 up
exec ip route add 10.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use TenGigabitEthernet8/0/0
exec set interface state ipip11 up
exec ip route add 10.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use TenGigabitEthernet8/0/0
exec set interface state ipip12 up
exec ip route add 10.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use TenGigabitEthernet8/0/0
exec set interface state ipip13 up
exec ip route add 10.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use TenGigabitEthernet8/0/0
exec set interface state ipip14 up
exec ip route add 10.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use TenGigabitEthernet8/0/0
exec set interface state ipip15 up
exec ip route add 10.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use TenGigabitEthernet8/0/0
exec set interface state ipip16 up
exec ip route add 10.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use TenGigabitEthernet8/0/0
exec set interface state ipip17 up
exec ip route add 10.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use TenGigabitEthernet8/0/0
exec set interface state ipip18 up
exec ip route add 10.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use TenGigabitEthernet8/0/0
exec set interface state ipip19 up
exec ip route add 10.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use TenGigabitEthernet8/0/0
exec set interface state ipip20 up
exec ip route add 10.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use TenGigabitEthernet8/0/0
exec set interface state ipip21 up
exec ip route add 10.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use TenGigabitEthernet8/0/0
exec set interface state ipip22 up
exec ip route add 10.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use TenGigabitEthernet8/0/0
exec set interface state ipip23 up
exec ip route add 10.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use TenGigabitEthernet8/0/0
exec set interface state ipip24 up
exec ip route add 10.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use TenGigabitEthernet8/0/0
exec set interface state ipip25 up
exec ip route add 10.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use TenGigabitEthernet8/0/0
exec set interface state ipip26 up
exec ip route add 10.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use TenGigabitEthernet8/0/0
exec set interface state ipip27 up
exec ip route add 10.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use TenGigabitEthernet8/0/0
exec set interface state ipip28 up
exec ip route add 10.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use TenGigabitEthernet8/0/0
exec set interface state ipip29 up
exec ip route add 10.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use TenGigabitEthernet8/0/0
exec set interface state ipip30 up
exec ip route add 10.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use TenGigabitEthernet8/0/0
exec set interface state ipip31 up
exec ip route add 10.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use TenGigabitEthernet8/0/0
exec set interface state ipip32 up
exec ip route add 10.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use TenGigabitEthernet8/0/0
exec set interface state ipip33 up
exec ip route add 10.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use TenGigabitEthernet8/0/0
exec set interface state ipip34 up
exec ip route add 10.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use TenGigabitEthernet8/0/0
exec set interface state ipip35 up
exec ip route add 10.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use TenGigabitEthernet8/0/0
exec set interface state ipip36 up
exec ip route add 10.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use TenGigabitEthernet8/0/0
exec set interface state ipip37 up
exec ip route add 10.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use TenGigabitEthernet8/0/0
exec set interface state ipip38 up
exec ip route add 10.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use TenGigabitEthernet8/0/0
exec set interface state ipip39 up
exec ip route add 10.0.0.39/32 via ipip39

 64b-2t2c-ethip4ipsec40tnlsw- 
ip4base-int-aes128gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec create loopback interface
exec set interface state loop0 up
exec set interface ip address TenGigabitEthernet8/0/0 200.0.0.101/24
exec set ip neighbor TenGigabitEthernet8/0/0 200.0.0.102 ac:1f:6b:57:57:fe static
exec set interface ip address loop0 100.0.0.1/32
exec create ipip tunnel src 100.0.0.1 dst 200.0.0.102 p2p
exec ipsec sa add 0 spi 100000 crypto-alg aes-gcm-128 crypto-key 69695368445369636a4f53774165754a esp
exec ipsec sa add 100000 spi 200000 crypto-alg aes-gcm-128 crypto-key 69695368445369636a4f53774165754a esp
exec ipsec tunnel protect ipip0 sa-out 0 sa-in 100000 add
exec set interface ip address loop0 100.0.1.1/32
exec create ipip tunnel src 100.0.1.1 dst 200.0.0.102 p2p
exec ipsec sa add 1 spi 100001 crypto-alg aes-gcm-128 crypto-key 5879744a4d694376534f48596d657a77 esp
exec ipsec sa add 100001 spi 200001 crypto-alg aes-gcm-128 crypto-key 5879744a4d694376534f48596d657a77 esp
exec ipsec tunnel protect ipip1 sa-out 1 sa-in 100001 add
exec set interface ip address loop0 100.0.2.1/32
exec create ipip tunnel src 100.0.2.1 dst 200.0.0.102 p2p
exec ipsec sa add 2 spi 100002 crypto-alg aes-gcm-128 crypto-key 4d6a5a78666c4e647345706341797168 esp
exec ipsec sa add 100002 spi 200002 crypto-alg aes-gcm-128 crypto-key 4d6a5a78666c4e647345706341797168 esp
exec ipsec tunnel protect ipip2 sa-out 2 sa-in 100002 add
exec set interface ip address loop0 100.0.3.1/32
exec create ipip tunnel src 100.0.3.1 dst 200.0.0.102 p2p
exec ipsec sa add 3 spi 100003 crypto-alg aes-gcm-128 crypto-key 416e5a7669516873704a50636e505350 esp
exec ipsec sa add 100003 spi 200003 crypto-alg aes-gcm-128 crypto-key 416e5a7669516873704a50636e505350 esp
exec ipsec tunnel protect ipip3 sa-out 3 sa-in 100003 add
exec set interface ip address loop0 100.0.4.1/32
exec create ipip tunnel src 100.0.4.1 dst 200.0.0.102 p2p
exec ipsec sa add 4 spi 100004 crypto-alg aes-gcm-128 crypto-key 7266626572734e6462415a65586b5656 esp
exec ipsec sa add 100004 spi 200004 crypto-alg aes-gcm-128 crypto-key 7266626572734e6462415a65586b5656 esp
exec ipsec tunnel protect ipip4 sa-out 4 sa-in 100004 add
exec set interface ip address loop0 100.0.5.1/32
exec create ipip tunnel src 100.0.5.1 dst 200.0.0.102 p2p
exec ipsec sa add 5 spi 100005 crypto-alg aes-gcm-128 crypto-key 79424d794b526e6f636358625a59446a esp
exec ipsec sa add 100005 spi 200005 crypto-alg aes-gcm-128 crypto-key 79424d794b526e6f636358625a59446a esp
exec ipsec tunnel protect ipip5 sa-out 5 sa-in 100005 add
exec set interface ip address loop0 100.0.6.1/32
exec create ipip tunnel src 100.0.6.1 dst 200.0.0.102 p2p
exec ipsec sa add 6 spi 100006 crypto-alg aes-gcm-128 crypto-key 546f70676c55684e57717873524f6e76 esp
exec ipsec sa add 100006 spi 200006 crypto-alg aes-gcm-128 crypto-key 546f70676c55684e57717873524f6e76 esp
exec ipsec tunnel protect ipip6 sa-out 6 sa-in 100006 add
exec set interface ip address loop0 100.0.7.1/32
exec create ipip tunnel src 100.0.7.1 dst 200.0.0.102 p2p
exec ipsec sa add 7 spi 100007 crypto-alg aes-gcm-128 crypto-key 65776c6941467843556544557877756c esp
exec ipsec sa add 100007 spi 200007 crypto-alg aes-gcm-128 crypto-key 65776c6941467843556544557877756c esp
exec ipsec tunnel protect ipip7 sa-out 7 sa-in 100007 add
exec set interface ip address loop0 100.0.8.1/32
exec create ipip tunnel src 100.0.8.1 dst 200.0.0.102 p2p
exec ipsec sa add 8 spi 100008 crypto-alg aes-gcm-128 crypto-key 704d4e4e7162515a7578544b59666663 esp
exec ipsec sa add 100008 spi 200008 crypto-alg aes-gcm-128 crypto-key 704d4e4e7162515a7578544b59666663 esp
exec ipsec tunnel protect ipip8 sa-out 8 sa-in 100008 add
exec set interface ip address loop0 100.0.9.1/32
exec create ipip tunnel src 100.0.9.1 dst 200.0.0.102 p2p
exec ipsec sa add 9 spi 100009 crypto-alg aes-gcm-128 crypto-key 4b4e50726145514e4a63637a69704870 esp
exec ipsec sa add 100009 spi 200009 crypto-alg aes-gcm-128 crypto-key 4b4e50726145514e4a63637a69704870 esp
exec ipsec tunnel protect ipip9 sa-out 9 sa-in 100009 add
exec set interface ip address loop0 100.0.10.1/32
exec create ipip tunnel src 100.0.10.1 dst 200.0.0.102 p2p
exec ipsec sa add 10 spi 100010 crypto-alg aes-gcm-128 crypto-key 784d4c596e536b6b4e626653594d4d4c esp
exec ipsec sa add 100010 spi 200010 crypto-alg aes-gcm-128 crypto-key 784d4c596e536b6b4e626653594d4d4c esp
exec ipsec tunnel protect ipip10 sa-out 10 sa-in 100010 add
exec set interface ip address loop0 100.0.11.1/32
exec create ipip tunnel src 100.0.11.1 dst 200.0.0.102 p2p
exec ipsec sa add 11 spi 100011 crypto-alg aes-gcm-128 crypto-key 586b654f7848437561736779576f5061 esp
exec ipsec sa add 100011 spi 200011 crypto-alg aes-gcm-128 crypto-key 586b654f7848437561736779576f5061 esp
exec ipsec tunnel protect ipip11 sa-out 11 sa-in 100011 add
exec set interface ip address loop0 100.0.12.1/32
exec create ipip tunnel src 100.0.12.1 dst 200.0.0.102 p2p
exec ipsec sa add 12 spi 100012 crypto-alg aes-gcm-128 crypto-key 476567794c79775a715856664d704661 esp
exec ipsec sa add 100012 spi 200012 crypto-alg aes-gcm-128 crypto-key 476567794c79775a715856664d704661 esp
exec ipsec tunnel protect ipip12 sa-out 12 sa-in 100012 add
exec set interface ip address loop0 100.0.13.1/32
exec create ipip tunnel src 100.0.13.1 dst 200.0.0.102 p2p
exec ipsec sa add 13 spi 100013 crypto-alg aes-gcm-128 crypto-key 53756755666e6a4e5950655767475266 esp
exec ipsec sa add 100013 spi 200013 crypto-alg aes-gcm-128 crypto-key 53756755666e6a4e5950655767475266 esp
exec ipsec tunnel protect ipip13 sa-out 13 sa-in 100013 add
exec set interface ip address loop0 100.0.14.1/32
exec create ipip tunnel src 100.0.14.1 dst 200.0.0.102 p2p
exec ipsec sa add 14 spi 100014 crypto-alg aes-gcm-128 crypto-key 7242664d624c4f476f464d716577476e esp
exec ipsec sa add 100014 spi 200014 crypto-alg aes-gcm-128 crypto-key 7242664d624c4f476f464d716577476e esp
exec ipsec tunnel protect ipip14 sa-out 14 sa-in 100014 add
exec set interface ip address loop0 100.0.15.1/32
exec create ipip tunnel src 100.0.15.1 dst 200.0.0.102 p2p
exec ipsec sa add 15 spi 100015 crypto-alg aes-gcm-128 crypto-key 6f50696351596f434142547a4d46726f esp
exec ipsec sa add 100015 spi 200015 crypto-alg aes-gcm-128 crypto-key 6f50696351596f434142547a4d46726f esp
exec ipsec tunnel protect ipip15 sa-out 15 sa-in 100015 add
exec set interface ip address loop0 100.0.16.1/32
exec create ipip tunnel src 100.0.16.1 dst 200.0.0.102 p2p
exec ipsec sa add 16 spi 100016 crypto-alg aes-gcm-128 crypto-key 4b4266745971426354636b4363787055 esp
exec ipsec sa add 100016 spi 200016 crypto-alg aes-gcm-128 crypto-key 4b4266745971426354636b4363787055 esp
exec ipsec tunnel protect ipip16 sa-out 16 sa-in 100016 add
exec set interface ip address loop0 100.0.17.1/32
exec create ipip tunnel src 100.0.17.1 dst 200.0.0.102 p2p
exec ipsec sa add 17 spi 100017 crypto-alg aes-gcm-128 crypto-key 47586e664964676f6976474468666255 esp
exec ipsec sa add 100017 spi 200017 crypto-alg aes-gcm-128 crypto-key 47586e664964676f6976474468666255 esp
exec ipsec tunnel protect ipip17 sa-out 17 sa-in 100017 add
exec set interface ip address loop0 100.0.18.1/32
exec create ipip tunnel src 100.0.18.1 dst 200.0.0.102 p2p
exec ipsec sa add 18 spi 100018 crypto-alg aes-gcm-128 crypto-key 7a4b5052744864626c59494744674f78 esp
exec ipsec sa add 100018 spi 200018 crypto-alg aes-gcm-128 crypto-key 7a4b5052744864626c59494744674f78 esp
exec ipsec tunnel protect ipip18 sa-out 18 sa-in 100018 add
exec set interface ip address loop0 100.0.19.1/32
exec create ipip tunnel src 100.0.19.1 dst 200.0.0.102 p2p
exec ipsec sa add 19 spi 100019 crypto-alg aes-gcm-128 crypto-key 61686d645743776162696254415a4845 esp
exec ipsec sa add 100019 spi 200019 crypto-alg aes-gcm-128 crypto-key 61686d645743776162696254415a4845 esp
exec ipsec tunnel protect ipip19 sa-out 19 sa-in 100019 add
exec set interface ip address loop0 100.0.20.1/32
exec create ipip tunnel src 100.0.20.1 dst 200.0.0.102 p2p
exec ipsec sa add 20 spi 100020 crypto-alg aes-gcm-128 crypto-key 66744358524b484f6c4f7744534e7a4b esp
exec ipsec sa add 100020 spi 200020 crypto-alg aes-gcm-128 crypto-key 66744358524b484f6c4f7744534e7a4b esp
exec ipsec tunnel protect ipip20 sa-out 20 sa-in 100020 add
exec set interface ip address loop0 100.0.21.1/32
exec create ipip tunnel src 100.0.21.1 dst 200.0.0.102 p2p
exec ipsec sa add 21 spi 100021 crypto-alg aes-gcm-128 crypto-key 4e744f63585a6b65487a596f53436179 esp
exec ipsec sa add 100021 spi 200021 crypto-alg aes-gcm-128 crypto-key 4e744f63585a6b65487a596f53436179 esp
exec ipsec tunnel protect ipip21 sa-out 21 sa-in 100021 add
exec set interface ip address loop0 100.0.22.1/32
exec create ipip tunnel src 100.0.22.1 dst 200.0.0.102 p2p
exec ipsec sa add 22 spi 100022 crypto-alg aes-gcm-128 crypto-key 41516f76734e44435359544d5a73596b esp
exec ipsec sa add 100022 spi 200022 crypto-alg aes-gcm-128 crypto-key 41516f76734e44435359544d5a73596b esp
exec ipsec tunnel protect ipip22 sa-out 22 sa-in 100022 add
exec set interface ip address loop0 100.0.23.1/32
exec create ipip tunnel src 100.0.23.1 dst 200.0.0.102 p2p
exec ipsec sa add 23 spi 100023 crypto-alg aes-gcm-128 crypto-key 66494c46776d58475179414442554a69 esp
exec ipsec sa add 100023 spi 200023 crypto-alg aes-gcm-128 crypto-key 66494c46776d58475179414442554a69 esp
exec ipsec tunnel protect ipip23 sa-out 23 sa-in 100023 add
exec set interface ip address loop0 100.0.24.1/32
exec create ipip tunnel src 100.0.24.1 dst 200.0.0.102 p2p
exec ipsec sa add 24 spi 100024 crypto-alg aes-gcm-128 crypto-key 7153504857505a67686b666376544b5a esp
exec ipsec sa add 100024 spi 200024 crypto-alg aes-gcm-128 crypto-key 7153504857505a67686b666376544b5a esp
exec ipsec tunnel protect ipip24 sa-out 24 sa-in 100024 add
exec set interface ip address loop0 100.0.25.1/32
exec create ipip tunnel src 100.0.25.1 dst 200.0.0.102 p2p
exec ipsec sa add 25 spi 100025 crypto-alg aes-gcm-128 crypto-key 6e4f6e654b6a6b596a706c6752685068 esp
exec ipsec sa add 100025 spi 200025 crypto-alg aes-gcm-128 crypto-key 6e4f6e654b6a6b596a706c6752685068 esp
exec ipsec tunnel protect ipip25 sa-out 25 sa-in 100025 add
exec set interface ip address loop0 100.0.26.1/32
exec create ipip tunnel src 100.0.26.1 dst 200.0.0.102 p2p
exec ipsec sa add 26 spi 100026 crypto-alg aes-gcm-128 crypto-key 4b6e4d6d66537443686976514c6b7464 esp
exec ipsec sa add 100026 spi 200026 crypto-alg aes-gcm-128 crypto-key 4b6e4d6d66537443686976514c6b7464 esp
exec ipsec tunnel protect ipip26 sa-out 26 sa-in 100026 add
exec set interface ip address loop0 100.0.27.1/32
exec create ipip tunnel src 100.0.27.1 dst 200.0.0.102 p2p
exec ipsec sa add 27 spi 100027 crypto-alg aes-gcm-128 crypto-key 7a4567476354704e644c6755506d435a esp
exec ipsec sa add 100027 spi 200027 crypto-alg aes-gcm-128 crypto-key 7a4567476354704e644c6755506d435a esp
exec ipsec tunnel protect ipip27 sa-out 27 sa-in 100027 add
exec set interface ip address loop0 100.0.28.1/32
exec create ipip tunnel src 100.0.28.1 dst 200.0.0.102 p2p
exec ipsec sa add 28 spi 100028 crypto-alg aes-gcm-128 crypto-key 6e5277644f6d646e697a794d75716e43 esp
exec ipsec sa add 100028 spi 200028 crypto-alg aes-gcm-128 crypto-key 6e5277644f6d646e697a794d75716e43 esp
exec ipsec tunnel protect ipip28 sa-out 28 sa-in 100028 add
exec set interface ip address loop0 100.0.29.1/32
exec create ipip tunnel src 100.0.29.1 dst 200.0.0.102 p2p
exec ipsec sa add 29 spi 100029 crypto-alg aes-gcm-128 crypto-key 4b79756663434e6b6e66585667647941 esp
exec ipsec sa add 100029 spi 200029 crypto-alg aes-gcm-128 crypto-key 4b79756663434e6b6e66585667647941 esp
exec ipsec tunnel protect ipip29 sa-out 29 sa-in 100029 add
exec set interface ip address loop0 100.0.30.1/32
exec create ipip tunnel src 100.0.30.1 dst 200.0.0.102 p2p
exec ipsec sa add 30 spi 100030 crypto-alg aes-gcm-128 crypto-key 56766968566d424c684a6967614c6b45 esp
exec ipsec sa add 100030 spi 200030 crypto-alg aes-gcm-128 crypto-key 56766968566d424c684a6967614c6b45 esp
exec ipsec tunnel protect ipip30 sa-out 30 sa-in 100030 add
exec set interface ip address loop0 100.0.31.1/32
exec create ipip tunnel src 100.0.31.1 dst 200.0.0.102 p2p
exec ipsec sa add 31 spi 100031 crypto-alg aes-gcm-128 crypto-key 76676a556f5078674f6468764c747445 esp
exec ipsec sa add 100031 spi 200031 crypto-alg aes-gcm-128 crypto-key 76676a556f5078674f6468764c747445 esp
exec ipsec tunnel protect ipip31 sa-out 31 sa-in 100031 add
exec set interface ip address loop0 100.0.32.1/32
exec create ipip tunnel src 100.0.32.1 dst 200.0.0.102 p2p
exec ipsec sa add 32 spi 100032 crypto-alg aes-gcm-128 crypto-key 627069516b4a42444d54616547624d64 esp
exec ipsec sa add 100032 spi 200032 crypto-alg aes-gcm-128 crypto-key 627069516b4a42444d54616547624d64 esp
exec ipsec tunnel protect ipip32 sa-out 32 sa-in 100032 add
exec set interface ip address loop0 100.0.33.1/32
exec create ipip tunnel src 100.0.33.1 dst 200.0.0.102 p2p
exec ipsec sa add 33 spi 100033 crypto-alg aes-gcm-128 crypto-key 6e777969684264494a506c426149694a esp
exec ipsec sa add 100033 spi 200033 crypto-alg aes-gcm-128 crypto-key 6e777969684264494a506c426149694a esp
exec ipsec tunnel protect ipip33 sa-out 33 sa-in 100033 add
exec set interface ip address loop0 100.0.34.1/32
exec create ipip tunnel src 100.0.34.1 dst 200.0.0.102 p2p
exec ipsec sa add 34 spi 100034 crypto-alg aes-gcm-128 crypto-key 4f6c7151585a626f7148676f44784e74 esp
exec ipsec sa add 100034 spi 200034 crypto-alg aes-gcm-128 crypto-key 4f6c7151585a626f7148676f44784e74 esp
exec ipsec tunnel protect ipip34 sa-out 34 sa-in 100034 add
exec set interface ip address loop0 100.0.35.1/32
exec create ipip tunnel src 100.0.35.1 dst 200.0.0.102 p2p
exec ipsec sa add 35 spi 100035 crypto-alg aes-gcm-128 crypto-key 44427a4e4d6c694d65574b6d6d52714e esp
exec ipsec sa add 100035 spi 200035 crypto-alg aes-gcm-128 crypto-key 44427a4e4d6c694d65574b6d6d52714e esp
exec ipsec tunnel protect ipip35 sa-out 35 sa-in 100035 add
exec set interface ip address loop0 100.0.36.1/32
exec create ipip tunnel src 100.0.36.1 dst 200.0.0.102 p2p
exec ipsec sa add 36 spi 100036 crypto-alg aes-gcm-128 crypto-key 635769764d70646f4849674e73796a72 esp
exec ipsec sa add 100036 spi 200036 crypto-alg aes-gcm-128 crypto-key 635769764d70646f4849674e73796a72 esp
exec ipsec tunnel protect ipip36 sa-out 36 sa-in 100036 add
exec set interface ip address loop0 100.0.37.1/32
exec create ipip tunnel src 100.0.37.1 dst 200.0.0.102 p2p
exec ipsec sa add 37 spi 100037 crypto-alg aes-gcm-128 crypto-key 74594c65514f6b4c496e62544778446e esp
exec ipsec sa add 100037 spi 200037 crypto-alg aes-gcm-128 crypto-key 74594c65514f6b4c496e62544778446e esp
exec ipsec tunnel protect ipip37 sa-out 37 sa-in 100037 add
exec set interface ip address loop0 100.0.38.1/32
exec create ipip tunnel src 100.0.38.1 dst 200.0.0.102 p2p
exec ipsec sa add 38 spi 100038 crypto-alg aes-gcm-128 crypto-key 76526b696d74435a776850754c6b6578 esp
exec ipsec sa add 100038 spi 200038 crypto-alg aes-gcm-128 crypto-key 76526b696d74435a776850754c6b6578 esp
exec ipsec tunnel protect ipip38 sa-out 38 sa-in 100038 add
exec set interface ip address loop0 100.0.39.1/32
exec create ipip tunnel src 100.0.39.1 dst 200.0.0.102 p2p
exec ipsec sa add 39 spi 100039 crypto-alg aes-gcm-128 crypto-key 4149666f73647343785371726a486574 esp
exec ipsec sa add 100039 spi 200039 crypto-alg aes-gcm-128 crypto-key 4149666f73647343785371726a486574 esp
exec ipsec tunnel protect ipip39 sa-out 39 sa-in 100039 add
exec set interface unnumbered ipip0 use TenGigabitEthernet8/0/0
exec set interface state ipip0 up
exec ip route add 20.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use TenGigabitEthernet8/0/0
exec set interface state ipip1 up
exec ip route add 20.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use TenGigabitEthernet8/0/0
exec set interface state ipip2 up
exec ip route add 20.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use TenGigabitEthernet8/0/0
exec set interface state ipip3 up
exec ip route add 20.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use TenGigabitEthernet8/0/0
exec set interface state ipip4 up
exec ip route add 20.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use TenGigabitEthernet8/0/0
exec set interface state ipip5 up
exec ip route add 20.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use TenGigabitEthernet8/0/0
exec set interface state ipip6 up
exec ip route add 20.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use TenGigabitEthernet8/0/0
exec set interface state ipip7 up
exec ip route add 20.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use TenGigabitEthernet8/0/0
exec set interface state ipip8 up
exec ip route add 20.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use TenGigabitEthernet8/0/0
exec set interface state ipip9 up
exec ip route add 20.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use TenGigabitEthernet8/0/0
exec set interface state ipip10 up
exec ip route add 20.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use TenGigabitEthernet8/0/0
exec set interface state ipip11 up
exec ip route add 20.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use TenGigabitEthernet8/0/0
exec set interface state ipip12 up
exec ip route add 20.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use TenGigabitEthernet8/0/0
exec set interface state ipip13 up
exec ip route add 20.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use TenGigabitEthernet8/0/0
exec set interface state ipip14 up
exec ip route add 20.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use TenGigabitEthernet8/0/0
exec set interface state ipip15 up
exec ip route add 20.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use TenGigabitEthernet8/0/0
exec set interface state ipip16 up
exec ip route add 20.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use TenGigabitEthernet8/0/0
exec set interface state ipip17 up
exec ip route add 20.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use TenGigabitEthernet8/0/0
exec set interface state ipip18 up
exec ip route add 20.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use TenGigabitEthernet8/0/0
exec set interface state ipip19 up
exec ip route add 20.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use TenGigabitEthernet8/0/0
exec set interface state ipip20 up
exec ip route add 20.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use TenGigabitEthernet8/0/0
exec set interface state ipip21 up
exec ip route add 20.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use TenGigabitEthernet8/0/0
exec set interface state ipip22 up
exec ip route add 20.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use TenGigabitEthernet8/0/0
exec set interface state ipip23 up
exec ip route add 20.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use TenGigabitEthernet8/0/0
exec set interface state ipip24 up
exec ip route add 20.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use TenGigabitEthernet8/0/0
exec set interface state ipip25 up
exec ip route add 20.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use TenGigabitEthernet8/0/0
exec set interface state ipip26 up
exec ip route add 20.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use TenGigabitEthernet8/0/0
exec set interface state ipip27 up
exec ip route add 20.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use TenGigabitEthernet8/0/0
exec set interface state ipip28 up
exec ip route add 20.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use TenGigabitEthernet8/0/0
exec set interface state ipip29 up
exec ip route add 20.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use TenGigabitEthernet8/0/0
exec set interface state ipip30 up
exec ip route add 20.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use TenGigabitEthernet8/0/0
exec set interface state ipip31 up
exec ip route add 20.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use TenGigabitEthernet8/0/0
exec set interface state ipip32 up
exec ip route add 20.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use TenGigabitEthernet8/0/0
exec set interface state ipip33 up
exec ip route add 20.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use TenGigabitEthernet8/0/0
exec set interface state ipip34 up
exec ip route add 20.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use TenGigabitEthernet8/0/0
exec set interface state ipip35 up
exec ip route add 20.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use TenGigabitEthernet8/0/0
exec set interface state ipip36 up
exec ip route add 20.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use TenGigabitEthernet8/0/0
exec set interface state ipip37 up
exec ip route add 20.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use TenGigabitEthernet8/0/0
exec set interface state ipip38 up
exec ip route add 20.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use TenGigabitEthernet8/0/0
exec set interface state ipip39 up
exec ip route add 20.0.0.39/32 via ipip39
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec set interface ip address TenGigabitEthernet8/0/0 200.0.0.102/24.0
exec create ipip tunnel src 200.0.0.102 dst 100.0.0.1 p2p
exec ipsec sa add 100000 spi 200000 crypto-alg aes-gcm-128 crypto-key 69695368445369636a4f53774165754a esp
exec ipsec sa add 0 spi 100000 crypto-alg aes-gcm-128 crypto-key 69695368445369636a4f53774165754a esp
exec ipsec tunnel protect ipip0 sa-out 100000 sa-in 0 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.1.1 p2p
exec ipsec sa add 100001 spi 200001 crypto-alg aes-gcm-128 crypto-key 5879744a4d694376534f48596d657a77 esp
exec ipsec sa add 1 spi 100001 crypto-alg aes-gcm-128 crypto-key 5879744a4d694376534f48596d657a77 esp
exec ipsec tunnel protect ipip1 sa-out 100001 sa-in 1 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.2.1 p2p
exec ipsec sa add 100002 spi 200002 crypto-alg aes-gcm-128 crypto-key 4d6a5a78666c4e647345706341797168 esp
exec ipsec sa add 2 spi 100002 crypto-alg aes-gcm-128 crypto-key 4d6a5a78666c4e647345706341797168 esp
exec ipsec tunnel protect ipip2 sa-out 100002 sa-in 2 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.3.1 p2p
exec ipsec sa add 100003 spi 200003 crypto-alg aes-gcm-128 crypto-key 416e5a7669516873704a50636e505350 esp
exec ipsec sa add 3 spi 100003 crypto-alg aes-gcm-128 crypto-key 416e5a7669516873704a50636e505350 esp
exec ipsec tunnel protect ipip3 sa-out 100003 sa-in 3 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.4.1 p2p
exec ipsec sa add 100004 spi 200004 crypto-alg aes-gcm-128 crypto-key 7266626572734e6462415a65586b5656 esp
exec ipsec sa add 4 spi 100004 crypto-alg aes-gcm-128 crypto-key 7266626572734e6462415a65586b5656 esp
exec ipsec tunnel protect ipip4 sa-out 100004 sa-in 4 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.5.1 p2p
exec ipsec sa add 100005 spi 200005 crypto-alg aes-gcm-128 crypto-key 79424d794b526e6f636358625a59446a esp
exec ipsec sa add 5 spi 100005 crypto-alg aes-gcm-128 crypto-key 79424d794b526e6f636358625a59446a esp
exec ipsec tunnel protect ipip5 sa-out 100005 sa-in 5 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.6.1 p2p
exec ipsec sa add 100006 spi 200006 crypto-alg aes-gcm-128 crypto-key 546f70676c55684e57717873524f6e76 esp
exec ipsec sa add 6 spi 100006 crypto-alg aes-gcm-128 crypto-key 546f70676c55684e57717873524f6e76 esp
exec ipsec tunnel protect ipip6 sa-out 100006 sa-in 6 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.7.1 p2p
exec ipsec sa add 100007 spi 200007 crypto-alg aes-gcm-128 crypto-key 65776c6941467843556544557877756c esp
exec ipsec sa add 7 spi 100007 crypto-alg aes-gcm-128 crypto-key 65776c6941467843556544557877756c esp
exec ipsec tunnel protect ipip7 sa-out 100007 sa-in 7 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.8.1 p2p
exec ipsec sa add 100008 spi 200008 crypto-alg aes-gcm-128 crypto-key 704d4e4e7162515a7578544b59666663 esp
exec ipsec sa add 8 spi 100008 crypto-alg aes-gcm-128 crypto-key 704d4e4e7162515a7578544b59666663 esp
exec ipsec tunnel protect ipip8 sa-out 100008 sa-in 8 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.9.1 p2p
exec ipsec sa add 100009 spi 200009 crypto-alg aes-gcm-128 crypto-key 4b4e50726145514e4a63637a69704870 esp
exec ipsec sa add 9 spi 100009 crypto-alg aes-gcm-128 crypto-key 4b4e50726145514e4a63637a69704870 esp
exec ipsec tunnel protect ipip9 sa-out 100009 sa-in 9 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.10.1 p2p
exec ipsec sa add 100010 spi 200010 crypto-alg aes-gcm-128 crypto-key 784d4c596e536b6b4e626653594d4d4c esp
exec ipsec sa add 10 spi 100010 crypto-alg aes-gcm-128 crypto-key 784d4c596e536b6b4e626653594d4d4c esp
exec ipsec tunnel protect ipip10 sa-out 100010 sa-in 10 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.11.1 p2p
exec ipsec sa add 100011 spi 200011 crypto-alg aes-gcm-128 crypto-key 586b654f7848437561736779576f5061 esp
exec ipsec sa add 11 spi 100011 crypto-alg aes-gcm-128 crypto-key 586b654f7848437561736779576f5061 esp
exec ipsec tunnel protect ipip11 sa-out 100011 sa-in 11 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.12.1 p2p
exec ipsec sa add 100012 spi 200012 crypto-alg aes-gcm-128 crypto-key 476567794c79775a715856664d704661 esp
exec ipsec sa add 12 spi 100012 crypto-alg aes-gcm-128 crypto-key 476567794c79775a715856664d704661 esp
exec ipsec tunnel protect ipip12 sa-out 100012 sa-in 12 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.13.1 p2p
exec ipsec sa add 100013 spi 200013 crypto-alg aes-gcm-128 crypto-key 53756755666e6a4e5950655767475266 esp
exec ipsec sa add 13 spi 100013 crypto-alg aes-gcm-128 crypto-key 53756755666e6a4e5950655767475266 esp
exec ipsec tunnel protect ipip13 sa-out 100013 sa-in 13 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.14.1 p2p
exec ipsec sa add 100014 spi 200014 crypto-alg aes-gcm-128 crypto-key 7242664d624c4f476f464d716577476e esp
exec ipsec sa add 14 spi 100014 crypto-alg aes-gcm-128 crypto-key 7242664d624c4f476f464d716577476e esp
exec ipsec tunnel protect ipip14 sa-out 100014 sa-in 14 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.15.1 p2p
exec ipsec sa add 100015 spi 200015 crypto-alg aes-gcm-128 crypto-key 6f50696351596f434142547a4d46726f esp
exec ipsec sa add 15 spi 100015 crypto-alg aes-gcm-128 crypto-key 6f50696351596f434142547a4d46726f esp
exec ipsec tunnel protect ipip15 sa-out 100015 sa-in 15 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.16.1 p2p
exec ipsec sa add 100016 spi 200016 crypto-alg aes-gcm-128 crypto-key 4b4266745971426354636b4363787055 esp
exec ipsec sa add 16 spi 100016 crypto-alg aes-gcm-128 crypto-key 4b4266745971426354636b4363787055 esp
exec ipsec tunnel protect ipip16 sa-out 100016 sa-in 16 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.17.1 p2p
exec ipsec sa add 100017 spi 200017 crypto-alg aes-gcm-128 crypto-key 47586e664964676f6976474468666255 esp
exec ipsec sa add 17 spi 100017 crypto-alg aes-gcm-128 crypto-key 47586e664964676f6976474468666255 esp
exec ipsec tunnel protect ipip17 sa-out 100017 sa-in 17 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.18.1 p2p
exec ipsec sa add 100018 spi 200018 crypto-alg aes-gcm-128 crypto-key 7a4b5052744864626c59494744674f78 esp
exec ipsec sa add 18 spi 100018 crypto-alg aes-gcm-128 crypto-key 7a4b5052744864626c59494744674f78 esp
exec ipsec tunnel protect ipip18 sa-out 100018 sa-in 18 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.19.1 p2p
exec ipsec sa add 100019 spi 200019 crypto-alg aes-gcm-128 crypto-key 61686d645743776162696254415a4845 esp
exec ipsec sa add 19 spi 100019 crypto-alg aes-gcm-128 crypto-key 61686d645743776162696254415a4845 esp
exec ipsec tunnel protect ipip19 sa-out 100019 sa-in 19 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.20.1 p2p
exec ipsec sa add 100020 spi 200020 crypto-alg aes-gcm-128 crypto-key 66744358524b484f6c4f7744534e7a4b esp
exec ipsec sa add 20 spi 100020 crypto-alg aes-gcm-128 crypto-key 66744358524b484f6c4f7744534e7a4b esp
exec ipsec tunnel protect ipip20 sa-out 100020 sa-in 20 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.21.1 p2p
exec ipsec sa add 100021 spi 200021 crypto-alg aes-gcm-128 crypto-key 4e744f63585a6b65487a596f53436179 esp
exec ipsec sa add 21 spi 100021 crypto-alg aes-gcm-128 crypto-key 4e744f63585a6b65487a596f53436179 esp
exec ipsec tunnel protect ipip21 sa-out 100021 sa-in 21 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.22.1 p2p
exec ipsec sa add 100022 spi 200022 crypto-alg aes-gcm-128 crypto-key 41516f76734e44435359544d5a73596b esp
exec ipsec sa add 22 spi 100022 crypto-alg aes-gcm-128 crypto-key 41516f76734e44435359544d5a73596b esp
exec ipsec tunnel protect ipip22 sa-out 100022 sa-in 22 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.23.1 p2p
exec ipsec sa add 100023 spi 200023 crypto-alg aes-gcm-128 crypto-key 66494c46776d58475179414442554a69 esp
exec ipsec sa add 23 spi 100023 crypto-alg aes-gcm-128 crypto-key 66494c46776d58475179414442554a69 esp
exec ipsec tunnel protect ipip23 sa-out 100023 sa-in 23 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.24.1 p2p
exec ipsec sa add 100024 spi 200024 crypto-alg aes-gcm-128 crypto-key 7153504857505a67686b666376544b5a esp
exec ipsec sa add 24 spi 100024 crypto-alg aes-gcm-128 crypto-key 7153504857505a67686b666376544b5a esp
exec ipsec tunnel protect ipip24 sa-out 100024 sa-in 24 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.25.1 p2p
exec ipsec sa add 100025 spi 200025 crypto-alg aes-gcm-128 crypto-key 6e4f6e654b6a6b596a706c6752685068 esp
exec ipsec sa add 25 spi 100025 crypto-alg aes-gcm-128 crypto-key 6e4f6e654b6a6b596a706c6752685068 esp
exec ipsec tunnel protect ipip25 sa-out 100025 sa-in 25 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.26.1 p2p
exec ipsec sa add 100026 spi 200026 crypto-alg aes-gcm-128 crypto-key 4b6e4d6d66537443686976514c6b7464 esp
exec ipsec sa add 26 spi 100026 crypto-alg aes-gcm-128 crypto-key 4b6e4d6d66537443686976514c6b7464 esp
exec ipsec tunnel protect ipip26 sa-out 100026 sa-in 26 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.27.1 p2p
exec ipsec sa add 100027 spi 200027 crypto-alg aes-gcm-128 crypto-key 7a4567476354704e644c6755506d435a esp
exec ipsec sa add 27 spi 100027 crypto-alg aes-gcm-128 crypto-key 7a4567476354704e644c6755506d435a esp
exec ipsec tunnel protect ipip27 sa-out 100027 sa-in 27 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.28.1 p2p
exec ipsec sa add 100028 spi 200028 crypto-alg aes-gcm-128 crypto-key 6e5277644f6d646e697a794d75716e43 esp
exec ipsec sa add 28 spi 100028 crypto-alg aes-gcm-128 crypto-key 6e5277644f6d646e697a794d75716e43 esp
exec ipsec tunnel protect ipip28 sa-out 100028 sa-in 28 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.29.1 p2p
exec ipsec sa add 100029 spi 200029 crypto-alg aes-gcm-128 crypto-key 4b79756663434e6b6e66585667647941 esp
exec ipsec sa add 29 spi 100029 crypto-alg aes-gcm-128 crypto-key 4b79756663434e6b6e66585667647941 esp
exec ipsec tunnel protect ipip29 sa-out 100029 sa-in 29 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.30.1 p2p
exec ipsec sa add 100030 spi 200030 crypto-alg aes-gcm-128 crypto-key 56766968566d424c684a6967614c6b45 esp
exec ipsec sa add 30 spi 100030 crypto-alg aes-gcm-128 crypto-key 56766968566d424c684a6967614c6b45 esp
exec ipsec tunnel protect ipip30 sa-out 100030 sa-in 30 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.31.1 p2p
exec ipsec sa add 100031 spi 200031 crypto-alg aes-gcm-128 crypto-key 76676a556f5078674f6468764c747445 esp
exec ipsec sa add 31 spi 100031 crypto-alg aes-gcm-128 crypto-key 76676a556f5078674f6468764c747445 esp
exec ipsec tunnel protect ipip31 sa-out 100031 sa-in 31 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.32.1 p2p
exec ipsec sa add 100032 spi 200032 crypto-alg aes-gcm-128 crypto-key 627069516b4a42444d54616547624d64 esp
exec ipsec sa add 32 spi 100032 crypto-alg aes-gcm-128 crypto-key 627069516b4a42444d54616547624d64 esp
exec ipsec tunnel protect ipip32 sa-out 100032 sa-in 32 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.33.1 p2p
exec ipsec sa add 100033 spi 200033 crypto-alg aes-gcm-128 crypto-key 6e777969684264494a506c426149694a esp
exec ipsec sa add 33 spi 100033 crypto-alg aes-gcm-128 crypto-key 6e777969684264494a506c426149694a esp
exec ipsec tunnel protect ipip33 sa-out 100033 sa-in 33 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.34.1 p2p
exec ipsec sa add 100034 spi 200034 crypto-alg aes-gcm-128 crypto-key 4f6c7151585a626f7148676f44784e74 esp
exec ipsec sa add 34 spi 100034 crypto-alg aes-gcm-128 crypto-key 4f6c7151585a626f7148676f44784e74 esp
exec ipsec tunnel protect ipip34 sa-out 100034 sa-in 34 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.35.1 p2p
exec ipsec sa add 100035 spi 200035 crypto-alg aes-gcm-128 crypto-key 44427a4e4d6c694d65574b6d6d52714e esp
exec ipsec sa add 35 spi 100035 crypto-alg aes-gcm-128 crypto-key 44427a4e4d6c694d65574b6d6d52714e esp
exec ipsec tunnel protect ipip35 sa-out 100035 sa-in 35 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.36.1 p2p
exec ipsec sa add 100036 spi 200036 crypto-alg aes-gcm-128 crypto-key 635769764d70646f4849674e73796a72 esp
exec ipsec sa add 36 spi 100036 crypto-alg aes-gcm-128 crypto-key 635769764d70646f4849674e73796a72 esp
exec ipsec tunnel protect ipip36 sa-out 100036 sa-in 36 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.37.1 p2p
exec ipsec sa add 100037 spi 200037 crypto-alg aes-gcm-128 crypto-key 74594c65514f6b4c496e62544778446e esp
exec ipsec sa add 37 spi 100037 crypto-alg aes-gcm-128 crypto-key 74594c65514f6b4c496e62544778446e esp
exec ipsec tunnel protect ipip37 sa-out 100037 sa-in 37 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.38.1 p2p
exec ipsec sa add 100038 spi 200038 crypto-alg aes-gcm-128 crypto-key 76526b696d74435a776850754c6b6578 esp
exec ipsec sa add 38 spi 100038 crypto-alg aes-gcm-128 crypto-key 76526b696d74435a776850754c6b6578 esp
exec ipsec tunnel protect ipip38 sa-out 100038 sa-in 38 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.39.1 p2p
exec ipsec sa add 100039 spi 200039 crypto-alg aes-gcm-128 crypto-key 4149666f73647343785371726a486574 esp
exec ipsec sa add 39 spi 100039 crypto-alg aes-gcm-128 crypto-key 4149666f73647343785371726a486574 esp
exec ipsec tunnel protect ipip39 sa-out 100039 sa-in 39 add
exec ip route add 100.0.0.1/8 via 200.0.0.101 TenGigabitEthernet8/0/0
exec set interface unnumbered ipip0 use TenGigabitEthernet8/0/0
exec set interface state ipip0 up
exec ip route add 10.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use TenGigabitEthernet8/0/0
exec set interface state ipip1 up
exec ip route add 10.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use TenGigabitEthernet8/0/0
exec set interface state ipip2 up
exec ip route add 10.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use TenGigabitEthernet8/0/0
exec set interface state ipip3 up
exec ip route add 10.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use TenGigabitEthernet8/0/0
exec set interface state ipip4 up
exec ip route add 10.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use TenGigabitEthernet8/0/0
exec set interface state ipip5 up
exec ip route add 10.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use TenGigabitEthernet8/0/0
exec set interface state ipip6 up
exec ip route add 10.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use TenGigabitEthernet8/0/0
exec set interface state ipip7 up
exec ip route add 10.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use TenGigabitEthernet8/0/0
exec set interface state ipip8 up
exec ip route add 10.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use TenGigabitEthernet8/0/0
exec set interface state ipip9 up
exec ip route add 10.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use TenGigabitEthernet8/0/0
exec set interface state ipip10 up
exec ip route add 10.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use TenGigabitEthernet8/0/0
exec set interface state ipip11 up
exec ip route add 10.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use TenGigabitEthernet8/0/0
exec set interface state ipip12 up
exec ip route add 10.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use TenGigabitEthernet8/0/0
exec set interface state ipip13 up
exec ip route add 10.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use TenGigabitEthernet8/0/0
exec set interface state ipip14 up
exec ip route add 10.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use TenGigabitEthernet8/0/0
exec set interface state ipip15 up
exec ip route add 10.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use TenGigabitEthernet8/0/0
exec set interface state ipip16 up
exec ip route add 10.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use TenGigabitEthernet8/0/0
exec set interface state ipip17 up
exec ip route add 10.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use TenGigabitEthernet8/0/0
exec set interface state ipip18 up
exec ip route add 10.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use TenGigabitEthernet8/0/0
exec set interface state ipip19 up
exec ip route add 10.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use TenGigabitEthernet8/0/0
exec set interface state ipip20 up
exec ip route add 10.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use TenGigabitEthernet8/0/0
exec set interface state ipip21 up
exec ip route add 10.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use TenGigabitEthernet8/0/0
exec set interface state ipip22 up
exec ip route add 10.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use TenGigabitEthernet8/0/0
exec set interface state ipip23 up
exec ip route add 10.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use TenGigabitEthernet8/0/0
exec set interface state ipip24 up
exec ip route add 10.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use TenGigabitEthernet8/0/0
exec set interface state ipip25 up
exec ip route add 10.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use TenGigabitEthernet8/0/0
exec set interface state ipip26 up
exec ip route add 10.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use TenGigabitEthernet8/0/0
exec set interface state ipip27 up
exec ip route add 10.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use TenGigabitEthernet8/0/0
exec set interface state ipip28 up
exec ip route add 10.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use TenGigabitEthernet8/0/0
exec set interface state ipip29 up
exec ip route add 10.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use TenGigabitEthernet8/0/0
exec set interface state ipip30 up
exec ip route add 10.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use TenGigabitEthernet8/0/0
exec set interface state ipip31 up
exec ip route add 10.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use TenGigabitEthernet8/0/0
exec set interface state ipip32 up
exec ip route add 10.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use TenGigabitEthernet8/0/0
exec set interface state ipip33 up
exec ip route add 10.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use TenGigabitEthernet8/0/0
exec set interface state ipip34 up
exec ip route add 10.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use TenGigabitEthernet8/0/0
exec set interface state ipip35 up
exec ip route add 10.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use TenGigabitEthernet8/0/0
exec set interface state ipip36 up
exec ip route add 10.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use TenGigabitEthernet8/0/0
exec set interface state ipip37 up
exec ip route add 10.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use TenGigabitEthernet8/0/0
exec set interface state ipip38 up
exec ip route add 10.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use TenGigabitEthernet8/0/0
exec set interface state ipip39 up
exec ip route add 10.0.0.39/32 via ipip39

 64b-4t4c-ethip4ipsec40tnlsw- 
ip4base-int-aes128gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec create loopback interface
exec set interface state loop0 up
exec set interface ip address TenGigabitEthernet8/0/0 200.0.0.101/24
exec set ip neighbor TenGigabitEthernet8/0/0 200.0.0.102 ac:1f:6b:57:57:fe static
exec set interface ip address loop0 100.0.0.1/32
exec create ipip tunnel src 100.0.0.1 dst 200.0.0.102 p2p
exec ipsec sa add 0 spi 100000 crypto-alg aes-gcm-128 crypto-key 5854524d5248576b5157576e53446857 esp
exec ipsec sa add 100000 spi 200000 crypto-alg aes-gcm-128 crypto-key 5854524d5248576b5157576e53446857 esp
exec ipsec tunnel protect ipip0 sa-out 0 sa-in 100000 add
exec set interface ip address loop0 100.0.1.1/32
exec create ipip tunnel src 100.0.1.1 dst 200.0.0.102 p2p
exec ipsec sa add 1 spi 100001 crypto-alg aes-gcm-128 crypto-key 67445378566d6d70565a436c7470796c esp
exec ipsec sa add 100001 spi 200001 crypto-alg aes-gcm-128 crypto-key 67445378566d6d70565a436c7470796c esp
exec ipsec tunnel protect ipip1 sa-out 1 sa-in 100001 add
exec set interface ip address loop0 100.0.2.1/32
exec create ipip tunnel src 100.0.2.1 dst 200.0.0.102 p2p
exec ipsec sa add 2 spi 100002 crypto-alg aes-gcm-128 crypto-key 6a4c744843434f575867424673556d6a esp
exec ipsec sa add 100002 spi 200002 crypto-alg aes-gcm-128 crypto-key 6a4c744843434f575867424673556d6a esp
exec ipsec tunnel protect ipip2 sa-out 2 sa-in 100002 add
exec set interface ip address loop0 100.0.3.1/32
exec create ipip tunnel src 100.0.3.1 dst 200.0.0.102 p2p
exec ipsec sa add 3 spi 100003 crypto-alg aes-gcm-128 crypto-key 554e61415263654f4a577a76724e4776 esp
exec ipsec sa add 100003 spi 200003 crypto-alg aes-gcm-128 crypto-key 554e61415263654f4a577a76724e4776 esp
exec ipsec tunnel protect ipip3 sa-out 3 sa-in 100003 add
exec set interface ip address loop0 100.0.4.1/32
exec create ipip tunnel src 100.0.4.1 dst 200.0.0.102 p2p
exec ipsec sa add 4 spi 100004 crypto-alg aes-gcm-128 crypto-key 6b634b7167546f4e7563544f694a7654 esp
exec ipsec sa add 100004 spi 200004 crypto-alg aes-gcm-128 crypto-key 6b634b7167546f4e7563544f694a7654 esp
exec ipsec tunnel protect ipip4 sa-out 4 sa-in 100004 add
exec set interface ip address loop0 100.0.5.1/32
exec create ipip tunnel src 100.0.5.1 dst 200.0.0.102 p2p
exec ipsec sa add 5 spi 100005 crypto-alg aes-gcm-128 crypto-key 664a69674d636e794374496e6b65426a esp
exec ipsec sa add 100005 spi 200005 crypto-alg aes-gcm-128 crypto-key 664a69674d636e794374496e6b65426a esp
exec ipsec tunnel protect ipip5 sa-out 5 sa-in 100005 add
exec set interface ip address loop0 100.0.6.1/32
exec create ipip tunnel src 100.0.6.1 dst 200.0.0.102 p2p
exec ipsec sa add 6 spi 100006 crypto-alg aes-gcm-128 crypto-key 674a7a794942774450736f645650476b esp
exec ipsec sa add 100006 spi 200006 crypto-alg aes-gcm-128 crypto-key 674a7a794942774450736f645650476b esp
exec ipsec tunnel protect ipip6 sa-out 6 sa-in 100006 add
exec set interface ip address loop0 100.0.7.1/32
exec create ipip tunnel src 100.0.7.1 dst 200.0.0.102 p2p
exec ipsec sa add 7 spi 100007 crypto-alg aes-gcm-128 crypto-key 62635a444c4b6c4f79714b777257676e esp
exec ipsec sa add 100007 spi 200007 crypto-alg aes-gcm-128 crypto-key 62635a444c4b6c4f79714b777257676e esp
exec ipsec tunnel protect ipip7 sa-out 7 sa-in 100007 add
exec set interface ip address loop0 100.0.8.1/32
exec create ipip tunnel src 100.0.8.1 dst 200.0.0.102 p2p
exec ipsec sa add 8 spi 100008 crypto-alg aes-gcm-128 crypto-key 5263546866674e705a566452416b6e49 esp
exec ipsec sa add 100008 spi 200008 crypto-alg aes-gcm-128 crypto-key 5263546866674e705a566452416b6e49 esp
exec ipsec tunnel protect ipip8 sa-out 8 sa-in 100008 add
exec set interface ip address loop0 100.0.9.1/32
exec create ipip tunnel src 100.0.9.1 dst 200.0.0.102 p2p
exec ipsec sa add 9 spi 100009 crypto-alg aes-gcm-128 crypto-key 7869776877686e5250414f7379597641 esp
exec ipsec sa add 100009 spi 200009 crypto-alg aes-gcm-128 crypto-key 7869776877686e5250414f7379597641 esp
exec ipsec tunnel protect ipip9 sa-out 9 sa-in 100009 add
exec set interface ip address loop0 100.0.10.1/32
exec create ipip tunnel src 100.0.10.1 dst 200.0.0.102 p2p
exec ipsec sa add 10 spi 100010 crypto-alg aes-gcm-128 crypto-key 4e7a41537a4c4b777369566a736d5652 esp
exec ipsec sa add 100010 spi 200010 crypto-alg aes-gcm-128 crypto-key 4e7a41537a4c4b777369566a736d5652 esp
exec ipsec tunnel protect ipip10 sa-out 10 sa-in 100010 add
exec set interface ip address loop0 100.0.11.1/32
exec create ipip tunnel src 100.0.11.1 dst 200.0.0.102 p2p
exec ipsec sa add 11 spi 100011 crypto-alg aes-gcm-128 crypto-key 596c6444576d75665168516877424d48 esp
exec ipsec sa add 100011 spi 200011 crypto-alg aes-gcm-128 crypto-key 596c6444576d75665168516877424d48 esp
exec ipsec tunnel protect ipip11 sa-out 11 sa-in 100011 add
exec set interface ip address loop0 100.0.12.1/32
exec create ipip tunnel src 100.0.12.1 dst 200.0.0.102 p2p
exec ipsec sa add 12 spi 100012 crypto-alg aes-gcm-128 crypto-key 526c73765946784576466a6455666950 esp
exec ipsec sa add 100012 spi 200012 crypto-alg aes-gcm-128 crypto-key 526c73765946784576466a6455666950 esp
exec ipsec tunnel protect ipip12 sa-out 12 sa-in 100012 add
exec set interface ip address loop0 100.0.13.1/32
exec create ipip tunnel src 100.0.13.1 dst 200.0.0.102 p2p
exec ipsec sa add 13 spi 100013 crypto-alg aes-gcm-128 crypto-key 4352534d666f49466a48654c57424278 esp
exec ipsec sa add 100013 spi 200013 crypto-alg aes-gcm-128 crypto-key 4352534d666f49466a48654c57424278 esp
exec ipsec tunnel protect ipip13 sa-out 13 sa-in 100013 add
exec set interface ip address loop0 100.0.14.1/32
exec create ipip tunnel src 100.0.14.1 dst 200.0.0.102 p2p
exec ipsec sa add 14 spi 100014 crypto-alg aes-gcm-128 crypto-key 566b6a504b6a52767262476e67694656 esp
exec ipsec sa add 100014 spi 200014 crypto-alg aes-gcm-128 crypto-key 566b6a504b6a52767262476e67694656 esp
exec ipsec tunnel protect ipip14 sa-out 14 sa-in 100014 add
exec set interface ip address loop0 100.0.15.1/32
exec create ipip tunnel src 100.0.15.1 dst 200.0.0.102 p2p
exec ipsec sa add 15 spi 100015 crypto-alg aes-gcm-128 crypto-key 536f716d434653707347756f67666658 esp
exec ipsec sa add 100015 spi 200015 crypto-alg aes-gcm-128 crypto-key 536f716d434653707347756f67666658 esp
exec ipsec tunnel protect ipip15 sa-out 15 sa-in 100015 add
exec set interface ip address loop0 100.0.16.1/32
exec create ipip tunnel src 100.0.16.1 dst 200.0.0.102 p2p
exec ipsec sa add 16 spi 100016 crypto-alg aes-gcm-128 crypto-key 5a777a4d466b7a63734369416a57646e esp
exec ipsec sa add 100016 spi 200016 crypto-alg aes-gcm-128 crypto-key 5a777a4d466b7a63734369416a57646e esp
exec ipsec tunnel protect ipip16 sa-out 16 sa-in 100016 add
exec set interface ip address loop0 100.0.17.1/32
exec create ipip tunnel src 100.0.17.1 dst 200.0.0.102 p2p
exec ipsec sa add 17 spi 100017 crypto-alg aes-gcm-128 crypto-key 4d43694579685373795a65625154486e esp
exec ipsec sa add 100017 spi 200017 crypto-alg aes-gcm-128 crypto-key 4d43694579685373795a65625154486e esp
exec ipsec tunnel protect ipip17 sa-out 17 sa-in 100017 add
exec set interface ip address loop0 100.0.18.1/32
exec create ipip tunnel src 100.0.18.1 dst 200.0.0.102 p2p
exec ipsec sa add 18 spi 100018 crypto-alg aes-gcm-128 crypto-key 696c4b6c5174436376537052437a676a esp
exec ipsec sa add 100018 spi 200018 crypto-alg aes-gcm-128 crypto-key 696c4b6c5174436376537052437a676a esp
exec ipsec tunnel protect ipip18 sa-out 18 sa-in 100018 add
exec set interface ip address loop0 100.0.19.1/32
exec create ipip tunnel src 100.0.19.1 dst 200.0.0.102 p2p
exec ipsec sa add 19 spi 100019 crypto-alg aes-gcm-128 crypto-key 62786a464d72634c675a576153694946 esp
exec ipsec sa add 100019 spi 200019 crypto-alg aes-gcm-128 crypto-key 62786a464d72634c675a576153694946 esp
exec ipsec tunnel protect ipip19 sa-out 19 sa-in 100019 add
exec set interface ip address loop0 100.0.20.1/32
exec create ipip tunnel src 100.0.20.1 dst 200.0.0.102 p2p
exec ipsec sa add 20 spi 100020 crypto-alg aes-gcm-128 crypto-key 5368574c73695776654f7168764b5254 esp
exec ipsec sa add 100020 spi 200020 crypto-alg aes-gcm-128 crypto-key 5368574c73695776654f7168764b5254 esp
exec ipsec tunnel protect ipip20 sa-out 20 sa-in 100020 add
exec set interface ip address loop0 100.0.21.1/32
exec create ipip tunnel src 100.0.21.1 dst 200.0.0.102 p2p
exec ipsec sa add 21 spi 100021 crypto-alg aes-gcm-128 crypto-key 456c467849777049614a71466c57424b esp
exec ipsec sa add 100021 spi 200021 crypto-alg aes-gcm-128 crypto-key 456c467849777049614a71466c57424b esp
exec ipsec tunnel protect ipip21 sa-out 21 sa-in 100021 add
exec set interface ip address loop0 100.0.22.1/32
exec create ipip tunnel src 100.0.22.1 dst 200.0.0.102 p2p
exec ipsec sa add 22 spi 100022 crypto-alg aes-gcm-128 crypto-key 68544c725143664943726f62794d7377 esp
exec ipsec sa add 100022 spi 200022 crypto-alg aes-gcm-128 crypto-key 68544c725143664943726f62794d7377 esp
exec ipsec tunnel protect ipip22 sa-out 22 sa-in 100022 add
exec set interface ip address loop0 100.0.23.1/32
exec create ipip tunnel src 100.0.23.1 dst 200.0.0.102 p2p
exec ipsec sa add 23 spi 100023 crypto-alg aes-gcm-128 crypto-key 7870775573655364686b704373574176 esp
exec ipsec sa add 100023 spi 200023 crypto-alg aes-gcm-128 crypto-key 7870775573655364686b704373574176 esp
exec ipsec tunnel protect ipip23 sa-out 23 sa-in 100023 add
exec set interface ip address loop0 100.0.24.1/32
exec create ipip tunnel src 100.0.24.1 dst 200.0.0.102 p2p
exec ipsec sa add 24 spi 100024 crypto-alg aes-gcm-128 crypto-key 63666c6f414841746961684e71625a4d esp
exec ipsec sa add 100024 spi 200024 crypto-alg aes-gcm-128 crypto-key 63666c6f414841746961684e71625a4d esp
exec ipsec tunnel protect ipip24 sa-out 24 sa-in 100024 add
exec set interface ip address loop0 100.0.25.1/32
exec create ipip tunnel src 100.0.25.1 dst 200.0.0.102 p2p
exec ipsec sa add 25 spi 100025 crypto-alg aes-gcm-128 crypto-key 71594f6976526f775a6c4e6761514162 esp
exec ipsec sa add 100025 spi 200025 crypto-alg aes-gcm-128 crypto-key 71594f6976526f775a6c4e6761514162 esp
exec ipsec tunnel protect ipip25 sa-out 25 sa-in 100025 add
exec set interface ip address loop0 100.0.26.1/32
exec create ipip tunnel src 100.0.26.1 dst 200.0.0.102 p2p
exec ipsec sa add 26 spi 100026 crypto-alg aes-gcm-128 crypto-key 7165635a6a4167414371694962757772 esp
exec ipsec sa add 100026 spi 200026 crypto-alg aes-gcm-128 crypto-key 7165635a6a4167414371694962757772 esp
exec ipsec tunnel protect ipip26 sa-out 26 sa-in 100026 add
exec set interface ip address loop0 100.0.27.1/32
exec create ipip tunnel src 100.0.27.1 dst 200.0.0.102 p2p
exec ipsec sa add 27 spi 100027 crypto-alg aes-gcm-128 crypto-key 614f615865735257727141697a565554 esp
exec ipsec sa add 100027 spi 200027 crypto-alg aes-gcm-128 crypto-key 614f615865735257727141697a565554 esp
exec ipsec tunnel protect ipip27 sa-out 27 sa-in 100027 add
exec set interface ip address loop0 100.0.28.1/32
exec create ipip tunnel src 100.0.28.1 dst 200.0.0.102 p2p
exec ipsec sa add 28 spi 100028 crypto-alg aes-gcm-128 crypto-key 704d795a426949707a527a6372477854 esp
exec ipsec sa add 100028 spi 200028 crypto-alg aes-gcm-128 crypto-key 704d795a426949707a527a6372477854 esp
exec ipsec tunnel protect ipip28 sa-out 28 sa-in 100028 add
exec set interface ip address loop0 100.0.29.1/32
exec create ipip tunnel src 100.0.29.1 dst 200.0.0.102 p2p
exec ipsec sa add 29 spi 100029 crypto-alg aes-gcm-128 crypto-key 566f70536b6b594e4e74595079417865 esp
exec ipsec sa add 100029 spi 200029 crypto-alg aes-gcm-128 crypto-key 566f70536b6b594e4e74595079417865 esp
exec ipsec tunnel protect ipip29 sa-out 29 sa-in 100029 add
exec set interface ip address loop0 100.0.30.1/32
exec create ipip tunnel src 100.0.30.1 dst 200.0.0.102 p2p
exec ipsec sa add 30 spi 100030 crypto-alg aes-gcm-128 crypto-key 454a536c756854704a7250454c44474c esp
exec ipsec sa add 100030 spi 200030 crypto-alg aes-gcm-128 crypto-key 454a536c756854704a7250454c44474c esp
exec ipsec tunnel protect ipip30 sa-out 30 sa-in 100030 add
exec set interface ip address loop0 100.0.31.1/32
exec create ipip tunnel src 100.0.31.1 dst 200.0.0.102 p2p
exec ipsec sa add 31 spi 100031 crypto-alg aes-gcm-128 crypto-key 44447a70746359516e61687369555065 esp
exec ipsec sa add 100031 spi 200031 crypto-alg aes-gcm-128 crypto-key 44447a70746359516e61687369555065 esp
exec ipsec tunnel protect ipip31 sa-out 31 sa-in 100031 add
exec set interface ip address loop0 100.0.32.1/32
exec create ipip tunnel src 100.0.32.1 dst 200.0.0.102 p2p
exec ipsec sa add 32 spi 100032 crypto-alg aes-gcm-128 crypto-key 63486b624c7147517067697367635959 esp
exec ipsec sa add 100032 spi 200032 crypto-alg aes-gcm-128 crypto-key 63486b624c7147517067697367635959 esp
exec ipsec tunnel protect ipip32 sa-out 32 sa-in 100032 add
exec set interface ip address loop0 100.0.33.1/32
exec create ipip tunnel src 100.0.33.1 dst 200.0.0.102 p2p
exec ipsec sa add 33 spi 100033 crypto-alg aes-gcm-128 crypto-key 78597062727773776257667369616e45 esp
exec ipsec sa add 100033 spi 200033 crypto-alg aes-gcm-128 crypto-key 78597062727773776257667369616e45 esp
exec ipsec tunnel protect ipip33 sa-out 33 sa-in 100033 add
exec set interface ip address loop0 100.0.34.1/32
exec create ipip tunnel src 100.0.34.1 dst 200.0.0.102 p2p
exec ipsec sa add 34 spi 100034 crypto-alg aes-gcm-128 crypto-key 6861564a6e635453646a554e57475850 esp
exec ipsec sa add 100034 spi 200034 crypto-alg aes-gcm-128 crypto-key 6861564a6e635453646a554e57475850 esp
exec ipsec tunnel protect ipip34 sa-out 34 sa-in 100034 add
exec set interface ip address loop0 100.0.35.1/32
exec create ipip tunnel src 100.0.35.1 dst 200.0.0.102 p2p
exec ipsec sa add 35 spi 100035 crypto-alg aes-gcm-128 crypto-key 61794f5674444e4c6e43456f7a484f7a esp
exec ipsec sa add 100035 spi 200035 crypto-alg aes-gcm-128 crypto-key 61794f5674444e4c6e43456f7a484f7a esp
exec ipsec tunnel protect ipip35 sa-out 35 sa-in 100035 add
exec set interface ip address loop0 100.0.36.1/32
exec create ipip tunnel src 100.0.36.1 dst 200.0.0.102 p2p
exec ipsec sa add 36 spi 100036 crypto-alg aes-gcm-128 crypto-key 6858765a714a614c566254614c7a6458 esp
exec ipsec sa add 100036 spi 200036 crypto-alg aes-gcm-128 crypto-key 6858765a714a614c566254614c7a6458 esp
exec ipsec tunnel protect ipip36 sa-out 36 sa-in 100036 add
exec set interface ip address loop0 100.0.37.1/32
exec create ipip tunnel src 100.0.37.1 dst 200.0.0.102 p2p
exec ipsec sa add 37 spi 100037 crypto-alg aes-gcm-128 crypto-key 536c706b46424e676841534d62535772 esp
exec ipsec sa add 100037 spi 200037 crypto-alg aes-gcm-128 crypto-key 536c706b46424e676841534d62535772 esp
exec ipsec tunnel protect ipip37 sa-out 37 sa-in 100037 add
exec set interface ip address loop0 100.0.38.1/32
exec create ipip tunnel src 100.0.38.1 dst 200.0.0.102 p2p
exec ipsec sa add 38 spi 100038 crypto-alg aes-gcm-128 crypto-key 6745677570516e49647a4e706b666371 esp
exec ipsec sa add 100038 spi 200038 crypto-alg aes-gcm-128 crypto-key 6745677570516e49647a4e706b666371 esp
exec ipsec tunnel protect ipip38 sa-out 38 sa-in 100038 add
exec set interface ip address loop0 100.0.39.1/32
exec create ipip tunnel src 100.0.39.1 dst 200.0.0.102 p2p
exec ipsec sa add 39 spi 100039 crypto-alg aes-gcm-128 crypto-key 58506948535763724753726e734b7454 esp
exec ipsec sa add 100039 spi 200039 crypto-alg aes-gcm-128 crypto-key 58506948535763724753726e734b7454 esp
exec ipsec tunnel protect ipip39 sa-out 39 sa-in 100039 add
exec set interface unnumbered ipip0 use TenGigabitEthernet8/0/0
exec set interface state ipip0 up
exec ip route add 20.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use TenGigabitEthernet8/0/0
exec set interface state ipip1 up
exec ip route add 20.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use TenGigabitEthernet8/0/0
exec set interface state ipip2 up
exec ip route add 20.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use TenGigabitEthernet8/0/0
exec set interface state ipip3 up
exec ip route add 20.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use TenGigabitEthernet8/0/0
exec set interface state ipip4 up
exec ip route add 20.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use TenGigabitEthernet8/0/0
exec set interface state ipip5 up
exec ip route add 20.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use TenGigabitEthernet8/0/0
exec set interface state ipip6 up
exec ip route add 20.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use TenGigabitEthernet8/0/0
exec set interface state ipip7 up
exec ip route add 20.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use TenGigabitEthernet8/0/0
exec set interface state ipip8 up
exec ip route add 20.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use TenGigabitEthernet8/0/0
exec set interface state ipip9 up
exec ip route add 20.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use TenGigabitEthernet8/0/0
exec set interface state ipip10 up
exec ip route add 20.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use TenGigabitEthernet8/0/0
exec set interface state ipip11 up
exec ip route add 20.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use TenGigabitEthernet8/0/0
exec set interface state ipip12 up
exec ip route add 20.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use TenGigabitEthernet8/0/0
exec set interface state ipip13 up
exec ip route add 20.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use TenGigabitEthernet8/0/0
exec set interface state ipip14 up
exec ip route add 20.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use TenGigabitEthernet8/0/0
exec set interface state ipip15 up
exec ip route add 20.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use TenGigabitEthernet8/0/0
exec set interface state ipip16 up
exec ip route add 20.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use TenGigabitEthernet8/0/0
exec set interface state ipip17 up
exec ip route add 20.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use TenGigabitEthernet8/0/0
exec set interface state ipip18 up
exec ip route add 20.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use TenGigabitEthernet8/0/0
exec set interface state ipip19 up
exec ip route add 20.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use TenGigabitEthernet8/0/0
exec set interface state ipip20 up
exec ip route add 20.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use TenGigabitEthernet8/0/0
exec set interface state ipip21 up
exec ip route add 20.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use TenGigabitEthernet8/0/0
exec set interface state ipip22 up
exec ip route add 20.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use TenGigabitEthernet8/0/0
exec set interface state ipip23 up
exec ip route add 20.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use TenGigabitEthernet8/0/0
exec set interface state ipip24 up
exec ip route add 20.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use TenGigabitEthernet8/0/0
exec set interface state ipip25 up
exec ip route add 20.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use TenGigabitEthernet8/0/0
exec set interface state ipip26 up
exec ip route add 20.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use TenGigabitEthernet8/0/0
exec set interface state ipip27 up
exec ip route add 20.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use TenGigabitEthernet8/0/0
exec set interface state ipip28 up
exec ip route add 20.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use TenGigabitEthernet8/0/0
exec set interface state ipip29 up
exec ip route add 20.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use TenGigabitEthernet8/0/0
exec set interface state ipip30 up
exec ip route add 20.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use TenGigabitEthernet8/0/0
exec set interface state ipip31 up
exec ip route add 20.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use TenGigabitEthernet8/0/0
exec set interface state ipip32 up
exec ip route add 20.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use TenGigabitEthernet8/0/0
exec set interface state ipip33 up
exec ip route add 20.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use TenGigabitEthernet8/0/0
exec set interface state ipip34 up
exec ip route add 20.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use TenGigabitEthernet8/0/0
exec set interface state ipip35 up
exec ip route add 20.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use TenGigabitEthernet8/0/0
exec set interface state ipip36 up
exec ip route add 20.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use TenGigabitEthernet8/0/0
exec set interface state ipip37 up
exec ip route add 20.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use TenGigabitEthernet8/0/0
exec set interface state ipip38 up
exec ip route add 20.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use TenGigabitEthernet8/0/0
exec set interface state ipip39 up
exec ip route add 20.0.0.39/32 via ipip39
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec set interface ip address TenGigabitEthernet8/0/0 200.0.0.102/24.0
exec create ipip tunnel src 200.0.0.102 dst 100.0.0.1 p2p
exec ipsec sa add 100000 spi 200000 crypto-alg aes-gcm-128 crypto-key 5854524d5248576b5157576e53446857 esp
exec ipsec sa add 0 spi 100000 crypto-alg aes-gcm-128 crypto-key 5854524d5248576b5157576e53446857 esp
exec ipsec tunnel protect ipip0 sa-out 100000 sa-in 0 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.1.1 p2p
exec ipsec sa add 100001 spi 200001 crypto-alg aes-gcm-128 crypto-key 67445378566d6d70565a436c7470796c esp
exec ipsec sa add 1 spi 100001 crypto-alg aes-gcm-128 crypto-key 67445378566d6d70565a436c7470796c esp
exec ipsec tunnel protect ipip1 sa-out 100001 sa-in 1 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.2.1 p2p
exec ipsec sa add 100002 spi 200002 crypto-alg aes-gcm-128 crypto-key 6a4c744843434f575867424673556d6a esp
exec ipsec sa add 2 spi 100002 crypto-alg aes-gcm-128 crypto-key 6a4c744843434f575867424673556d6a esp
exec ipsec tunnel protect ipip2 sa-out 100002 sa-in 2 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.3.1 p2p
exec ipsec sa add 100003 spi 200003 crypto-alg aes-gcm-128 crypto-key 554e61415263654f4a577a76724e4776 esp
exec ipsec sa add 3 spi 100003 crypto-alg aes-gcm-128 crypto-key 554e61415263654f4a577a76724e4776 esp
exec ipsec tunnel protect ipip3 sa-out 100003 sa-in 3 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.4.1 p2p
exec ipsec sa add 100004 spi 200004 crypto-alg aes-gcm-128 crypto-key 6b634b7167546f4e7563544f694a7654 esp
exec ipsec sa add 4 spi 100004 crypto-alg aes-gcm-128 crypto-key 6b634b7167546f4e7563544f694a7654 esp
exec ipsec tunnel protect ipip4 sa-out 100004 sa-in 4 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.5.1 p2p
exec ipsec sa add 100005 spi 200005 crypto-alg aes-gcm-128 crypto-key 664a69674d636e794374496e6b65426a esp
exec ipsec sa add 5 spi 100005 crypto-alg aes-gcm-128 crypto-key 664a69674d636e794374496e6b65426a esp
exec ipsec tunnel protect ipip5 sa-out 100005 sa-in 5 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.6.1 p2p
exec ipsec sa add 100006 spi 200006 crypto-alg aes-gcm-128 crypto-key 674a7a794942774450736f645650476b esp
exec ipsec sa add 6 spi 100006 crypto-alg aes-gcm-128 crypto-key 674a7a794942774450736f645650476b esp
exec ipsec tunnel protect ipip6 sa-out 100006 sa-in 6 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.7.1 p2p
exec ipsec sa add 100007 spi 200007 crypto-alg aes-gcm-128 crypto-key 62635a444c4b6c4f79714b777257676e esp
exec ipsec sa add 7 spi 100007 crypto-alg aes-gcm-128 crypto-key 62635a444c4b6c4f79714b777257676e esp
exec ipsec tunnel protect ipip7 sa-out 100007 sa-in 7 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.8.1 p2p
exec ipsec sa add 100008 spi 200008 crypto-alg aes-gcm-128 crypto-key 5263546866674e705a566452416b6e49 esp
exec ipsec sa add 8 spi 100008 crypto-alg aes-gcm-128 crypto-key 5263546866674e705a566452416b6e49 esp
exec ipsec tunnel protect ipip8 sa-out 100008 sa-in 8 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.9.1 p2p
exec ipsec sa add 100009 spi 200009 crypto-alg aes-gcm-128 crypto-key 7869776877686e5250414f7379597641 esp
exec ipsec sa add 9 spi 100009 crypto-alg aes-gcm-128 crypto-key 7869776877686e5250414f7379597641 esp
exec ipsec tunnel protect ipip9 sa-out 100009 sa-in 9 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.10.1 p2p
exec ipsec sa add 100010 spi 200010 crypto-alg aes-gcm-128 crypto-key 4e7a41537a4c4b777369566a736d5652 esp
exec ipsec sa add 10 spi 100010 crypto-alg aes-gcm-128 crypto-key 4e7a41537a4c4b777369566a736d5652 esp
exec ipsec tunnel protect ipip10 sa-out 100010 sa-in 10 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.11.1 p2p
exec ipsec sa add 100011 spi 200011 crypto-alg aes-gcm-128 crypto-key 596c6444576d75665168516877424d48 esp
exec ipsec sa add 11 spi 100011 crypto-alg aes-gcm-128 crypto-key 596c6444576d75665168516877424d48 esp
exec ipsec tunnel protect ipip11 sa-out 100011 sa-in 11 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.12.1 p2p
exec ipsec sa add 100012 spi 200012 crypto-alg aes-gcm-128 crypto-key 526c73765946784576466a6455666950 esp
exec ipsec sa add 12 spi 100012 crypto-alg aes-gcm-128 crypto-key 526c73765946784576466a6455666950 esp
exec ipsec tunnel protect ipip12 sa-out 100012 sa-in 12 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.13.1 p2p
exec ipsec sa add 100013 spi 200013 crypto-alg aes-gcm-128 crypto-key 4352534d666f49466a48654c57424278 esp
exec ipsec sa add 13 spi 100013 crypto-alg aes-gcm-128 crypto-key 4352534d666f49466a48654c57424278 esp
exec ipsec tunnel protect ipip13 sa-out 100013 sa-in 13 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.14.1 p2p
exec ipsec sa add 100014 spi 200014 crypto-alg aes-gcm-128 crypto-key 566b6a504b6a52767262476e67694656 esp
exec ipsec sa add 14 spi 100014 crypto-alg aes-gcm-128 crypto-key 566b6a504b6a52767262476e67694656 esp
exec ipsec tunnel protect ipip14 sa-out 100014 sa-in 14 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.15.1 p2p
exec ipsec sa add 100015 spi 200015 crypto-alg aes-gcm-128 crypto-key 536f716d434653707347756f67666658 esp
exec ipsec sa add 15 spi 100015 crypto-alg aes-gcm-128 crypto-key 536f716d434653707347756f67666658 esp
exec ipsec tunnel protect ipip15 sa-out 100015 sa-in 15 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.16.1 p2p
exec ipsec sa add 100016 spi 200016 crypto-alg aes-gcm-128 crypto-key 5a777a4d466b7a63734369416a57646e esp
exec ipsec sa add 16 spi 100016 crypto-alg aes-gcm-128 crypto-key 5a777a4d466b7a63734369416a57646e esp
exec ipsec tunnel protect ipip16 sa-out 100016 sa-in 16 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.17.1 p2p
exec ipsec sa add 100017 spi 200017 crypto-alg aes-gcm-128 crypto-key 4d43694579685373795a65625154486e esp
exec ipsec sa add 17 spi 100017 crypto-alg aes-gcm-128 crypto-key 4d43694579685373795a65625154486e esp
exec ipsec tunnel protect ipip17 sa-out 100017 sa-in 17 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.18.1 p2p
exec ipsec sa add 100018 spi 200018 crypto-alg aes-gcm-128 crypto-key 696c4b6c5174436376537052437a676a esp
exec ipsec sa add 18 spi 100018 crypto-alg aes-gcm-128 crypto-key 696c4b6c5174436376537052437a676a esp
exec ipsec tunnel protect ipip18 sa-out 100018 sa-in 18 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.19.1 p2p
exec ipsec sa add 100019 spi 200019 crypto-alg aes-gcm-128 crypto-key 62786a464d72634c675a576153694946 esp
exec ipsec sa add 19 spi 100019 crypto-alg aes-gcm-128 crypto-key 62786a464d72634c675a576153694946 esp
exec ipsec tunnel protect ipip19 sa-out 100019 sa-in 19 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.20.1 p2p
exec ipsec sa add 100020 spi 200020 crypto-alg aes-gcm-128 crypto-key 5368574c73695776654f7168764b5254 esp
exec ipsec sa add 20 spi 100020 crypto-alg aes-gcm-128 crypto-key 5368574c73695776654f7168764b5254 esp
exec ipsec tunnel protect ipip20 sa-out 100020 sa-in 20 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.21.1 p2p
exec ipsec sa add 100021 spi 200021 crypto-alg aes-gcm-128 crypto-key 456c467849777049614a71466c57424b esp
exec ipsec sa add 21 spi 100021 crypto-alg aes-gcm-128 crypto-key 456c467849777049614a71466c57424b esp
exec ipsec tunnel protect ipip21 sa-out 100021 sa-in 21 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.22.1 p2p
exec ipsec sa add 100022 spi 200022 crypto-alg aes-gcm-128 crypto-key 68544c725143664943726f62794d7377 esp
exec ipsec sa add 22 spi 100022 crypto-alg aes-gcm-128 crypto-key 68544c725143664943726f62794d7377 esp
exec ipsec tunnel protect ipip22 sa-out 100022 sa-in 22 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.23.1 p2p
exec ipsec sa add 100023 spi 200023 crypto-alg aes-gcm-128 crypto-key 7870775573655364686b704373574176 esp
exec ipsec sa add 23 spi 100023 crypto-alg aes-gcm-128 crypto-key 7870775573655364686b704373574176 esp
exec ipsec tunnel protect ipip23 sa-out 100023 sa-in 23 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.24.1 p2p
exec ipsec sa add 100024 spi 200024 crypto-alg aes-gcm-128 crypto-key 63666c6f414841746961684e71625a4d esp
exec ipsec sa add 24 spi 100024 crypto-alg aes-gcm-128 crypto-key 63666c6f414841746961684e71625a4d esp
exec ipsec tunnel protect ipip24 sa-out 100024 sa-in 24 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.25.1 p2p
exec ipsec sa add 100025 spi 200025 crypto-alg aes-gcm-128 crypto-key 71594f6976526f775a6c4e6761514162 esp
exec ipsec sa add 25 spi 100025 crypto-alg aes-gcm-128 crypto-key 71594f6976526f775a6c4e6761514162 esp
exec ipsec tunnel protect ipip25 sa-out 100025 sa-in 25 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.26.1 p2p
exec ipsec sa add 100026 spi 200026 crypto-alg aes-gcm-128 crypto-key 7165635a6a4167414371694962757772 esp
exec ipsec sa add 26 spi 100026 crypto-alg aes-gcm-128 crypto-key 7165635a6a4167414371694962757772 esp
exec ipsec tunnel protect ipip26 sa-out 100026 sa-in 26 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.27.1 p2p
exec ipsec sa add 100027 spi 200027 crypto-alg aes-gcm-128 crypto-key 614f615865735257727141697a565554 esp
exec ipsec sa add 27 spi 100027 crypto-alg aes-gcm-128 crypto-key 614f615865735257727141697a565554 esp
exec ipsec tunnel protect ipip27 sa-out 100027 sa-in 27 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.28.1 p2p
exec ipsec sa add 100028 spi 200028 crypto-alg aes-gcm-128 crypto-key 704d795a426949707a527a6372477854 esp
exec ipsec sa add 28 spi 100028 crypto-alg aes-gcm-128 crypto-key 704d795a426949707a527a6372477854 esp
exec ipsec tunnel protect ipip28 sa-out 100028 sa-in 28 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.29.1 p2p
exec ipsec sa add 100029 spi 200029 crypto-alg aes-gcm-128 crypto-key 566f70536b6b594e4e74595079417865 esp
exec ipsec sa add 29 spi 100029 crypto-alg aes-gcm-128 crypto-key 566f70536b6b594e4e74595079417865 esp
exec ipsec tunnel protect ipip29 sa-out 100029 sa-in 29 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.30.1 p2p
exec ipsec sa add 100030 spi 200030 crypto-alg aes-gcm-128 crypto-key 454a536c756854704a7250454c44474c esp
exec ipsec sa add 30 spi 100030 crypto-alg aes-gcm-128 crypto-key 454a536c756854704a7250454c44474c esp
exec ipsec tunnel protect ipip30 sa-out 100030 sa-in 30 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.31.1 p2p
exec ipsec sa add 100031 spi 200031 crypto-alg aes-gcm-128 crypto-key 44447a70746359516e61687369555065 esp
exec ipsec sa add 31 spi 100031 crypto-alg aes-gcm-128 crypto-key 44447a70746359516e61687369555065 esp
exec ipsec tunnel protect ipip31 sa-out 100031 sa-in 31 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.32.1 p2p
exec ipsec sa add 100032 spi 200032 crypto-alg aes-gcm-128 crypto-key 63486b624c7147517067697367635959 esp
exec ipsec sa add 32 spi 100032 crypto-alg aes-gcm-128 crypto-key 63486b624c7147517067697367635959 esp
exec ipsec tunnel protect ipip32 sa-out 100032 sa-in 32 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.33.1 p2p
exec ipsec sa add 100033 spi 200033 crypto-alg aes-gcm-128 crypto-key 78597062727773776257667369616e45 esp
exec ipsec sa add 33 spi 100033 crypto-alg aes-gcm-128 crypto-key 78597062727773776257667369616e45 esp
exec ipsec tunnel protect ipip33 sa-out 100033 sa-in 33 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.34.1 p2p
exec ipsec sa add 100034 spi 200034 crypto-alg aes-gcm-128 crypto-key 6861564a6e635453646a554e57475850 esp
exec ipsec sa add 34 spi 100034 crypto-alg aes-gcm-128 crypto-key 6861564a6e635453646a554e57475850 esp
exec ipsec tunnel protect ipip34 sa-out 100034 sa-in 34 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.35.1 p2p
exec ipsec sa add 100035 spi 200035 crypto-alg aes-gcm-128 crypto-key 61794f5674444e4c6e43456f7a484f7a esp
exec ipsec sa add 35 spi 100035 crypto-alg aes-gcm-128 crypto-key 61794f5674444e4c6e43456f7a484f7a esp
exec ipsec tunnel protect ipip35 sa-out 100035 sa-in 35 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.36.1 p2p
exec ipsec sa add 100036 spi 200036 crypto-alg aes-gcm-128 crypto-key 6858765a714a614c566254614c7a6458 esp
exec ipsec sa add 36 spi 100036 crypto-alg aes-gcm-128 crypto-key 6858765a714a614c566254614c7a6458 esp
exec ipsec tunnel protect ipip36 sa-out 100036 sa-in 36 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.37.1 p2p
exec ipsec sa add 100037 spi 200037 crypto-alg aes-gcm-128 crypto-key 536c706b46424e676841534d62535772 esp
exec ipsec sa add 37 spi 100037 crypto-alg aes-gcm-128 crypto-key 536c706b46424e676841534d62535772 esp
exec ipsec tunnel protect ipip37 sa-out 100037 sa-in 37 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.38.1 p2p
exec ipsec sa add 100038 spi 200038 crypto-alg aes-gcm-128 crypto-key 6745677570516e49647a4e706b666371 esp
exec ipsec sa add 38 spi 100038 crypto-alg aes-gcm-128 crypto-key 6745677570516e49647a4e706b666371 esp
exec ipsec tunnel protect ipip38 sa-out 100038 sa-in 38 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.39.1 p2p
exec ipsec sa add 100039 spi 200039 crypto-alg aes-gcm-128 crypto-key 58506948535763724753726e734b7454 esp
exec ipsec sa add 39 spi 100039 crypto-alg aes-gcm-128 crypto-key 58506948535763724753726e734b7454 esp
exec ipsec tunnel protect ipip39 sa-out 100039 sa-in 39 add
exec ip route add 100.0.0.1/8 via 200.0.0.101 TenGigabitEthernet8/0/0
exec set interface unnumbered ipip0 use TenGigabitEthernet8/0/0
exec set interface state ipip0 up
exec ip route add 10.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use TenGigabitEthernet8/0/0
exec set interface state ipip1 up
exec ip route add 10.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use TenGigabitEthernet8/0/0
exec set interface state ipip2 up
exec ip route add 10.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use TenGigabitEthernet8/0/0
exec set interface state ipip3 up
exec ip route add 10.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use TenGigabitEthernet8/0/0
exec set interface state ipip4 up
exec ip route add 10.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use TenGigabitEthernet8/0/0
exec set interface state ipip5 up
exec ip route add 10.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use TenGigabitEthernet8/0/0
exec set interface state ipip6 up
exec ip route add 10.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use TenGigabitEthernet8/0/0
exec set interface state ipip7 up
exec ip route add 10.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use TenGigabitEthernet8/0/0
exec set interface state ipip8 up
exec ip route add 10.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use TenGigabitEthernet8/0/0
exec set interface state ipip9 up
exec ip route add 10.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use TenGigabitEthernet8/0/0
exec set interface state ipip10 up
exec ip route add 10.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use TenGigabitEthernet8/0/0
exec set interface state ipip11 up
exec ip route add 10.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use TenGigabitEthernet8/0/0
exec set interface state ipip12 up
exec ip route add 10.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use TenGigabitEthernet8/0/0
exec set interface state ipip13 up
exec ip route add 10.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use TenGigabitEthernet8/0/0
exec set interface state ipip14 up
exec ip route add 10.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use TenGigabitEthernet8/0/0
exec set interface state ipip15 up
exec ip route add 10.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use TenGigabitEthernet8/0/0
exec set interface state ipip16 up
exec ip route add 10.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use TenGigabitEthernet8/0/0
exec set interface state ipip17 up
exec ip route add 10.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use TenGigabitEthernet8/0/0
exec set interface state ipip18 up
exec ip route add 10.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use TenGigabitEthernet8/0/0
exec set interface state ipip19 up
exec ip route add 10.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use TenGigabitEthernet8/0/0
exec set interface state ipip20 up
exec ip route add 10.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use TenGigabitEthernet8/0/0
exec set interface state ipip21 up
exec ip route add 10.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use TenGigabitEthernet8/0/0
exec set interface state ipip22 up
exec ip route add 10.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use TenGigabitEthernet8/0/0
exec set interface state ipip23 up
exec ip route add 10.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use TenGigabitEthernet8/0/0
exec set interface state ipip24 up
exec ip route add 10.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use TenGigabitEthernet8/0/0
exec set interface state ipip25 up
exec ip route add 10.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use TenGigabitEthernet8/0/0
exec set interface state ipip26 up
exec ip route add 10.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use TenGigabitEthernet8/0/0
exec set interface state ipip27 up
exec ip route add 10.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use TenGigabitEthernet8/0/0
exec set interface state ipip28 up
exec ip route add 10.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use TenGigabitEthernet8/0/0
exec set interface state ipip29 up
exec ip route add 10.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use TenGigabitEthernet8/0/0
exec set interface state ipip30 up
exec ip route add 10.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use TenGigabitEthernet8/0/0
exec set interface state ipip31 up
exec ip route add 10.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use TenGigabitEthernet8/0/0
exec set interface state ipip32 up
exec ip route add 10.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use TenGigabitEthernet8/0/0
exec set interface state ipip33 up
exec ip route add 10.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use TenGigabitEthernet8/0/0
exec set interface state ipip34 up
exec ip route add 10.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use TenGigabitEthernet8/0/0
exec set interface state ipip35 up
exec ip route add 10.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use TenGigabitEthernet8/0/0
exec set interface state ipip36 up
exec ip route add 10.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use TenGigabitEthernet8/0/0
exec set interface state ipip37 up
exec ip route add 10.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use TenGigabitEthernet8/0/0
exec set interface state ipip38 up
exec ip route add 10.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use TenGigabitEthernet8/0/0
exec set interface state ipip39 up
exec ip route add 10.0.0.39/32 via ipip39

 1518b-2t2c-ethip4ipsec40tnlsw- 
ip4base-int-aes128gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec create loopback interface
exec set interface state loop0 up
exec set interface ip address TenGigabitEthernet8/0/0 200.0.0.101/24
exec set ip neighbor TenGigabitEthernet8/0/0 200.0.0.102 ac:1f:6b:57:57:fe static
exec set interface ip address loop0 100.0.0.1/32
exec create ipip tunnel src 100.0.0.1 dst 200.0.0.102 p2p
exec ipsec sa add 0 spi 100000 crypto-alg aes-gcm-128 crypto-key 414e657251625643496465654a6d7066 esp
exec ipsec sa add 100000 spi 200000 crypto-alg aes-gcm-128 crypto-key 414e657251625643496465654a6d7066 esp
exec ipsec tunnel protect ipip0 sa-out 0 sa-in 100000 add
exec set interface ip address loop0 100.0.1.1/32
exec create ipip tunnel src 100.0.1.1 dst 200.0.0.102 p2p
exec ipsec sa add 1 spi 100001 crypto-alg aes-gcm-128 crypto-key 6344786a414a66586f4d775067634150 esp
exec ipsec sa add 100001 spi 200001 crypto-alg aes-gcm-128 crypto-key 6344786a414a66586f4d775067634150 esp
exec ipsec tunnel protect ipip1 sa-out 1 sa-in 100001 add
exec set interface ip address loop0 100.0.2.1/32
exec create ipip tunnel src 100.0.2.1 dst 200.0.0.102 p2p
exec ipsec sa add 2 spi 100002 crypto-alg aes-gcm-128 crypto-key 4c615367716b68614e685666524d656b esp
exec ipsec sa add 100002 spi 200002 crypto-alg aes-gcm-128 crypto-key 4c615367716b68614e685666524d656b esp
exec ipsec tunnel protect ipip2 sa-out 2 sa-in 100002 add
exec set interface ip address loop0 100.0.3.1/32
exec create ipip tunnel src 100.0.3.1 dst 200.0.0.102 p2p
exec ipsec sa add 3 spi 100003 crypto-alg aes-gcm-128 crypto-key 6e674972796561736951695772717a54 esp
exec ipsec sa add 100003 spi 200003 crypto-alg aes-gcm-128 crypto-key 6e674972796561736951695772717a54 esp
exec ipsec tunnel protect ipip3 sa-out 3 sa-in 100003 add
exec set interface ip address loop0 100.0.4.1/32
exec create ipip tunnel src 100.0.4.1 dst 200.0.0.102 p2p
exec ipsec sa add 4 spi 100004 crypto-alg aes-gcm-128 crypto-key 6d6b51565373537a71624e6e644e474d esp
exec ipsec sa add 100004 spi 200004 crypto-alg aes-gcm-128 crypto-key 6d6b51565373537a71624e6e644e474d esp
exec ipsec tunnel protect ipip4 sa-out 4 sa-in 100004 add
exec set interface ip address loop0 100.0.5.1/32
exec create ipip tunnel src 100.0.5.1 dst 200.0.0.102 p2p
exec ipsec sa add 5 spi 100005 crypto-alg aes-gcm-128 crypto-key 574279437575495566535a4e7048774d esp
exec ipsec sa add 100005 spi 200005 crypto-alg aes-gcm-128 crypto-key 574279437575495566535a4e7048774d esp
exec ipsec tunnel protect ipip5 sa-out 5 sa-in 100005 add
exec set interface ip address loop0 100.0.6.1/32
exec create ipip tunnel src 100.0.6.1 dst 200.0.0.102 p2p
exec ipsec sa add 6 spi 100006 crypto-alg aes-gcm-128 crypto-key 6c4f52756b44586c4266514949796178 esp
exec ipsec sa add 100006 spi 200006 crypto-alg aes-gcm-128 crypto-key 6c4f52756b44586c4266514949796178 esp
exec ipsec tunnel protect ipip6 sa-out 6 sa-in 100006 add
exec set interface ip address loop0 100.0.7.1/32
exec create ipip tunnel src 100.0.7.1 dst 200.0.0.102 p2p
exec ipsec sa add 7 spi 100007 crypto-alg aes-gcm-128 crypto-key 704542706c436f455252416272647956 esp
exec ipsec sa add 100007 spi 200007 crypto-alg aes-gcm-128 crypto-key 704542706c436f455252416272647956 esp
exec ipsec tunnel protect ipip7 sa-out 7 sa-in 100007 add
exec set interface ip address loop0 100.0.8.1/32
exec create ipip tunnel src 100.0.8.1 dst 200.0.0.102 p2p
exec ipsec sa add 8 spi 100008 crypto-alg aes-gcm-128 crypto-key 4159774a69546e645868747164545366 esp
exec ipsec sa add 100008 spi 200008 crypto-alg aes-gcm-128 crypto-key 4159774a69546e645868747164545366 esp
exec ipsec tunnel protect ipip8 sa-out 8 sa-in 100008 add
exec set interface ip address loop0 100.0.9.1/32
exec create ipip tunnel src 100.0.9.1 dst 200.0.0.102 p2p
exec ipsec sa add 9 spi 100009 crypto-alg aes-gcm-128 crypto-key 43707561657278734c755761694e7a68 esp
exec ipsec sa add 100009 spi 200009 crypto-alg aes-gcm-128 crypto-key 43707561657278734c755761694e7a68 esp
exec ipsec tunnel protect ipip9 sa-out 9 sa-in 100009 add
exec set interface ip address loop0 100.0.10.1/32
exec create ipip tunnel src 100.0.10.1 dst 200.0.0.102 p2p
exec ipsec sa add 10 spi 100010 crypto-alg aes-gcm-128 crypto-key 747a42425779506a5878506955576b43 esp
exec ipsec sa add 100010 spi 200010 crypto-alg aes-gcm-128 crypto-key 747a42425779506a5878506955576b43 esp
exec ipsec tunnel protect ipip10 sa-out 10 sa-in 100010 add
exec set interface ip address loop0 100.0.11.1/32
exec create ipip tunnel src 100.0.11.1 dst 200.0.0.102 p2p
exec ipsec sa add 11 spi 100011 crypto-alg aes-gcm-128 crypto-key 484e766c4f6176446e43414e61784b57 esp
exec ipsec sa add 100011 spi 200011 crypto-alg aes-gcm-128 crypto-key 484e766c4f6176446e43414e61784b57 esp
exec ipsec tunnel protect ipip11 sa-out 11 sa-in 100011 add
exec set interface ip address loop0 100.0.12.1/32
exec create ipip tunnel src 100.0.12.1 dst 200.0.0.102 p2p
exec ipsec sa add 12 spi 100012 crypto-alg aes-gcm-128 crypto-key 484c5754794359797377734f6f576547 esp
exec ipsec sa add 100012 spi 200012 crypto-alg aes-gcm-128 crypto-key 484c5754794359797377734f6f576547 esp
exec ipsec tunnel protect ipip12 sa-out 12 sa-in 100012 add
exec set interface ip address loop0 100.0.13.1/32
exec create ipip tunnel src 100.0.13.1 dst 200.0.0.102 p2p
exec ipsec sa add 13 spi 100013 crypto-alg aes-gcm-128 crypto-key 766d496a644a58706a6e484444624156 esp
exec ipsec sa add 100013 spi 200013 crypto-alg aes-gcm-128 crypto-key 766d496a644a58706a6e484444624156 esp
exec ipsec tunnel protect ipip13 sa-out 13 sa-in 100013 add
exec set interface ip address loop0 100.0.14.1/32
exec create ipip tunnel src 100.0.14.1 dst 200.0.0.102 p2p
exec ipsec sa add 14 spi 100014 crypto-alg aes-gcm-128 crypto-key 7a684f61444c4e6753584a5a524f7741 esp
exec ipsec sa add 100014 spi 200014 crypto-alg aes-gcm-128 crypto-key 7a684f61444c4e6753584a5a524f7741 esp
exec ipsec tunnel protect ipip14 sa-out 14 sa-in 100014 add
exec set interface ip address loop0 100.0.15.1/32
exec create ipip tunnel src 100.0.15.1 dst 200.0.0.102 p2p
exec ipsec sa add 15 spi 100015 crypto-alg aes-gcm-128 crypto-key 6e71527175676e70774a704351577146 esp
exec ipsec sa add 100015 spi 200015 crypto-alg aes-gcm-128 crypto-key 6e71527175676e70774a704351577146 esp
exec ipsec tunnel protect ipip15 sa-out 15 sa-in 100015 add
exec set interface ip address loop0 100.0.16.1/32
exec create ipip tunnel src 100.0.16.1 dst 200.0.0.102 p2p
exec ipsec sa add 16 spi 100016 crypto-alg aes-gcm-128 crypto-key 65786b6d686869446b69656d6f506350 esp
exec ipsec sa add 100016 spi 200016 crypto-alg aes-gcm-128 crypto-key 65786b6d686869446b69656d6f506350 esp
exec ipsec tunnel protect ipip16 sa-out 16 sa-in 100016 add
exec set interface ip address loop0 100.0.17.1/32
exec create ipip tunnel src 100.0.17.1 dst 200.0.0.102 p2p
exec ipsec sa add 17 spi 100017 crypto-alg aes-gcm-128 crypto-key 57716953417241664f7944506f72436a esp
exec ipsec sa add 100017 spi 200017 crypto-alg aes-gcm-128 crypto-key 57716953417241664f7944506f72436a esp
exec ipsec tunnel protect ipip17 sa-out 17 sa-in 100017 add
exec set interface ip address loop0 100.0.18.1/32
exec create ipip tunnel src 100.0.18.1 dst 200.0.0.102 p2p
exec ipsec sa add 18 spi 100018 crypto-alg aes-gcm-128 crypto-key 4b4a75596a62546b75736371746e5142 esp
exec ipsec sa add 100018 spi 200018 crypto-alg aes-gcm-128 crypto-key 4b4a75596a62546b75736371746e5142 esp
exec ipsec tunnel protect ipip18 sa-out 18 sa-in 100018 add
exec set interface ip address loop0 100.0.19.1/32
exec create ipip tunnel src 100.0.19.1 dst 200.0.0.102 p2p
exec ipsec sa add 19 spi 100019 crypto-alg aes-gcm-128 crypto-key 6b4f6d54666c747a737945655a43704b esp
exec ipsec sa add 100019 spi 200019 crypto-alg aes-gcm-128 crypto-key 6b4f6d54666c747a737945655a43704b esp
exec ipsec tunnel protect ipip19 sa-out 19 sa-in 100019 add
exec set interface ip address loop0 100.0.20.1/32
exec create ipip tunnel src 100.0.20.1 dst 200.0.0.102 p2p
exec ipsec sa add 20 spi 100020 crypto-alg aes-gcm-128 crypto-key 6a487357774c525549674e4848594977 esp
exec ipsec sa add 100020 spi 200020 crypto-alg aes-gcm-128 crypto-key 6a487357774c525549674e4848594977 esp
exec ipsec tunnel protect ipip20 sa-out 20 sa-in 100020 add
exec set interface ip address loop0 100.0.21.1/32
exec create ipip tunnel src 100.0.21.1 dst 200.0.0.102 p2p
exec ipsec sa add 21 spi 100021 crypto-alg aes-gcm-128 crypto-key 766a644d47616d736b6c637941617176 esp
exec ipsec sa add 100021 spi 200021 crypto-alg aes-gcm-128 crypto-key 766a644d47616d736b6c637941617176 esp
exec ipsec tunnel protect ipip21 sa-out 21 sa-in 100021 add
exec set interface ip address loop0 100.0.22.1/32
exec create ipip tunnel src 100.0.22.1 dst 200.0.0.102 p2p
exec ipsec sa add 22 spi 100022 crypto-alg aes-gcm-128 crypto-key 46575357436c4879654c746f4f6b7766 esp
exec ipsec sa add 100022 spi 200022 crypto-alg aes-gcm-128 crypto-key 46575357436c4879654c746f4f6b7766 esp
exec ipsec tunnel protect ipip22 sa-out 22 sa-in 100022 add
exec set interface ip address loop0 100.0.23.1/32
exec create ipip tunnel src 100.0.23.1 dst 200.0.0.102 p2p
exec ipsec sa add 23 spi 100023 crypto-alg aes-gcm-128 crypto-key 4e6f717a52436a73594f515a474d6b64 esp
exec ipsec sa add 100023 spi 200023 crypto-alg aes-gcm-128 crypto-key 4e6f717a52436a73594f515a474d6b64 esp
exec ipsec tunnel protect ipip23 sa-out 23 sa-in 100023 add
exec set interface ip address loop0 100.0.24.1/32
exec create ipip tunnel src 100.0.24.1 dst 200.0.0.102 p2p
exec ipsec sa add 24 spi 100024 crypto-alg aes-gcm-128 crypto-key 4667637252755a6c637658734e534877 esp
exec ipsec sa add 100024 spi 200024 crypto-alg aes-gcm-128 crypto-key 4667637252755a6c637658734e534877 esp
exec ipsec tunnel protect ipip24 sa-out 24 sa-in 100024 add
exec set interface ip address loop0 100.0.25.1/32
exec create ipip tunnel src 100.0.25.1 dst 200.0.0.102 p2p
exec ipsec sa add 25 spi 100025 crypto-alg aes-gcm-128 crypto-key 5776715a775a4a644755446a74444e4d esp
exec ipsec sa add 100025 spi 200025 crypto-alg aes-gcm-128 crypto-key 5776715a775a4a644755446a74444e4d esp
exec ipsec tunnel protect ipip25 sa-out 25 sa-in 100025 add
exec set interface ip address loop0 100.0.26.1/32
exec create ipip tunnel src 100.0.26.1 dst 200.0.0.102 p2p
exec ipsec sa add 26 spi 100026 crypto-alg aes-gcm-128 crypto-key 6565476a4255484a4d54547751656c71 esp
exec ipsec sa add 100026 spi 200026 crypto-alg aes-gcm-128 crypto-key 6565476a4255484a4d54547751656c71 esp
exec ipsec tunnel protect ipip26 sa-out 26 sa-in 100026 add
exec set interface ip address loop0 100.0.27.1/32
exec create ipip tunnel src 100.0.27.1 dst 200.0.0.102 p2p
exec ipsec sa add 27 spi 100027 crypto-alg aes-gcm-128 crypto-key 7153666b6d654f4862574e6c6e614d6d esp
exec ipsec sa add 100027 spi 200027 crypto-alg aes-gcm-128 crypto-key 7153666b6d654f4862574e6c6e614d6d esp
exec ipsec tunnel protect ipip27 sa-out 27 sa-in 100027 add
exec set interface ip address loop0 100.0.28.1/32
exec create ipip tunnel src 100.0.28.1 dst 200.0.0.102 p2p
exec ipsec sa add 28 spi 100028 crypto-alg aes-gcm-128 crypto-key 657378574e6a7a5769675876546d486c esp
exec ipsec sa add 100028 spi 200028 crypto-alg aes-gcm-128 crypto-key 657378574e6a7a5769675876546d486c esp
exec ipsec tunnel protect ipip28 sa-out 28 sa-in 100028 add
exec set interface ip address loop0 100.0.29.1/32
exec create ipip tunnel src 100.0.29.1 dst 200.0.0.102 p2p
exec ipsec sa add 29 spi 100029 crypto-alg aes-gcm-128 crypto-key 4d63586d716d74546c795a666b436564 esp
exec ipsec sa add 100029 spi 200029 crypto-alg aes-gcm-128 crypto-key 4d63586d716d74546c795a666b436564 esp
exec ipsec tunnel protect ipip29 sa-out 29 sa-in 100029 add
exec set interface ip address loop0 100.0.30.1/32
exec create ipip tunnel src 100.0.30.1 dst 200.0.0.102 p2p
exec ipsec sa add 30 spi 100030 crypto-alg aes-gcm-128 crypto-key 467a5a72514f616a73434d4278504950 esp
exec ipsec sa add 100030 spi 200030 crypto-alg aes-gcm-128 crypto-key 467a5a72514f616a73434d4278504950 esp
exec ipsec tunnel protect ipip30 sa-out 30 sa-in 100030 add
exec set interface ip address loop0 100.0.31.1/32
exec create ipip tunnel src 100.0.31.1 dst 200.0.0.102 p2p
exec ipsec sa add 31 spi 100031 crypto-alg aes-gcm-128 crypto-key 637a4a6857415543666c44756376504b esp
exec ipsec sa add 100031 spi 200031 crypto-alg aes-gcm-128 crypto-key 637a4a6857415543666c44756376504b esp
exec ipsec tunnel protect ipip31 sa-out 31 sa-in 100031 add
exec set interface ip address loop0 100.0.32.1/32
exec create ipip tunnel src 100.0.32.1 dst 200.0.0.102 p2p
exec ipsec sa add 32 spi 100032 crypto-alg aes-gcm-128 crypto-key 51684f6e5049434a4c64704b54597668 esp
exec ipsec sa add 100032 spi 200032 crypto-alg aes-gcm-128 crypto-key 51684f6e5049434a4c64704b54597668 esp
exec ipsec tunnel protect ipip32 sa-out 32 sa-in 100032 add
exec set interface ip address loop0 100.0.33.1/32
exec create ipip tunnel src 100.0.33.1 dst 200.0.0.102 p2p
exec ipsec sa add 33 spi 100033 crypto-alg aes-gcm-128 crypto-key 486c467562476c66666b4a644d4f6b69 esp
exec ipsec sa add 100033 spi 200033 crypto-alg aes-gcm-128 crypto-key 486c467562476c66666b4a644d4f6b69 esp
exec ipsec tunnel protect ipip33 sa-out 33 sa-in 100033 add
exec set interface ip address loop0 100.0.34.1/32
exec create ipip tunnel src 100.0.34.1 dst 200.0.0.102 p2p
exec ipsec sa add 34 spi 100034 crypto-alg aes-gcm-128 crypto-key 4d6a48566b49414773496e6569486e77 esp
exec ipsec sa add 100034 spi 200034 crypto-alg aes-gcm-128 crypto-key 4d6a48566b49414773496e6569486e77 esp
exec ipsec tunnel protect ipip34 sa-out 34 sa-in 100034 add
exec set interface ip address loop0 100.0.35.1/32
exec create ipip tunnel src 100.0.35.1 dst 200.0.0.102 p2p
exec ipsec sa add 35 spi 100035 crypto-alg aes-gcm-128 crypto-key 416441596c6c655a586a596f7869694f esp
exec ipsec sa add 100035 spi 200035 crypto-alg aes-gcm-128 crypto-key 416441596c6c655a586a596f7869694f esp
exec ipsec tunnel protect ipip35 sa-out 35 sa-in 100035 add
exec set interface ip address loop0 100.0.36.1/32
exec create ipip tunnel src 100.0.36.1 dst 200.0.0.102 p2p
exec ipsec sa add 36 spi 100036 crypto-alg aes-gcm-128 crypto-key 4f52415258674256426370625446654c esp
exec ipsec sa add 100036 spi 200036 crypto-alg aes-gcm-128 crypto-key 4f52415258674256426370625446654c esp
exec ipsec tunnel protect ipip36 sa-out 36 sa-in 100036 add
exec set interface ip address loop0 100.0.37.1/32
exec create ipip tunnel src 100.0.37.1 dst 200.0.0.102 p2p
exec ipsec sa add 37 spi 100037 crypto-alg aes-gcm-128 crypto-key 4868565a4e727570454d4d655a655747 esp
exec ipsec sa add 100037 spi 200037 crypto-alg aes-gcm-128 crypto-key 4868565a4e727570454d4d655a655747 esp
exec ipsec tunnel protect ipip37 sa-out 37 sa-in 100037 add
exec set interface ip address loop0 100.0.38.1/32
exec create ipip tunnel src 100.0.38.1 dst 200.0.0.102 p2p
exec ipsec sa add 38 spi 100038 crypto-alg aes-gcm-128 crypto-key 485a49566b52596d6a4f66525063626f esp
exec ipsec sa add 100038 spi 200038 crypto-alg aes-gcm-128 crypto-key 485a49566b52596d6a4f66525063626f esp
exec ipsec tunnel protect ipip38 sa-out 38 sa-in 100038 add
exec set interface ip address loop0 100.0.39.1/32
exec create ipip tunnel src 100.0.39.1 dst 200.0.0.102 p2p
exec ipsec sa add 39 spi 100039 crypto-alg aes-gcm-128 crypto-key 6850425374756a4577444953546c4a48 esp
exec ipsec sa add 100039 spi 200039 crypto-alg aes-gcm-128 crypto-key 6850425374756a4577444953546c4a48 esp
exec ipsec tunnel protect ipip39 sa-out 39 sa-in 100039 add
exec set interface unnumbered ipip0 use TenGigabitEthernet8/0/0
exec set interface state ipip0 up
exec ip route add 20.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use TenGigabitEthernet8/0/0
exec set interface state ipip1 up
exec ip route add 20.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use TenGigabitEthernet8/0/0
exec set interface state ipip2 up
exec ip route add 20.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use TenGigabitEthernet8/0/0
exec set interface state ipip3 up
exec ip route add 20.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use TenGigabitEthernet8/0/0
exec set interface state ipip4 up
exec ip route add 20.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use TenGigabitEthernet8/0/0
exec set interface state ipip5 up
exec ip route add 20.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use TenGigabitEthernet8/0/0
exec set interface state ipip6 up
exec ip route add 20.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use TenGigabitEthernet8/0/0
exec set interface state ipip7 up
exec ip route add 20.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use TenGigabitEthernet8/0/0
exec set interface state ipip8 up
exec ip route add 20.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use TenGigabitEthernet8/0/0
exec set interface state ipip9 up
exec ip route add 20.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use TenGigabitEthernet8/0/0
exec set interface state ipip10 up
exec ip route add 20.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use TenGigabitEthernet8/0/0
exec set interface state ipip11 up
exec ip route add 20.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use TenGigabitEthernet8/0/0
exec set interface state ipip12 up
exec ip route add 20.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use TenGigabitEthernet8/0/0
exec set interface state ipip13 up
exec ip route add 20.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use TenGigabitEthernet8/0/0
exec set interface state ipip14 up
exec ip route add 20.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use TenGigabitEthernet8/0/0
exec set interface state ipip15 up
exec ip route add 20.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use TenGigabitEthernet8/0/0
exec set interface state ipip16 up
exec ip route add 20.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use TenGigabitEthernet8/0/0
exec set interface state ipip17 up
exec ip route add 20.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use TenGigabitEthernet8/0/0
exec set interface state ipip18 up
exec ip route add 20.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use TenGigabitEthernet8/0/0
exec set interface state ipip19 up
exec ip route add 20.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use TenGigabitEthernet8/0/0
exec set interface state ipip20 up
exec ip route add 20.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use TenGigabitEthernet8/0/0
exec set interface state ipip21 up
exec ip route add 20.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use TenGigabitEthernet8/0/0
exec set interface state ipip22 up
exec ip route add 20.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use TenGigabitEthernet8/0/0
exec set interface state ipip23 up
exec ip route add 20.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use TenGigabitEthernet8/0/0
exec set interface state ipip24 up
exec ip route add 20.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use TenGigabitEthernet8/0/0
exec set interface state ipip25 up
exec ip route add 20.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use TenGigabitEthernet8/0/0
exec set interface state ipip26 up
exec ip route add 20.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use TenGigabitEthernet8/0/0
exec set interface state ipip27 up
exec ip route add 20.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use TenGigabitEthernet8/0/0
exec set interface state ipip28 up
exec ip route add 20.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use TenGigabitEthernet8/0/0
exec set interface state ipip29 up
exec ip route add 20.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use TenGigabitEthernet8/0/0
exec set interface state ipip30 up
exec ip route add 20.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use TenGigabitEthernet8/0/0
exec set interface state ipip31 up
exec ip route add 20.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use TenGigabitEthernet8/0/0
exec set interface state ipip32 up
exec ip route add 20.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use TenGigabitEthernet8/0/0
exec set interface state ipip33 up
exec ip route add 20.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use TenGigabitEthernet8/0/0
exec set interface state ipip34 up
exec ip route add 20.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use TenGigabitEthernet8/0/0
exec set interface state ipip35 up
exec ip route add 20.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use TenGigabitEthernet8/0/0
exec set interface state ipip36 up
exec ip route add 20.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use TenGigabitEthernet8/0/0
exec set interface state ipip37 up
exec ip route add 20.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use TenGigabitEthernet8/0/0
exec set interface state ipip38 up
exec ip route add 20.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use TenGigabitEthernet8/0/0
exec set interface state ipip39 up
exec ip route add 20.0.0.39/32 via ipip39
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec set interface ip address TenGigabitEthernet8/0/0 200.0.0.102/24.0
exec create ipip tunnel src 200.0.0.102 dst 100.0.0.1 p2p
exec ipsec sa add 100000 spi 200000 crypto-alg aes-gcm-128 crypto-key 414e657251625643496465654a6d7066 esp
exec ipsec sa add 0 spi 100000 crypto-alg aes-gcm-128 crypto-key 414e657251625643496465654a6d7066 esp
exec ipsec tunnel protect ipip0 sa-out 100000 sa-in 0 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.1.1 p2p
exec ipsec sa add 100001 spi 200001 crypto-alg aes-gcm-128 crypto-key 6344786a414a66586f4d775067634150 esp
exec ipsec sa add 1 spi 100001 crypto-alg aes-gcm-128 crypto-key 6344786a414a66586f4d775067634150 esp
exec ipsec tunnel protect ipip1 sa-out 100001 sa-in 1 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.2.1 p2p
exec ipsec sa add 100002 spi 200002 crypto-alg aes-gcm-128 crypto-key 4c615367716b68614e685666524d656b esp
exec ipsec sa add 2 spi 100002 crypto-alg aes-gcm-128 crypto-key 4c615367716b68614e685666524d656b esp
exec ipsec tunnel protect ipip2 sa-out 100002 sa-in 2 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.3.1 p2p
exec ipsec sa add 100003 spi 200003 crypto-alg aes-gcm-128 crypto-key 6e674972796561736951695772717a54 esp
exec ipsec sa add 3 spi 100003 crypto-alg aes-gcm-128 crypto-key 6e674972796561736951695772717a54 esp
exec ipsec tunnel protect ipip3 sa-out 100003 sa-in 3 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.4.1 p2p
exec ipsec sa add 100004 spi 200004 crypto-alg aes-gcm-128 crypto-key 6d6b51565373537a71624e6e644e474d esp
exec ipsec sa add 4 spi 100004 crypto-alg aes-gcm-128 crypto-key 6d6b51565373537a71624e6e644e474d esp
exec ipsec tunnel protect ipip4 sa-out 100004 sa-in 4 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.5.1 p2p
exec ipsec sa add 100005 spi 200005 crypto-alg aes-gcm-128 crypto-key 574279437575495566535a4e7048774d esp
exec ipsec sa add 5 spi 100005 crypto-alg aes-gcm-128 crypto-key 574279437575495566535a4e7048774d esp
exec ipsec tunnel protect ipip5 sa-out 100005 sa-in 5 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.6.1 p2p
exec ipsec sa add 100006 spi 200006 crypto-alg aes-gcm-128 crypto-key 6c4f52756b44586c4266514949796178 esp
exec ipsec sa add 6 spi 100006 crypto-alg aes-gcm-128 crypto-key 6c4f52756b44586c4266514949796178 esp
exec ipsec tunnel protect ipip6 sa-out 100006 sa-in 6 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.7.1 p2p
exec ipsec sa add 100007 spi 200007 crypto-alg aes-gcm-128 crypto-key 704542706c436f455252416272647956 esp
exec ipsec sa add 7 spi 100007 crypto-alg aes-gcm-128 crypto-key 704542706c436f455252416272647956 esp
exec ipsec tunnel protect ipip7 sa-out 100007 sa-in 7 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.8.1 p2p
exec ipsec sa add 100008 spi 200008 crypto-alg aes-gcm-128 crypto-key 4159774a69546e645868747164545366 esp
exec ipsec sa add 8 spi 100008 crypto-alg aes-gcm-128 crypto-key 4159774a69546e645868747164545366 esp
exec ipsec tunnel protect ipip8 sa-out 100008 sa-in 8 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.9.1 p2p
exec ipsec sa add 100009 spi 200009 crypto-alg aes-gcm-128 crypto-key 43707561657278734c755761694e7a68 esp
exec ipsec sa add 9 spi 100009 crypto-alg aes-gcm-128 crypto-key 43707561657278734c755761694e7a68 esp
exec ipsec tunnel protect ipip9 sa-out 100009 sa-in 9 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.10.1 p2p
exec ipsec sa add 100010 spi 200010 crypto-alg aes-gcm-128 crypto-key 747a42425779506a5878506955576b43 esp
exec ipsec sa add 10 spi 100010 crypto-alg aes-gcm-128 crypto-key 747a42425779506a5878506955576b43 esp
exec ipsec tunnel protect ipip10 sa-out 100010 sa-in 10 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.11.1 p2p
exec ipsec sa add 100011 spi 200011 crypto-alg aes-gcm-128 crypto-key 484e766c4f6176446e43414e61784b57 esp
exec ipsec sa add 11 spi 100011 crypto-alg aes-gcm-128 crypto-key 484e766c4f6176446e43414e61784b57 esp
exec ipsec tunnel protect ipip11 sa-out 100011 sa-in 11 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.12.1 p2p
exec ipsec sa add 100012 spi 200012 crypto-alg aes-gcm-128 crypto-key 484c5754794359797377734f6f576547 esp
exec ipsec sa add 12 spi 100012 crypto-alg aes-gcm-128 crypto-key 484c5754794359797377734f6f576547 esp
exec ipsec tunnel protect ipip12 sa-out 100012 sa-in 12 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.13.1 p2p
exec ipsec sa add 100013 spi 200013 crypto-alg aes-gcm-128 crypto-key 766d496a644a58706a6e484444624156 esp
exec ipsec sa add 13 spi 100013 crypto-alg aes-gcm-128 crypto-key 766d496a644a58706a6e484444624156 esp
exec ipsec tunnel protect ipip13 sa-out 100013 sa-in 13 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.14.1 p2p
exec ipsec sa add 100014 spi 200014 crypto-alg aes-gcm-128 crypto-key 7a684f61444c4e6753584a5a524f7741 esp
exec ipsec sa add 14 spi 100014 crypto-alg aes-gcm-128 crypto-key 7a684f61444c4e6753584a5a524f7741 esp
exec ipsec tunnel protect ipip14 sa-out 100014 sa-in 14 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.15.1 p2p
exec ipsec sa add 100015 spi 200015 crypto-alg aes-gcm-128 crypto-key 6e71527175676e70774a704351577146 esp
exec ipsec sa add 15 spi 100015 crypto-alg aes-gcm-128 crypto-key 6e71527175676e70774a704351577146 esp
exec ipsec tunnel protect ipip15 sa-out 100015 sa-in 15 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.16.1 p2p
exec ipsec sa add 100016 spi 200016 crypto-alg aes-gcm-128 crypto-key 65786b6d686869446b69656d6f506350 esp
exec ipsec sa add 16 spi 100016 crypto-alg aes-gcm-128 crypto-key 65786b6d686869446b69656d6f506350 esp
exec ipsec tunnel protect ipip16 sa-out 100016 sa-in 16 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.17.1 p2p
exec ipsec sa add 100017 spi 200017 crypto-alg aes-gcm-128 crypto-key 57716953417241664f7944506f72436a esp
exec ipsec sa add 17 spi 100017 crypto-alg aes-gcm-128 crypto-key 57716953417241664f7944506f72436a esp
exec ipsec tunnel protect ipip17 sa-out 100017 sa-in 17 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.18.1 p2p
exec ipsec sa add 100018 spi 200018 crypto-alg aes-gcm-128 crypto-key 4b4a75596a62546b75736371746e5142 esp
exec ipsec sa add 18 spi 100018 crypto-alg aes-gcm-128 crypto-key 4b4a75596a62546b75736371746e5142 esp
exec ipsec tunnel protect ipip18 sa-out 100018 sa-in 18 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.19.1 p2p
exec ipsec sa add 100019 spi 200019 crypto-alg aes-gcm-128 crypto-key 6b4f6d54666c747a737945655a43704b esp
exec ipsec sa add 19 spi 100019 crypto-alg aes-gcm-128 crypto-key 6b4f6d54666c747a737945655a43704b esp
exec ipsec tunnel protect ipip19 sa-out 100019 sa-in 19 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.20.1 p2p
exec ipsec sa add 100020 spi 200020 crypto-alg aes-gcm-128 crypto-key 6a487357774c525549674e4848594977 esp
exec ipsec sa add 20 spi 100020 crypto-alg aes-gcm-128 crypto-key 6a487357774c525549674e4848594977 esp
exec ipsec tunnel protect ipip20 sa-out 100020 sa-in 20 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.21.1 p2p
exec ipsec sa add 100021 spi 200021 crypto-alg aes-gcm-128 crypto-key 766a644d47616d736b6c637941617176 esp
exec ipsec sa add 21 spi 100021 crypto-alg aes-gcm-128 crypto-key 766a644d47616d736b6c637941617176 esp
exec ipsec tunnel protect ipip21 sa-out 100021 sa-in 21 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.22.1 p2p
exec ipsec sa add 100022 spi 200022 crypto-alg aes-gcm-128 crypto-key 46575357436c4879654c746f4f6b7766 esp
exec ipsec sa add 22 spi 100022 crypto-alg aes-gcm-128 crypto-key 46575357436c4879654c746f4f6b7766 esp
exec ipsec tunnel protect ipip22 sa-out 100022 sa-in 22 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.23.1 p2p
exec ipsec sa add 100023 spi 200023 crypto-alg aes-gcm-128 crypto-key 4e6f717a52436a73594f515a474d6b64 esp
exec ipsec sa add 23 spi 100023 crypto-alg aes-gcm-128 crypto-key 4e6f717a52436a73594f515a474d6b64 esp
exec ipsec tunnel protect ipip23 sa-out 100023 sa-in 23 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.24.1 p2p
exec ipsec sa add 100024 spi 200024 crypto-alg aes-gcm-128 crypto-key 4667637252755a6c637658734e534877 esp
exec ipsec sa add 24 spi 100024 crypto-alg aes-gcm-128 crypto-key 4667637252755a6c637658734e534877 esp
exec ipsec tunnel protect ipip24 sa-out 100024 sa-in 24 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.25.1 p2p
exec ipsec sa add 100025 spi 200025 crypto-alg aes-gcm-128 crypto-key 5776715a775a4a644755446a74444e4d esp
exec ipsec sa add 25 spi 100025 crypto-alg aes-gcm-128 crypto-key 5776715a775a4a644755446a74444e4d esp
exec ipsec tunnel protect ipip25 sa-out 100025 sa-in 25 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.26.1 p2p
exec ipsec sa add 100026 spi 200026 crypto-alg aes-gcm-128 crypto-key 6565476a4255484a4d54547751656c71 esp
exec ipsec sa add 26 spi 100026 crypto-alg aes-gcm-128 crypto-key 6565476a4255484a4d54547751656c71 esp
exec ipsec tunnel protect ipip26 sa-out 100026 sa-in 26 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.27.1 p2p
exec ipsec sa add 100027 spi 200027 crypto-alg aes-gcm-128 crypto-key 7153666b6d654f4862574e6c6e614d6d esp
exec ipsec sa add 27 spi 100027 crypto-alg aes-gcm-128 crypto-key 7153666b6d654f4862574e6c6e614d6d esp
exec ipsec tunnel protect ipip27 sa-out 100027 sa-in 27 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.28.1 p2p
exec ipsec sa add 100028 spi 200028 crypto-alg aes-gcm-128 crypto-key 657378574e6a7a5769675876546d486c esp
exec ipsec sa add 28 spi 100028 crypto-alg aes-gcm-128 crypto-key 657378574e6a7a5769675876546d486c esp
exec ipsec tunnel protect ipip28 sa-out 100028 sa-in 28 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.29.1 p2p
exec ipsec sa add 100029 spi 200029 crypto-alg aes-gcm-128 crypto-key 4d63586d716d74546c795a666b436564 esp
exec ipsec sa add 29 spi 100029 crypto-alg aes-gcm-128 crypto-key 4d63586d716d74546c795a666b436564 esp
exec ipsec tunnel protect ipip29 sa-out 100029 sa-in 29 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.30.1 p2p
exec ipsec sa add 100030 spi 200030 crypto-alg aes-gcm-128 crypto-key 467a5a72514f616a73434d4278504950 esp
exec ipsec sa add 30 spi 100030 crypto-alg aes-gcm-128 crypto-key 467a5a72514f616a73434d4278504950 esp
exec ipsec tunnel protect ipip30 sa-out 100030 sa-in 30 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.31.1 p2p
exec ipsec sa add 100031 spi 200031 crypto-alg aes-gcm-128 crypto-key 637a4a6857415543666c44756376504b esp
exec ipsec sa add 31 spi 100031 crypto-alg aes-gcm-128 crypto-key 637a4a6857415543666c44756376504b esp
exec ipsec tunnel protect ipip31 sa-out 100031 sa-in 31 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.32.1 p2p
exec ipsec sa add 100032 spi 200032 crypto-alg aes-gcm-128 crypto-key 51684f6e5049434a4c64704b54597668 esp
exec ipsec sa add 32 spi 100032 crypto-alg aes-gcm-128 crypto-key 51684f6e5049434a4c64704b54597668 esp
exec ipsec tunnel protect ipip32 sa-out 100032 sa-in 32 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.33.1 p2p
exec ipsec sa add 100033 spi 200033 crypto-alg aes-gcm-128 crypto-key 486c467562476c66666b4a644d4f6b69 esp
exec ipsec sa add 33 spi 100033 crypto-alg aes-gcm-128 crypto-key 486c467562476c66666b4a644d4f6b69 esp
exec ipsec tunnel protect ipip33 sa-out 100033 sa-in 33 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.34.1 p2p
exec ipsec sa add 100034 spi 200034 crypto-alg aes-gcm-128 crypto-key 4d6a48566b49414773496e6569486e77 esp
exec ipsec sa add 34 spi 100034 crypto-alg aes-gcm-128 crypto-key 4d6a48566b49414773496e6569486e77 esp
exec ipsec tunnel protect ipip34 sa-out 100034 sa-in 34 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.35.1 p2p
exec ipsec sa add 100035 spi 200035 crypto-alg aes-gcm-128 crypto-key 416441596c6c655a586a596f7869694f esp
exec ipsec sa add 35 spi 100035 crypto-alg aes-gcm-128 crypto-key 416441596c6c655a586a596f7869694f esp
exec ipsec tunnel protect ipip35 sa-out 100035 sa-in 35 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.36.1 p2p
exec ipsec sa add 100036 spi 200036 crypto-alg aes-gcm-128 crypto-key 4f52415258674256426370625446654c esp
exec ipsec sa add 36 spi 100036 crypto-alg aes-gcm-128 crypto-key 4f52415258674256426370625446654c esp
exec ipsec tunnel protect ipip36 sa-out 100036 sa-in 36 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.37.1 p2p
exec ipsec sa add 100037 spi 200037 crypto-alg aes-gcm-128 crypto-key 4868565a4e727570454d4d655a655747 esp
exec ipsec sa add 37 spi 100037 crypto-alg aes-gcm-128 crypto-key 4868565a4e727570454d4d655a655747 esp
exec ipsec tunnel protect ipip37 sa-out 100037 sa-in 37 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.38.1 p2p
exec ipsec sa add 100038 spi 200038 crypto-alg aes-gcm-128 crypto-key 485a49566b52596d6a4f66525063626f esp
exec ipsec sa add 38 spi 100038 crypto-alg aes-gcm-128 crypto-key 485a49566b52596d6a4f66525063626f esp
exec ipsec tunnel protect ipip38 sa-out 100038 sa-in 38 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.39.1 p2p
exec ipsec sa add 100039 spi 200039 crypto-alg aes-gcm-128 crypto-key 6850425374756a4577444953546c4a48 esp
exec ipsec sa add 39 spi 100039 crypto-alg aes-gcm-128 crypto-key 6850425374756a4577444953546c4a48 esp
exec ipsec tunnel protect ipip39 sa-out 100039 sa-in 39 add
exec ip route add 100.0.0.1/8 via 200.0.0.101 TenGigabitEthernet8/0/0
exec set interface unnumbered ipip0 use TenGigabitEthernet8/0/0
exec set interface state ipip0 up
exec ip route add 10.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use TenGigabitEthernet8/0/0
exec set interface state ipip1 up
exec ip route add 10.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use TenGigabitEthernet8/0/0
exec set interface state ipip2 up
exec ip route add 10.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use TenGigabitEthernet8/0/0
exec set interface state ipip3 up
exec ip route add 10.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use TenGigabitEthernet8/0/0
exec set interface state ipip4 up
exec ip route add 10.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use TenGigabitEthernet8/0/0
exec set interface state ipip5 up
exec ip route add 10.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use TenGigabitEthernet8/0/0
exec set interface state ipip6 up
exec ip route add 10.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use TenGigabitEthernet8/0/0
exec set interface state ipip7 up
exec ip route add 10.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use TenGigabitEthernet8/0/0
exec set interface state ipip8 up
exec ip route add 10.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use TenGigabitEthernet8/0/0
exec set interface state ipip9 up
exec ip route add 10.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use TenGigabitEthernet8/0/0
exec set interface state ipip10 up
exec ip route add 10.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use TenGigabitEthernet8/0/0
exec set interface state ipip11 up
exec ip route add 10.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use TenGigabitEthernet8/0/0
exec set interface state ipip12 up
exec ip route add 10.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use TenGigabitEthernet8/0/0
exec set interface state ipip13 up
exec ip route add 10.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use TenGigabitEthernet8/0/0
exec set interface state ipip14 up
exec ip route add 10.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use TenGigabitEthernet8/0/0
exec set interface state ipip15 up
exec ip route add 10.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use TenGigabitEthernet8/0/0
exec set interface state ipip16 up
exec ip route add 10.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use TenGigabitEthernet8/0/0
exec set interface state ipip17 up
exec ip route add 10.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use TenGigabitEthernet8/0/0
exec set interface state ipip18 up
exec ip route add 10.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use TenGigabitEthernet8/0/0
exec set interface state ipip19 up
exec ip route add 10.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use TenGigabitEthernet8/0/0
exec set interface state ipip20 up
exec ip route add 10.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use TenGigabitEthernet8/0/0
exec set interface state ipip21 up
exec ip route add 10.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use TenGigabitEthernet8/0/0
exec set interface state ipip22 up
exec ip route add 10.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use TenGigabitEthernet8/0/0
exec set interface state ipip23 up
exec ip route add 10.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use TenGigabitEthernet8/0/0
exec set interface state ipip24 up
exec ip route add 10.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use TenGigabitEthernet8/0/0
exec set interface state ipip25 up
exec ip route add 10.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use TenGigabitEthernet8/0/0
exec set interface state ipip26 up
exec ip route add 10.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use TenGigabitEthernet8/0/0
exec set interface state ipip27 up
exec ip route add 10.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use TenGigabitEthernet8/0/0
exec set interface state ipip28 up
exec ip route add 10.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use TenGigabitEthernet8/0/0
exec set interface state ipip29 up
exec ip route add 10.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use TenGigabitEthernet8/0/0
exec set interface state ipip30 up
exec ip route add 10.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use TenGigabitEthernet8/0/0
exec set interface state ipip31 up
exec ip route add 10.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use TenGigabitEthernet8/0/0
exec set interface state ipip32 up
exec ip route add 10.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use TenGigabitEthernet8/0/0
exec set interface state ipip33 up
exec ip route add 10.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use TenGigabitEthernet8/0/0
exec set interface state ipip34 up
exec ip route add 10.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use TenGigabitEthernet8/0/0
exec set interface state ipip35 up
exec ip route add 10.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use TenGigabitEthernet8/0/0
exec set interface state ipip36 up
exec ip route add 10.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use TenGigabitEthernet8/0/0
exec set interface state ipip37 up
exec ip route add 10.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use TenGigabitEthernet8/0/0
exec set interface state ipip38 up
exec ip route add 10.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use TenGigabitEthernet8/0/0
exec set interface state ipip39 up
exec ip route add 10.0.0.39/32 via ipip39

 imix-1t1c-ethip4ipsec40tnlsw- 
ip4base-int-aes128gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec create loopback interface
exec set interface state loop0 up
exec set interface ip address TenGigabitEthernet8/0/0 200.0.0.101/24
exec set ip neighbor TenGigabitEthernet8/0/0 200.0.0.102 ac:1f:6b:57:57:fe static
exec set interface ip address loop0 100.0.0.1/32
exec create ipip tunnel src 100.0.0.1 dst 200.0.0.102 p2p
exec ipsec sa add 0 spi 100000 crypto-alg aes-gcm-128 crypto-key 72646248616b497a505472674a477461 esp
exec ipsec sa add 100000 spi 200000 crypto-alg aes-gcm-128 crypto-key 72646248616b497a505472674a477461 esp
exec ipsec tunnel protect ipip0 sa-out 0 sa-in 100000 add
exec set interface ip address loop0 100.0.1.1/32
exec create ipip tunnel src 100.0.1.1 dst 200.0.0.102 p2p
exec ipsec sa add 1 spi 100001 crypto-alg aes-gcm-128 crypto-key 444a6b567044646a6e4162536f78566c esp
exec ipsec sa add 100001 spi 200001 crypto-alg aes-gcm-128 crypto-key 444a6b567044646a6e4162536f78566c esp
exec ipsec tunnel protect ipip1 sa-out 1 sa-in 100001 add
exec set interface ip address loop0 100.0.2.1/32
exec create ipip tunnel src 100.0.2.1 dst 200.0.0.102 p2p
exec ipsec sa add 2 spi 100002 crypto-alg aes-gcm-128 crypto-key 647662676c71724664595242434b4952 esp
exec ipsec sa add 100002 spi 200002 crypto-alg aes-gcm-128 crypto-key 647662676c71724664595242434b4952 esp
exec ipsec tunnel protect ipip2 sa-out 2 sa-in 100002 add
exec set interface ip address loop0 100.0.3.1/32
exec create ipip tunnel src 100.0.3.1 dst 200.0.0.102 p2p
exec ipsec sa add 3 spi 100003 crypto-alg aes-gcm-128 crypto-key 6d4d4a7449636842616b67785474776c esp
exec ipsec sa add 100003 spi 200003 crypto-alg aes-gcm-128 crypto-key 6d4d4a7449636842616b67785474776c esp
exec ipsec tunnel protect ipip3 sa-out 3 sa-in 100003 add
exec set interface ip address loop0 100.0.4.1/32
exec create ipip tunnel src 100.0.4.1 dst 200.0.0.102 p2p
exec ipsec sa add 4 spi 100004 crypto-alg aes-gcm-128 crypto-key 56487243666857576c64576c6f586f76 esp
exec ipsec sa add 100004 spi 200004 crypto-alg aes-gcm-128 crypto-key 56487243666857576c64576c6f586f76 esp
exec ipsec tunnel protect ipip4 sa-out 4 sa-in 100004 add
exec set interface ip address loop0 100.0.5.1/32
exec create ipip tunnel src 100.0.5.1 dst 200.0.0.102 p2p
exec ipsec sa add 5 spi 100005 crypto-alg aes-gcm-128 crypto-key 566b51746f5468687a45555150554a79 esp
exec ipsec sa add 100005 spi 200005 crypto-alg aes-gcm-128 crypto-key 566b51746f5468687a45555150554a79 esp
exec ipsec tunnel protect ipip5 sa-out 5 sa-in 100005 add
exec set interface ip address loop0 100.0.6.1/32
exec create ipip tunnel src 100.0.6.1 dst 200.0.0.102 p2p
exec ipsec sa add 6 spi 100006 crypto-alg aes-gcm-128 crypto-key 6c6f49564561706c6c6a7a41546e4b41 esp
exec ipsec sa add 100006 spi 200006 crypto-alg aes-gcm-128 crypto-key 6c6f49564561706c6c6a7a41546e4b41 esp
exec ipsec tunnel protect ipip6 sa-out 6 sa-in 100006 add
exec set interface ip address loop0 100.0.7.1/32
exec create ipip tunnel src 100.0.7.1 dst 200.0.0.102 p2p
exec ipsec sa add 7 spi 100007 crypto-alg aes-gcm-128 crypto-key 794963637154476a4848467569734f61 esp
exec ipsec sa add 100007 spi 200007 crypto-alg aes-gcm-128 crypto-key 794963637154476a4848467569734f61 esp
exec ipsec tunnel protect ipip7 sa-out 7 sa-in 100007 add
exec set interface ip address loop0 100.0.8.1/32
exec create ipip tunnel src 100.0.8.1 dst 200.0.0.102 p2p
exec ipsec sa add 8 spi 100008 crypto-alg aes-gcm-128 crypto-key 726a584f4255494d444e5062706a4d74 esp
exec ipsec sa add 100008 spi 200008 crypto-alg aes-gcm-128 crypto-key 726a584f4255494d444e5062706a4d74 esp
exec ipsec tunnel protect ipip8 sa-out 8 sa-in 100008 add
exec set interface ip address loop0 100.0.9.1/32
exec create ipip tunnel src 100.0.9.1 dst 200.0.0.102 p2p
exec ipsec sa add 9 spi 100009 crypto-alg aes-gcm-128 crypto-key 716279536b6f6e4c666a794252615347 esp
exec ipsec sa add 100009 spi 200009 crypto-alg aes-gcm-128 crypto-key 716279536b6f6e4c666a794252615347 esp
exec ipsec tunnel protect ipip9 sa-out 9 sa-in 100009 add
exec set interface ip address loop0 100.0.10.1/32
exec create ipip tunnel src 100.0.10.1 dst 200.0.0.102 p2p
exec ipsec sa add 10 spi 100010 crypto-alg aes-gcm-128 crypto-key 526749676c4862785851486b42484941 esp
exec ipsec sa add 100010 spi 200010 crypto-alg aes-gcm-128 crypto-key 526749676c4862785851486b42484941 esp
exec ipsec tunnel protect ipip10 sa-out 10 sa-in 100010 add
exec set interface ip address loop0 100.0.11.1/32
exec create ipip tunnel src 100.0.11.1 dst 200.0.0.102 p2p
exec ipsec sa add 11 spi 100011 crypto-alg aes-gcm-128 crypto-key 6f42675a657778555a7167477747516b esp
exec ipsec sa add 100011 spi 200011 crypto-alg aes-gcm-128 crypto-key 6f42675a657778555a7167477747516b esp
exec ipsec tunnel protect ipip11 sa-out 11 sa-in 100011 add
exec set interface ip address loop0 100.0.12.1/32
exec create ipip tunnel src 100.0.12.1 dst 200.0.0.102 p2p
exec ipsec sa add 12 spi 100012 crypto-alg aes-gcm-128 crypto-key 484f66634c72524a51646256714a444c esp
exec ipsec sa add 100012 spi 200012 crypto-alg aes-gcm-128 crypto-key 484f66634c72524a51646256714a444c esp
exec ipsec tunnel protect ipip12 sa-out 12 sa-in 100012 add
exec set interface ip address loop0 100.0.13.1/32
exec create ipip tunnel src 100.0.13.1 dst 200.0.0.102 p2p
exec ipsec sa add 13 spi 100013 crypto-alg aes-gcm-128 crypto-key 6b6a6251497a7962694b56597a6b4772 esp
exec ipsec sa add 100013 spi 200013 crypto-alg aes-gcm-128 crypto-key 6b6a6251497a7962694b56597a6b4772 esp
exec ipsec tunnel protect ipip13 sa-out 13 sa-in 100013 add
exec set interface ip address loop0 100.0.14.1/32
exec create ipip tunnel src 100.0.14.1 dst 200.0.0.102 p2p
exec ipsec sa add 14 spi 100014 crypto-alg aes-gcm-128 crypto-key 59597759754154734e4246646a624444 esp
exec ipsec sa add 100014 spi 200014 crypto-alg aes-gcm-128 crypto-key 59597759754154734e4246646a624444 esp
exec ipsec tunnel protect ipip14 sa-out 14 sa-in 100014 add
exec set interface ip address loop0 100.0.15.1/32
exec create ipip tunnel src 100.0.15.1 dst 200.0.0.102 p2p
exec ipsec sa add 15 spi 100015 crypto-alg aes-gcm-128 crypto-key 696379544b644e4f6674454659745852 esp
exec ipsec sa add 100015 spi 200015 crypto-alg aes-gcm-128 crypto-key 696379544b644e4f6674454659745852 esp
exec ipsec tunnel protect ipip15 sa-out 15 sa-in 100015 add
exec set interface ip address loop0 100.0.16.1/32
exec create ipip tunnel src 100.0.16.1 dst 200.0.0.102 p2p
exec ipsec sa add 16 spi 100016 crypto-alg aes-gcm-128 crypto-key 54425241414f625a6f4c68636147644e esp
exec ipsec sa add 100016 spi 200016 crypto-alg aes-gcm-128 crypto-key 54425241414f625a6f4c68636147644e esp
exec ipsec tunnel protect ipip16 sa-out 16 sa-in 100016 add
exec set interface ip address loop0 100.0.17.1/32
exec create ipip tunnel src 100.0.17.1 dst 200.0.0.102 p2p
exec ipsec sa add 17 spi 100017 crypto-alg aes-gcm-128 crypto-key 594b6667544c4a556b4274454c707279 esp
exec ipsec sa add 100017 spi 200017 crypto-alg aes-gcm-128 crypto-key 594b6667544c4a556b4274454c707279 esp
exec ipsec tunnel protect ipip17 sa-out 17 sa-in 100017 add
exec set interface ip address loop0 100.0.18.1/32
exec create ipip tunnel src 100.0.18.1 dst 200.0.0.102 p2p
exec ipsec sa add 18 spi 100018 crypto-alg aes-gcm-128 crypto-key 4a616e764244426b7a787a716a75686a esp
exec ipsec sa add 100018 spi 200018 crypto-alg aes-gcm-128 crypto-key 4a616e764244426b7a787a716a75686a esp
exec ipsec tunnel protect ipip18 sa-out 18 sa-in 100018 add
exec set interface ip address loop0 100.0.19.1/32
exec create ipip tunnel src 100.0.19.1 dst 200.0.0.102 p2p
exec ipsec sa add 19 spi 100019 crypto-alg aes-gcm-128 crypto-key 644e654676436550447a4675674d4e6e esp
exec ipsec sa add 100019 spi 200019 crypto-alg aes-gcm-128 crypto-key 644e654676436550447a4675674d4e6e esp
exec ipsec tunnel protect ipip19 sa-out 19 sa-in 100019 add
exec set interface ip address loop0 100.0.20.1/32
exec create ipip tunnel src 100.0.20.1 dst 200.0.0.102 p2p
exec ipsec sa add 20 spi 100020 crypto-alg aes-gcm-128 crypto-key 4b684e415a6b6f757562736e76716b46 esp
exec ipsec sa add 100020 spi 200020 crypto-alg aes-gcm-128 crypto-key 4b684e415a6b6f757562736e76716b46 esp
exec ipsec tunnel protect ipip20 sa-out 20 sa-in 100020 add
exec set interface ip address loop0 100.0.21.1/32
exec create ipip tunnel src 100.0.21.1 dst 200.0.0.102 p2p
exec ipsec sa add 21 spi 100021 crypto-alg aes-gcm-128 crypto-key 63796b484a6864486646785767725153 esp
exec ipsec sa add 100021 spi 200021 crypto-alg aes-gcm-128 crypto-key 63796b484a6864486646785767725153 esp
exec ipsec tunnel protect ipip21 sa-out 21 sa-in 100021 add
exec set interface ip address loop0 100.0.22.1/32
exec create ipip tunnel src 100.0.22.1 dst 200.0.0.102 p2p
exec ipsec sa add 22 spi 100022 crypto-alg aes-gcm-128 crypto-key 5367524e6a466162576e564c6845496d esp
exec ipsec sa add 100022 spi 200022 crypto-alg aes-gcm-128 crypto-key 5367524e6a466162576e564c6845496d esp
exec ipsec tunnel protect ipip22 sa-out 22 sa-in 100022 add
exec set interface ip address loop0 100.0.23.1/32
exec create ipip tunnel src 100.0.23.1 dst 200.0.0.102 p2p
exec ipsec sa add 23 spi 100023 crypto-alg aes-gcm-128 crypto-key 6e4f6c644c6d616764545873524c5550 esp
exec ipsec sa add 100023 spi 200023 crypto-alg aes-gcm-128 crypto-key 6e4f6c644c6d616764545873524c5550 esp
exec ipsec tunnel protect ipip23 sa-out 23 sa-in 100023 add
exec set interface ip address loop0 100.0.24.1/32
exec create ipip tunnel src 100.0.24.1 dst 200.0.0.102 p2p
exec ipsec sa add 24 spi 100024 crypto-alg aes-gcm-128 crypto-key 42664866766a494d6757726a4a454547 esp
exec ipsec sa add 100024 spi 200024 crypto-alg aes-gcm-128 crypto-key 42664866766a494d6757726a4a454547 esp
exec ipsec tunnel protect ipip24 sa-out 24 sa-in 100024 add
exec set interface ip address loop0 100.0.25.1/32
exec create ipip tunnel src 100.0.25.1 dst 200.0.0.102 p2p
exec ipsec sa add 25 spi 100025 crypto-alg aes-gcm-128 crypto-key 6c53546a6a666f4a4c6b4566615a5652 esp
exec ipsec sa add 100025 spi 200025 crypto-alg aes-gcm-128 crypto-key 6c53546a6a666f4a4c6b4566615a5652 esp
exec ipsec tunnel protect ipip25 sa-out 25 sa-in 100025 add
exec set interface ip address loop0 100.0.26.1/32
exec create ipip tunnel src 100.0.26.1 dst 200.0.0.102 p2p
exec ipsec sa add 26 spi 100026 crypto-alg aes-gcm-128 crypto-key 68797943696950757a6371444e687244 esp
exec ipsec sa add 100026 spi 200026 crypto-alg aes-gcm-128 crypto-key 68797943696950757a6371444e687244 esp
exec ipsec tunnel protect ipip26 sa-out 26 sa-in 100026 add
exec set interface ip address loop0 100.0.27.1/32
exec create ipip tunnel src 100.0.27.1 dst 200.0.0.102 p2p
exec ipsec sa add 27 spi 100027 crypto-alg aes-gcm-128 crypto-key 484b4b705057454367626c55454c7968 esp
exec ipsec sa add 100027 spi 200027 crypto-alg aes-gcm-128 crypto-key 484b4b705057454367626c55454c7968 esp
exec ipsec tunnel protect ipip27 sa-out 27 sa-in 100027 add
exec set interface ip address loop0 100.0.28.1/32
exec create ipip tunnel src 100.0.28.1 dst 200.0.0.102 p2p
exec ipsec sa add 28 spi 100028 crypto-alg aes-gcm-128 crypto-key 6979694346715576536a46526170536d esp
exec ipsec sa add 100028 spi 200028 crypto-alg aes-gcm-128 crypto-key 6979694346715576536a46526170536d esp
exec ipsec tunnel protect ipip28 sa-out 28 sa-in 100028 add
exec set interface ip address loop0 100.0.29.1/32
exec create ipip tunnel src 100.0.29.1 dst 200.0.0.102 p2p
exec ipsec sa add 29 spi 100029 crypto-alg aes-gcm-128 crypto-key 7054557552515a6d75517a5179487a72 esp
exec ipsec sa add 100029 spi 200029 crypto-alg aes-gcm-128 crypto-key 7054557552515a6d75517a5179487a72 esp
exec ipsec tunnel protect ipip29 sa-out 29 sa-in 100029 add
exec set interface ip address loop0 100.0.30.1/32
exec create ipip tunnel src 100.0.30.1 dst 200.0.0.102 p2p
exec ipsec sa add 30 spi 100030 crypto-alg aes-gcm-128 crypto-key 6f556b49517577634e534769636e734e esp
exec ipsec sa add 100030 spi 200030 crypto-alg aes-gcm-128 crypto-key 6f556b49517577634e534769636e734e esp
exec ipsec tunnel protect ipip30 sa-out 30 sa-in 100030 add
exec set interface ip address loop0 100.0.31.1/32
exec create ipip tunnel src 100.0.31.1 dst 200.0.0.102 p2p
exec ipsec sa add 31 spi 100031 crypto-alg aes-gcm-128 crypto-key 746d5a4c5056474b6e727442545a4264 esp
exec ipsec sa add 100031 spi 200031 crypto-alg aes-gcm-128 crypto-key 746d5a4c5056474b6e727442545a4264 esp
exec ipsec tunnel protect ipip31 sa-out 31 sa-in 100031 add
exec set interface ip address loop0 100.0.32.1/32
exec create ipip tunnel src 100.0.32.1 dst 200.0.0.102 p2p
exec ipsec sa add 32 spi 100032 crypto-alg aes-gcm-128 crypto-key 70756a565a705a6e55574d7a734a5845 esp
exec ipsec sa add 100032 spi 200032 crypto-alg aes-gcm-128 crypto-key 70756a565a705a6e55574d7a734a5845 esp
exec ipsec tunnel protect ipip32 sa-out 32 sa-in 100032 add
exec set interface ip address loop0 100.0.33.1/32
exec create ipip tunnel src 100.0.33.1 dst 200.0.0.102 p2p
exec ipsec sa add 33 spi 100033 crypto-alg aes-gcm-128 crypto-key 5a6b70726d6552724967666b51724157 esp
exec ipsec sa add 100033 spi 200033 crypto-alg aes-gcm-128 crypto-key 5a6b70726d6552724967666b51724157 esp
exec ipsec tunnel protect ipip33 sa-out 33 sa-in 100033 add
exec set interface ip address loop0 100.0.34.1/32
exec create ipip tunnel src 100.0.34.1 dst 200.0.0.102 p2p
exec ipsec sa add 34 spi 100034 crypto-alg aes-gcm-128 crypto-key 5a744f6e51416e456578476a705a504b esp
exec ipsec sa add 100034 spi 200034 crypto-alg aes-gcm-128 crypto-key 5a744f6e51416e456578476a705a504b esp
exec ipsec tunnel protect ipip34 sa-out 34 sa-in 100034 add
exec set interface ip address loop0 100.0.35.1/32
exec create ipip tunnel src 100.0.35.1 dst 200.0.0.102 p2p
exec ipsec sa add 35 spi 100035 crypto-alg aes-gcm-128 crypto-key 56596556504e75736f73736e70535a52 esp
exec ipsec sa add 100035 spi 200035 crypto-alg aes-gcm-128 crypto-key 56596556504e75736f73736e70535a52 esp
exec ipsec tunnel protect ipip35 sa-out 35 sa-in 100035 add
exec set interface ip address loop0 100.0.36.1/32
exec create ipip tunnel src 100.0.36.1 dst 200.0.0.102 p2p
exec ipsec sa add 36 spi 100036 crypto-alg aes-gcm-128 crypto-key 4443624e5a4773456366566e79466364 esp
exec ipsec sa add 100036 spi 200036 crypto-alg aes-gcm-128 crypto-key 4443624e5a4773456366566e79466364 esp
exec ipsec tunnel protect ipip36 sa-out 36 sa-in 100036 add
exec set interface ip address loop0 100.0.37.1/32
exec create ipip tunnel src 100.0.37.1 dst 200.0.0.102 p2p
exec ipsec sa add 37 spi 100037 crypto-alg aes-gcm-128 crypto-key 516641506d744761524d4c59464e6f45 esp
exec ipsec sa add 100037 spi 200037 crypto-alg aes-gcm-128 crypto-key 516641506d744761524d4c59464e6f45 esp
exec ipsec tunnel protect ipip37 sa-out 37 sa-in 100037 add
exec set interface ip address loop0 100.0.38.1/32
exec create ipip tunnel src 100.0.38.1 dst 200.0.0.102 p2p
exec ipsec sa add 38 spi 100038 crypto-alg aes-gcm-128 crypto-key 5a656578666950494664534f51597250 esp
exec ipsec sa add 100038 spi 200038 crypto-alg aes-gcm-128 crypto-key 5a656578666950494664534f51597250 esp
exec ipsec tunnel protect ipip38 sa-out 38 sa-in 100038 add
exec set interface ip address loop0 100.0.39.1/32
exec create ipip tunnel src 100.0.39.1 dst 200.0.0.102 p2p
exec ipsec sa add 39 spi 100039 crypto-alg aes-gcm-128 crypto-key 505a5741534b7858497a4c4b784b7945 esp
exec ipsec sa add 100039 spi 200039 crypto-alg aes-gcm-128 crypto-key 505a5741534b7858497a4c4b784b7945 esp
exec ipsec tunnel protect ipip39 sa-out 39 sa-in 100039 add
exec set interface unnumbered ipip0 use TenGigabitEthernet8/0/0
exec set interface state ipip0 up
exec ip route add 20.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use TenGigabitEthernet8/0/0
exec set interface state ipip1 up
exec ip route add 20.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use TenGigabitEthernet8/0/0
exec set interface state ipip2 up
exec ip route add 20.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use TenGigabitEthernet8/0/0
exec set interface state ipip3 up
exec ip route add 20.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use TenGigabitEthernet8/0/0
exec set interface state ipip4 up
exec ip route add 20.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use TenGigabitEthernet8/0/0
exec set interface state ipip5 up
exec ip route add 20.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use TenGigabitEthernet8/0/0
exec set interface state ipip6 up
exec ip route add 20.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use TenGigabitEthernet8/0/0
exec set interface state ipip7 up
exec ip route add 20.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use TenGigabitEthernet8/0/0
exec set interface state ipip8 up
exec ip route add 20.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use TenGigabitEthernet8/0/0
exec set interface state ipip9 up
exec ip route add 20.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use TenGigabitEthernet8/0/0
exec set interface state ipip10 up
exec ip route add 20.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use TenGigabitEthernet8/0/0
exec set interface state ipip11 up
exec ip route add 20.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use TenGigabitEthernet8/0/0
exec set interface state ipip12 up
exec ip route add 20.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use TenGigabitEthernet8/0/0
exec set interface state ipip13 up
exec ip route add 20.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use TenGigabitEthernet8/0/0
exec set interface state ipip14 up
exec ip route add 20.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use TenGigabitEthernet8/0/0
exec set interface state ipip15 up
exec ip route add 20.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use TenGigabitEthernet8/0/0
exec set interface state ipip16 up
exec ip route add 20.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use TenGigabitEthernet8/0/0
exec set interface state ipip17 up
exec ip route add 20.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use TenGigabitEthernet8/0/0
exec set interface state ipip18 up
exec ip route add 20.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use TenGigabitEthernet8/0/0
exec set interface state ipip19 up
exec ip route add 20.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use TenGigabitEthernet8/0/0
exec set interface state ipip20 up
exec ip route add 20.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use TenGigabitEthernet8/0/0
exec set interface state ipip21 up
exec ip route add 20.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use TenGigabitEthernet8/0/0
exec set interface state ipip22 up
exec ip route add 20.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use TenGigabitEthernet8/0/0
exec set interface state ipip23 up
exec ip route add 20.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use TenGigabitEthernet8/0/0
exec set interface state ipip24 up
exec ip route add 20.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use TenGigabitEthernet8/0/0
exec set interface state ipip25 up
exec ip route add 20.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use TenGigabitEthernet8/0/0
exec set interface state ipip26 up
exec ip route add 20.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use TenGigabitEthernet8/0/0
exec set interface state ipip27 up
exec ip route add 20.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use TenGigabitEthernet8/0/0
exec set interface state ipip28 up
exec ip route add 20.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use TenGigabitEthernet8/0/0
exec set interface state ipip29 up
exec ip route add 20.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use TenGigabitEthernet8/0/0
exec set interface state ipip30 up
exec ip route add 20.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use TenGigabitEthernet8/0/0
exec set interface state ipip31 up
exec ip route add 20.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use TenGigabitEthernet8/0/0
exec set interface state ipip32 up
exec ip route add 20.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use TenGigabitEthernet8/0/0
exec set interface state ipip33 up
exec ip route add 20.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use TenGigabitEthernet8/0/0
exec set interface state ipip34 up
exec ip route add 20.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use TenGigabitEthernet8/0/0
exec set interface state ipip35 up
exec ip route add 20.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use TenGigabitEthernet8/0/0
exec set interface state ipip36 up
exec ip route add 20.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use TenGigabitEthernet8/0/0
exec set interface state ipip37 up
exec ip route add 20.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use TenGigabitEthernet8/0/0
exec set interface state ipip38 up
exec ip route add 20.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use TenGigabitEthernet8/0/0
exec set interface state ipip39 up
exec ip route add 20.0.0.39/32 via ipip39
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec set interface ip address TenGigabitEthernet8/0/0 200.0.0.102/24.0
exec create ipip tunnel src 200.0.0.102 dst 100.0.0.1 p2p
exec ipsec sa add 100000 spi 200000 crypto-alg aes-gcm-128 crypto-key 72646248616b497a505472674a477461 esp
exec ipsec sa add 0 spi 100000 crypto-alg aes-gcm-128 crypto-key 72646248616b497a505472674a477461 esp
exec ipsec tunnel protect ipip0 sa-out 100000 sa-in 0 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.1.1 p2p
exec ipsec sa add 100001 spi 200001 crypto-alg aes-gcm-128 crypto-key 444a6b567044646a6e4162536f78566c esp
exec ipsec sa add 1 spi 100001 crypto-alg aes-gcm-128 crypto-key 444a6b567044646a6e4162536f78566c esp
exec ipsec tunnel protect ipip1 sa-out 100001 sa-in 1 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.2.1 p2p
exec ipsec sa add 100002 spi 200002 crypto-alg aes-gcm-128 crypto-key 647662676c71724664595242434b4952 esp
exec ipsec sa add 2 spi 100002 crypto-alg aes-gcm-128 crypto-key 647662676c71724664595242434b4952 esp
exec ipsec tunnel protect ipip2 sa-out 100002 sa-in 2 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.3.1 p2p
exec ipsec sa add 100003 spi 200003 crypto-alg aes-gcm-128 crypto-key 6d4d4a7449636842616b67785474776c esp
exec ipsec sa add 3 spi 100003 crypto-alg aes-gcm-128 crypto-key 6d4d4a7449636842616b67785474776c esp
exec ipsec tunnel protect ipip3 sa-out 100003 sa-in 3 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.4.1 p2p
exec ipsec sa add 100004 spi 200004 crypto-alg aes-gcm-128 crypto-key 56487243666857576c64576c6f586f76 esp
exec ipsec sa add 4 spi 100004 crypto-alg aes-gcm-128 crypto-key 56487243666857576c64576c6f586f76 esp
exec ipsec tunnel protect ipip4 sa-out 100004 sa-in 4 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.5.1 p2p
exec ipsec sa add 100005 spi 200005 crypto-alg aes-gcm-128 crypto-key 566b51746f5468687a45555150554a79 esp
exec ipsec sa add 5 spi 100005 crypto-alg aes-gcm-128 crypto-key 566b51746f5468687a45555150554a79 esp
exec ipsec tunnel protect ipip5 sa-out 100005 sa-in 5 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.6.1 p2p
exec ipsec sa add 100006 spi 200006 crypto-alg aes-gcm-128 crypto-key 6c6f49564561706c6c6a7a41546e4b41 esp
exec ipsec sa add 6 spi 100006 crypto-alg aes-gcm-128 crypto-key 6c6f49564561706c6c6a7a41546e4b41 esp
exec ipsec tunnel protect ipip6 sa-out 100006 sa-in 6 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.7.1 p2p
exec ipsec sa add 100007 spi 200007 crypto-alg aes-gcm-128 crypto-key 794963637154476a4848467569734f61 esp
exec ipsec sa add 7 spi 100007 crypto-alg aes-gcm-128 crypto-key 794963637154476a4848467569734f61 esp
exec ipsec tunnel protect ipip7 sa-out 100007 sa-in 7 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.8.1 p2p
exec ipsec sa add 100008 spi 200008 crypto-alg aes-gcm-128 crypto-key 726a584f4255494d444e5062706a4d74 esp
exec ipsec sa add 8 spi 100008 crypto-alg aes-gcm-128 crypto-key 726a584f4255494d444e5062706a4d74 esp
exec ipsec tunnel protect ipip8 sa-out 100008 sa-in 8 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.9.1 p2p
exec ipsec sa add 100009 spi 200009 crypto-alg aes-gcm-128 crypto-key 716279536b6f6e4c666a794252615347 esp
exec ipsec sa add 9 spi 100009 crypto-alg aes-gcm-128 crypto-key 716279536b6f6e4c666a794252615347 esp
exec ipsec tunnel protect ipip9 sa-out 100009 sa-in 9 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.10.1 p2p
exec ipsec sa add 100010 spi 200010 crypto-alg aes-gcm-128 crypto-key 526749676c4862785851486b42484941 esp
exec ipsec sa add 10 spi 100010 crypto-alg aes-gcm-128 crypto-key 526749676c4862785851486b42484941 esp
exec ipsec tunnel protect ipip10 sa-out 100010 sa-in 10 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.11.1 p2p
exec ipsec sa add 100011 spi 200011 crypto-alg aes-gcm-128 crypto-key 6f42675a657778555a7167477747516b esp
exec ipsec sa add 11 spi 100011 crypto-alg aes-gcm-128 crypto-key 6f42675a657778555a7167477747516b esp
exec ipsec tunnel protect ipip11 sa-out 100011 sa-in 11 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.12.1 p2p
exec ipsec sa add 100012 spi 200012 crypto-alg aes-gcm-128 crypto-key 484f66634c72524a51646256714a444c esp
exec ipsec sa add 12 spi 100012 crypto-alg aes-gcm-128 crypto-key 484f66634c72524a51646256714a444c esp
exec ipsec tunnel protect ipip12 sa-out 100012 sa-in 12 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.13.1 p2p
exec ipsec sa add 100013 spi 200013 crypto-alg aes-gcm-128 crypto-key 6b6a6251497a7962694b56597a6b4772 esp
exec ipsec sa add 13 spi 100013 crypto-alg aes-gcm-128 crypto-key 6b6a6251497a7962694b56597a6b4772 esp
exec ipsec tunnel protect ipip13 sa-out 100013 sa-in 13 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.14.1 p2p
exec ipsec sa add 100014 spi 200014 crypto-alg aes-gcm-128 crypto-key 59597759754154734e4246646a624444 esp
exec ipsec sa add 14 spi 100014 crypto-alg aes-gcm-128 crypto-key 59597759754154734e4246646a624444 esp
exec ipsec tunnel protect ipip14 sa-out 100014 sa-in 14 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.15.1 p2p
exec ipsec sa add 100015 spi 200015 crypto-alg aes-gcm-128 crypto-key 696379544b644e4f6674454659745852 esp
exec ipsec sa add 15 spi 100015 crypto-alg aes-gcm-128 crypto-key 696379544b644e4f6674454659745852 esp
exec ipsec tunnel protect ipip15 sa-out 100015 sa-in 15 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.16.1 p2p
exec ipsec sa add 100016 spi 200016 crypto-alg aes-gcm-128 crypto-key 54425241414f625a6f4c68636147644e esp
exec ipsec sa add 16 spi 100016 crypto-alg aes-gcm-128 crypto-key 54425241414f625a6f4c68636147644e esp
exec ipsec tunnel protect ipip16 sa-out 100016 sa-in 16 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.17.1 p2p
exec ipsec sa add 100017 spi 200017 crypto-alg aes-gcm-128 crypto-key 594b6667544c4a556b4274454c707279 esp
exec ipsec sa add 17 spi 100017 crypto-alg aes-gcm-128 crypto-key 594b6667544c4a556b4274454c707279 esp
exec ipsec tunnel protect ipip17 sa-out 100017 sa-in 17 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.18.1 p2p
exec ipsec sa add 100018 spi 200018 crypto-alg aes-gcm-128 crypto-key 4a616e764244426b7a787a716a75686a esp
exec ipsec sa add 18 spi 100018 crypto-alg aes-gcm-128 crypto-key 4a616e764244426b7a787a716a75686a esp
exec ipsec tunnel protect ipip18 sa-out 100018 sa-in 18 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.19.1 p2p
exec ipsec sa add 100019 spi 200019 crypto-alg aes-gcm-128 crypto-key 644e654676436550447a4675674d4e6e esp
exec ipsec sa add 19 spi 100019 crypto-alg aes-gcm-128 crypto-key 644e654676436550447a4675674d4e6e esp
exec ipsec tunnel protect ipip19 sa-out 100019 sa-in 19 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.20.1 p2p
exec ipsec sa add 100020 spi 200020 crypto-alg aes-gcm-128 crypto-key 4b684e415a6b6f757562736e76716b46 esp
exec ipsec sa add 20 spi 100020 crypto-alg aes-gcm-128 crypto-key 4b684e415a6b6f757562736e76716b46 esp
exec ipsec tunnel protect ipip20 sa-out 100020 sa-in 20 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.21.1 p2p
exec ipsec sa add 100021 spi 200021 crypto-alg aes-gcm-128 crypto-key 63796b484a6864486646785767725153 esp
exec ipsec sa add 21 spi 100021 crypto-alg aes-gcm-128 crypto-key 63796b484a6864486646785767725153 esp
exec ipsec tunnel protect ipip21 sa-out 100021 sa-in 21 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.22.1 p2p
exec ipsec sa add 100022 spi 200022 crypto-alg aes-gcm-128 crypto-key 5367524e6a466162576e564c6845496d esp
exec ipsec sa add 22 spi 100022 crypto-alg aes-gcm-128 crypto-key 5367524e6a466162576e564c6845496d esp
exec ipsec tunnel protect ipip22 sa-out 100022 sa-in 22 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.23.1 p2p
exec ipsec sa add 100023 spi 200023 crypto-alg aes-gcm-128 crypto-key 6e4f6c644c6d616764545873524c5550 esp
exec ipsec sa add 23 spi 100023 crypto-alg aes-gcm-128 crypto-key 6e4f6c644c6d616764545873524c5550 esp
exec ipsec tunnel protect ipip23 sa-out 100023 sa-in 23 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.24.1 p2p
exec ipsec sa add 100024 spi 200024 crypto-alg aes-gcm-128 crypto-key 42664866766a494d6757726a4a454547 esp
exec ipsec sa add 24 spi 100024 crypto-alg aes-gcm-128 crypto-key 42664866766a494d6757726a4a454547 esp
exec ipsec tunnel protect ipip24 sa-out 100024 sa-in 24 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.25.1 p2p
exec ipsec sa add 100025 spi 200025 crypto-alg aes-gcm-128 crypto-key 6c53546a6a666f4a4c6b4566615a5652 esp
exec ipsec sa add 25 spi 100025 crypto-alg aes-gcm-128 crypto-key 6c53546a6a666f4a4c6b4566615a5652 esp
exec ipsec tunnel protect ipip25 sa-out 100025 sa-in 25 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.26.1 p2p
exec ipsec sa add 100026 spi 200026 crypto-alg aes-gcm-128 crypto-key 68797943696950757a6371444e687244 esp
exec ipsec sa add 26 spi 100026 crypto-alg aes-gcm-128 crypto-key 68797943696950757a6371444e687244 esp
exec ipsec tunnel protect ipip26 sa-out 100026 sa-in 26 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.27.1 p2p
exec ipsec sa add 100027 spi 200027 crypto-alg aes-gcm-128 crypto-key 484b4b705057454367626c55454c7968 esp
exec ipsec sa add 27 spi 100027 crypto-alg aes-gcm-128 crypto-key 484b4b705057454367626c55454c7968 esp
exec ipsec tunnel protect ipip27 sa-out 100027 sa-in 27 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.28.1 p2p
exec ipsec sa add 100028 spi 200028 crypto-alg aes-gcm-128 crypto-key 6979694346715576536a46526170536d esp
exec ipsec sa add 28 spi 100028 crypto-alg aes-gcm-128 crypto-key 6979694346715576536a46526170536d esp
exec ipsec tunnel protect ipip28 sa-out 100028 sa-in 28 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.29.1 p2p
exec ipsec sa add 100029 spi 200029 crypto-alg aes-gcm-128 crypto-key 7054557552515a6d75517a5179487a72 esp
exec ipsec sa add 29 spi 100029 crypto-alg aes-gcm-128 crypto-key 7054557552515a6d75517a5179487a72 esp
exec ipsec tunnel protect ipip29 sa-out 100029 sa-in 29 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.30.1 p2p
exec ipsec sa add 100030 spi 200030 crypto-alg aes-gcm-128 crypto-key 6f556b49517577634e534769636e734e esp
exec ipsec sa add 30 spi 100030 crypto-alg aes-gcm-128 crypto-key 6f556b49517577634e534769636e734e esp
exec ipsec tunnel protect ipip30 sa-out 100030 sa-in 30 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.31.1 p2p
exec ipsec sa add 100031 spi 200031 crypto-alg aes-gcm-128 crypto-key 746d5a4c5056474b6e727442545a4264 esp
exec ipsec sa add 31 spi 100031 crypto-alg aes-gcm-128 crypto-key 746d5a4c5056474b6e727442545a4264 esp
exec ipsec tunnel protect ipip31 sa-out 100031 sa-in 31 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.32.1 p2p
exec ipsec sa add 100032 spi 200032 crypto-alg aes-gcm-128 crypto-key 70756a565a705a6e55574d7a734a5845 esp
exec ipsec sa add 32 spi 100032 crypto-alg aes-gcm-128 crypto-key 70756a565a705a6e55574d7a734a5845 esp
exec ipsec tunnel protect ipip32 sa-out 100032 sa-in 32 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.33.1 p2p
exec ipsec sa add 100033 spi 200033 crypto-alg aes-gcm-128 crypto-key 5a6b70726d6552724967666b51724157 esp
exec ipsec sa add 33 spi 100033 crypto-alg aes-gcm-128 crypto-key 5a6b70726d6552724967666b51724157 esp
exec ipsec tunnel protect ipip33 sa-out 100033 sa-in 33 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.34.1 p2p
exec ipsec sa add 100034 spi 200034 crypto-alg aes-gcm-128 crypto-key 5a744f6e51416e456578476a705a504b esp
exec ipsec sa add 34 spi 100034 crypto-alg aes-gcm-128 crypto-key 5a744f6e51416e456578476a705a504b esp
exec ipsec tunnel protect ipip34 sa-out 100034 sa-in 34 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.35.1 p2p
exec ipsec sa add 100035 spi 200035 crypto-alg aes-gcm-128 crypto-key 56596556504e75736f73736e70535a52 esp
exec ipsec sa add 35 spi 100035 crypto-alg aes-gcm-128 crypto-key 56596556504e75736f73736e70535a52 esp
exec ipsec tunnel protect ipip35 sa-out 100035 sa-in 35 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.36.1 p2p
exec ipsec sa add 100036 spi 200036 crypto-alg aes-gcm-128 crypto-key 4443624e5a4773456366566e79466364 esp
exec ipsec sa add 36 spi 100036 crypto-alg aes-gcm-128 crypto-key 4443624e5a4773456366566e79466364 esp
exec ipsec tunnel protect ipip36 sa-out 100036 sa-in 36 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.37.1 p2p
exec ipsec sa add 100037 spi 200037 crypto-alg aes-gcm-128 crypto-key 516641506d744761524d4c59464e6f45 esp
exec ipsec sa add 37 spi 100037 crypto-alg aes-gcm-128 crypto-key 516641506d744761524d4c59464e6f45 esp
exec ipsec tunnel protect ipip37 sa-out 100037 sa-in 37 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.38.1 p2p
exec ipsec sa add 100038 spi 200038 crypto-alg aes-gcm-128 crypto-key 5a656578666950494664534f51597250 esp
exec ipsec sa add 38 spi 100038 crypto-alg aes-gcm-128 crypto-key 5a656578666950494664534f51597250 esp
exec ipsec tunnel protect ipip38 sa-out 100038 sa-in 38 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.39.1 p2p
exec ipsec sa add 100039 spi 200039 crypto-alg aes-gcm-128 crypto-key 505a5741534b7858497a4c4b784b7945 esp
exec ipsec sa add 39 spi 100039 crypto-alg aes-gcm-128 crypto-key 505a5741534b7858497a4c4b784b7945 esp
exec ipsec tunnel protect ipip39 sa-out 100039 sa-in 39 add
exec ip route add 100.0.0.1/8 via 200.0.0.101 TenGigabitEthernet8/0/0
exec set interface unnumbered ipip0 use TenGigabitEthernet8/0/0
exec set interface state ipip0 up
exec ip route add 10.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use TenGigabitEthernet8/0/0
exec set interface state ipip1 up
exec ip route add 10.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use TenGigabitEthernet8/0/0
exec set interface state ipip2 up
exec ip route add 10.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use TenGigabitEthernet8/0/0
exec set interface state ipip3 up
exec ip route add 10.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use TenGigabitEthernet8/0/0
exec set interface state ipip4 up
exec ip route add 10.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use TenGigabitEthernet8/0/0
exec set interface state ipip5 up
exec ip route add 10.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use TenGigabitEthernet8/0/0
exec set interface state ipip6 up
exec ip route add 10.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use TenGigabitEthernet8/0/0
exec set interface state ipip7 up
exec ip route add 10.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use TenGigabitEthernet8/0/0
exec set interface state ipip8 up
exec ip route add 10.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use TenGigabitEthernet8/0/0
exec set interface state ipip9 up
exec ip route add 10.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use TenGigabitEthernet8/0/0
exec set interface state ipip10 up
exec ip route add 10.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use TenGigabitEthernet8/0/0
exec set interface state ipip11 up
exec ip route add 10.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use TenGigabitEthernet8/0/0
exec set interface state ipip12 up
exec ip route add 10.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use TenGigabitEthernet8/0/0
exec set interface state ipip13 up
exec ip route add 10.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use TenGigabitEthernet8/0/0
exec set interface state ipip14 up
exec ip route add 10.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use TenGigabitEthernet8/0/0
exec set interface state ipip15 up
exec ip route add 10.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use TenGigabitEthernet8/0/0
exec set interface state ipip16 up
exec ip route add 10.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use TenGigabitEthernet8/0/0
exec set interface state ipip17 up
exec ip route add 10.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use TenGigabitEthernet8/0/0
exec set interface state ipip18 up
exec ip route add 10.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use TenGigabitEthernet8/0/0
exec set interface state ipip19 up
exec ip route add 10.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use TenGigabitEthernet8/0/0
exec set interface state ipip20 up
exec ip route add 10.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use TenGigabitEthernet8/0/0
exec set interface state ipip21 up
exec ip route add 10.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use TenGigabitEthernet8/0/0
exec set interface state ipip22 up
exec ip route add 10.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use TenGigabitEthernet8/0/0
exec set interface state ipip23 up
exec ip route add 10.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use TenGigabitEthernet8/0/0
exec set interface state ipip24 up
exec ip route add 10.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use TenGigabitEthernet8/0/0
exec set interface state ipip25 up
exec ip route add 10.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use TenGigabitEthernet8/0/0
exec set interface state ipip26 up
exec ip route add 10.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use TenGigabitEthernet8/0/0
exec set interface state ipip27 up
exec ip route add 10.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use TenGigabitEthernet8/0/0
exec set interface state ipip28 up
exec ip route add 10.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use TenGigabitEthernet8/0/0
exec set interface state ipip29 up
exec ip route add 10.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use TenGigabitEthernet8/0/0
exec set interface state ipip30 up
exec ip route add 10.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use TenGigabitEthernet8/0/0
exec set interface state ipip31 up
exec ip route add 10.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use TenGigabitEthernet8/0/0
exec set interface state ipip32 up
exec ip route add 10.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use TenGigabitEthernet8/0/0
exec set interface state ipip33 up
exec ip route add 10.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use TenGigabitEthernet8/0/0
exec set interface state ipip34 up
exec ip route add 10.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use TenGigabitEthernet8/0/0
exec set interface state ipip35 up
exec ip route add 10.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use TenGigabitEthernet8/0/0
exec set interface state ipip36 up
exec ip route add 10.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use TenGigabitEthernet8/0/0
exec set interface state ipip37 up
exec ip route add 10.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use TenGigabitEthernet8/0/0
exec set interface state ipip38 up
exec ip route add 10.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use TenGigabitEthernet8/0/0
exec set interface state ipip39 up
exec ip route add 10.0.0.39/32 via ipip39

 imix-2t2c-ethip4ipsec40tnlsw- 
ip4base-int-aes128gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec create loopback interface
exec set interface state loop0 up
exec set interface ip address TenGigabitEthernet8/0/0 200.0.0.101/24
exec set ip neighbor TenGigabitEthernet8/0/0 200.0.0.102 ac:1f:6b:57:57:fe static
exec set interface ip address loop0 100.0.0.1/32
exec create ipip tunnel src 100.0.0.1 dst 200.0.0.102 p2p
exec ipsec sa add 0 spi 100000 crypto-alg aes-gcm-128 crypto-key 517771465243444876486542534c4f4b esp
exec ipsec sa add 100000 spi 200000 crypto-alg aes-gcm-128 crypto-key 517771465243444876486542534c4f4b esp
exec ipsec tunnel protect ipip0 sa-out 0 sa-in 100000 add
exec set interface ip address loop0 100.0.1.1/32
exec create ipip tunnel src 100.0.1.1 dst 200.0.0.102 p2p
exec ipsec sa add 1 spi 100001 crypto-alg aes-gcm-128 crypto-key 4b716b54704266574f5961624a7a4143 esp
exec ipsec sa add 100001 spi 200001 crypto-alg aes-gcm-128 crypto-key 4b716b54704266574f5961624a7a4143 esp
exec ipsec tunnel protect ipip1 sa-out 1 sa-in 100001 add
exec set interface ip address loop0 100.0.2.1/32
exec create ipip tunnel src 100.0.2.1 dst 200.0.0.102 p2p
exec ipsec sa add 2 spi 100002 crypto-alg aes-gcm-128 crypto-key 50784f7376437069586d79746357566b esp
exec ipsec sa add 100002 spi 200002 crypto-alg aes-gcm-128 crypto-key 50784f7376437069586d79746357566b esp
exec ipsec tunnel protect ipip2 sa-out 2 sa-in 100002 add
exec set interface ip address loop0 100.0.3.1/32
exec create ipip tunnel src 100.0.3.1 dst 200.0.0.102 p2p
exec ipsec sa add 3 spi 100003 crypto-alg aes-gcm-128 crypto-key 667361636d6471425374666a4b65496c esp
exec ipsec sa add 100003 spi 200003 crypto-alg aes-gcm-128 crypto-key 667361636d6471425374666a4b65496c esp
exec ipsec tunnel protect ipip3 sa-out 3 sa-in 100003 add
exec set interface ip address loop0 100.0.4.1/32
exec create ipip tunnel src 100.0.4.1 dst 200.0.0.102 p2p
exec ipsec sa add 4 spi 100004 crypto-alg aes-gcm-128 crypto-key 634643585a7044634957534962435649 esp
exec ipsec sa add 100004 spi 200004 crypto-alg aes-gcm-128 crypto-key 634643585a7044634957534962435649 esp
exec ipsec tunnel protect ipip4 sa-out 4 sa-in 100004 add
exec set interface ip address loop0 100.0.5.1/32
exec create ipip tunnel src 100.0.5.1 dst 200.0.0.102 p2p
exec ipsec sa add 5 spi 100005 crypto-alg aes-gcm-128 crypto-key 5872794d7266664b506672426f5a5566 esp
exec ipsec sa add 100005 spi 200005 crypto-alg aes-gcm-128 crypto-key 5872794d7266664b506672426f5a5566 esp
exec ipsec tunnel protect ipip5 sa-out 5 sa-in 100005 add
exec set interface ip address loop0 100.0.6.1/32
exec create ipip tunnel src 100.0.6.1 dst 200.0.0.102 p2p
exec ipsec sa add 6 spi 100006 crypto-alg aes-gcm-128 crypto-key 5a6a664465514d764f65704e72466c73 esp
exec ipsec sa add 100006 spi 200006 crypto-alg aes-gcm-128 crypto-key 5a6a664465514d764f65704e72466c73 esp
exec ipsec tunnel protect ipip6 sa-out 6 sa-in 100006 add
exec set interface ip address loop0 100.0.7.1/32
exec create ipip tunnel src 100.0.7.1 dst 200.0.0.102 p2p
exec ipsec sa add 7 spi 100007 crypto-alg aes-gcm-128 crypto-key 767a6750656d524d7555417865737967 esp
exec ipsec sa add 100007 spi 200007 crypto-alg aes-gcm-128 crypto-key 767a6750656d524d7555417865737967 esp
exec ipsec tunnel protect ipip7 sa-out 7 sa-in 100007 add
exec set interface ip address loop0 100.0.8.1/32
exec create ipip tunnel src 100.0.8.1 dst 200.0.0.102 p2p
exec ipsec sa add 8 spi 100008 crypto-alg aes-gcm-128 crypto-key 564158694676665a6b4246645871456e esp
exec ipsec sa add 100008 spi 200008 crypto-alg aes-gcm-128 crypto-key 564158694676665a6b4246645871456e esp
exec ipsec tunnel protect ipip8 sa-out 8 sa-in 100008 add
exec set interface ip address loop0 100.0.9.1/32
exec create ipip tunnel src 100.0.9.1 dst 200.0.0.102 p2p
exec ipsec sa add 9 spi 100009 crypto-alg aes-gcm-128 crypto-key 75576d4e74446c66584e636262734873 esp
exec ipsec sa add 100009 spi 200009 crypto-alg aes-gcm-128 crypto-key 75576d4e74446c66584e636262734873 esp
exec ipsec tunnel protect ipip9 sa-out 9 sa-in 100009 add
exec set interface ip address loop0 100.0.10.1/32
exec create ipip tunnel src 100.0.10.1 dst 200.0.0.102 p2p
exec ipsec sa add 10 spi 100010 crypto-alg aes-gcm-128 crypto-key 794b4b5073586956534754646c554276 esp
exec ipsec sa add 100010 spi 200010 crypto-alg aes-gcm-128 crypto-key 794b4b5073586956534754646c554276 esp
exec ipsec tunnel protect ipip10 sa-out 10 sa-in 100010 add
exec set interface ip address loop0 100.0.11.1/32
exec create ipip tunnel src 100.0.11.1 dst 200.0.0.102 p2p
exec ipsec sa add 11 spi 100011 crypto-alg aes-gcm-128 crypto-key 557844567676455a515172616d4c6d6e esp
exec ipsec sa add 100011 spi 200011 crypto-alg aes-gcm-128 crypto-key 557844567676455a515172616d4c6d6e esp
exec ipsec tunnel protect ipip11 sa-out 11 sa-in 100011 add
exec set interface ip address loop0 100.0.12.1/32
exec create ipip tunnel src 100.0.12.1 dst 200.0.0.102 p2p
exec ipsec sa add 12 spi 100012 crypto-alg aes-gcm-128 crypto-key 4b7877595a534d4b41777a4e58774373 esp
exec ipsec sa add 100012 spi 200012 crypto-alg aes-gcm-128 crypto-key 4b7877595a534d4b41777a4e58774373 esp
exec ipsec tunnel protect ipip12 sa-out 12 sa-in 100012 add
exec set interface ip address loop0 100.0.13.1/32
exec create ipip tunnel src 100.0.13.1 dst 200.0.0.102 p2p
exec ipsec sa add 13 spi 100013 crypto-alg aes-gcm-128 crypto-key 6d704772505649627958504a78766c74 esp
exec ipsec sa add 100013 spi 200013 crypto-alg aes-gcm-128 crypto-key 6d704772505649627958504a78766c74 esp
exec ipsec tunnel protect ipip13 sa-out 13 sa-in 100013 add
exec set interface ip address loop0 100.0.14.1/32
exec create ipip tunnel src 100.0.14.1 dst 200.0.0.102 p2p
exec ipsec sa add 14 spi 100014 crypto-alg aes-gcm-128 crypto-key 6e49496f666f4b56724d61784a6e5857 esp
exec ipsec sa add 100014 spi 200014 crypto-alg aes-gcm-128 crypto-key 6e49496f666f4b56724d61784a6e5857 esp
exec ipsec tunnel protect ipip14 sa-out 14 sa-in 100014 add
exec set interface ip address loop0 100.0.15.1/32
exec create ipip tunnel src 100.0.15.1 dst 200.0.0.102 p2p
exec ipsec sa add 15 spi 100015 crypto-alg aes-gcm-128 crypto-key 744c795461626a446b774e4155474754 esp
exec ipsec sa add 100015 spi 200015 crypto-alg aes-gcm-128 crypto-key 744c795461626a446b774e4155474754 esp
exec ipsec tunnel protect ipip15 sa-out 15 sa-in 100015 add
exec set interface ip address loop0 100.0.16.1/32
exec create ipip tunnel src 100.0.16.1 dst 200.0.0.102 p2p
exec ipsec sa add 16 spi 100016 crypto-alg aes-gcm-128 crypto-key 6a7858746778476661774244746c7643 esp
exec ipsec sa add 100016 spi 200016 crypto-alg aes-gcm-128 crypto-key 6a7858746778476661774244746c7643 esp
exec ipsec tunnel protect ipip16 sa-out 16 sa-in 100016 add
exec set interface ip address loop0 100.0.17.1/32
exec create ipip tunnel src 100.0.17.1 dst 200.0.0.102 p2p
exec ipsec sa add 17 spi 100017 crypto-alg aes-gcm-128 crypto-key 414648545143414e627174434a737245 esp
exec ipsec sa add 100017 spi 200017 crypto-alg aes-gcm-128 crypto-key 414648545143414e627174434a737245 esp
exec ipsec tunnel protect ipip17 sa-out 17 sa-in 100017 add
exec set interface ip address loop0 100.0.18.1/32
exec create ipip tunnel src 100.0.18.1 dst 200.0.0.102 p2p
exec ipsec sa add 18 spi 100018 crypto-alg aes-gcm-128 crypto-key 6f7655737647426b4a576d7765675376 esp
exec ipsec sa add 100018 spi 200018 crypto-alg aes-gcm-128 crypto-key 6f7655737647426b4a576d7765675376 esp
exec ipsec tunnel protect ipip18 sa-out 18 sa-in 100018 add
exec set interface ip address loop0 100.0.19.1/32
exec create ipip tunnel src 100.0.19.1 dst 200.0.0.102 p2p
exec ipsec sa add 19 spi 100019 crypto-alg aes-gcm-128 crypto-key 65746f586469436d4378686172554241 esp
exec ipsec sa add 100019 spi 200019 crypto-alg aes-gcm-128 crypto-key 65746f586469436d4378686172554241 esp
exec ipsec tunnel protect ipip19 sa-out 19 sa-in 100019 add
exec set interface ip address loop0 100.0.20.1/32
exec create ipip tunnel src 100.0.20.1 dst 200.0.0.102 p2p
exec ipsec sa add 20 spi 100020 crypto-alg aes-gcm-128 crypto-key 644c636f6b594f73546f726862446843 esp
exec ipsec sa add 100020 spi 200020 crypto-alg aes-gcm-128 crypto-key 644c636f6b594f73546f726862446843 esp
exec ipsec tunnel protect ipip20 sa-out 20 sa-in 100020 add
exec set interface ip address loop0 100.0.21.1/32
exec create ipip tunnel src 100.0.21.1 dst 200.0.0.102 p2p
exec ipsec sa add 21 spi 100021 crypto-alg aes-gcm-128 crypto-key 6a7651534a496f734277616474724453 esp
exec ipsec sa add 100021 spi 200021 crypto-alg aes-gcm-128 crypto-key 6a7651534a496f734277616474724453 esp
exec ipsec tunnel protect ipip21 sa-out 21 sa-in 100021 add
exec set interface ip address loop0 100.0.22.1/32
exec create ipip tunnel src 100.0.22.1 dst 200.0.0.102 p2p
exec ipsec sa add 22 spi 100022 crypto-alg aes-gcm-128 crypto-key 434377417074684c4367627a41446874 esp
exec ipsec sa add 100022 spi 200022 crypto-alg aes-gcm-128 crypto-key 434377417074684c4367627a41446874 esp
exec ipsec tunnel protect ipip22 sa-out 22 sa-in 100022 add
exec set interface ip address loop0 100.0.23.1/32
exec create ipip tunnel src 100.0.23.1 dst 200.0.0.102 p2p
exec ipsec sa add 23 spi 100023 crypto-alg aes-gcm-128 crypto-key 774b48784358434a687677765a715756 esp
exec ipsec sa add 100023 spi 200023 crypto-alg aes-gcm-128 crypto-key 774b48784358434a687677765a715756 esp
exec ipsec tunnel protect ipip23 sa-out 23 sa-in 100023 add
exec set interface ip address loop0 100.0.24.1/32
exec create ipip tunnel src 100.0.24.1 dst 200.0.0.102 p2p
exec ipsec sa add 24 spi 100024 crypto-alg aes-gcm-128 crypto-key 6d4b6b7644757161484769576e64766c esp
exec ipsec sa add 100024 spi 200024 crypto-alg aes-gcm-128 crypto-key 6d4b6b7644757161484769576e64766c esp
exec ipsec tunnel protect ipip24 sa-out 24 sa-in 100024 add
exec set interface ip address loop0 100.0.25.1/32
exec create ipip tunnel src 100.0.25.1 dst 200.0.0.102 p2p
exec ipsec sa add 25 spi 100025 crypto-alg aes-gcm-128 crypto-key 5746447452647068527775724b62564a esp
exec ipsec sa add 100025 spi 200025 crypto-alg aes-gcm-128 crypto-key 5746447452647068527775724b62564a esp
exec ipsec tunnel protect ipip25 sa-out 25 sa-in 100025 add
exec set interface ip address loop0 100.0.26.1/32
exec create ipip tunnel src 100.0.26.1 dst 200.0.0.102 p2p
exec ipsec sa add 26 spi 100026 crypto-alg aes-gcm-128 crypto-key 5241454572504f54674d737049416f45 esp
exec ipsec sa add 100026 spi 200026 crypto-alg aes-gcm-128 crypto-key 5241454572504f54674d737049416f45 esp
exec ipsec tunnel protect ipip26 sa-out 26 sa-in 100026 add
exec set interface ip address loop0 100.0.27.1/32
exec create ipip tunnel src 100.0.27.1 dst 200.0.0.102 p2p
exec ipsec sa add 27 spi 100027 crypto-alg aes-gcm-128 crypto-key 4a48746b7678506e53597046666f5356 esp
exec ipsec sa add 100027 spi 200027 crypto-alg aes-gcm-128 crypto-key 4a48746b7678506e53597046666f5356 esp
exec ipsec tunnel protect ipip27 sa-out 27 sa-in 100027 add
exec set interface ip address loop0 100.0.28.1/32
exec create ipip tunnel src 100.0.28.1 dst 200.0.0.102 p2p
exec ipsec sa add 28 spi 100028 crypto-alg aes-gcm-128 crypto-key 4852467865734565464f655963486356 esp
exec ipsec sa add 100028 spi 200028 crypto-alg aes-gcm-128 crypto-key 4852467865734565464f655963486356 esp
exec ipsec tunnel protect ipip28 sa-out 28 sa-in 100028 add
exec set interface ip address loop0 100.0.29.1/32
exec create ipip tunnel src 100.0.29.1 dst 200.0.0.102 p2p
exec ipsec sa add 29 spi 100029 crypto-alg aes-gcm-128 crypto-key 6249434b655a6a5152736f68634e766d esp
exec ipsec sa add 100029 spi 200029 crypto-alg aes-gcm-128 crypto-key 6249434b655a6a5152736f68634e766d esp
exec ipsec tunnel protect ipip29 sa-out 29 sa-in 100029 add
exec set interface ip address loop0 100.0.30.1/32
exec create ipip tunnel src 100.0.30.1 dst 200.0.0.102 p2p
exec ipsec sa add 30 spi 100030 crypto-alg aes-gcm-128 crypto-key 7364655275734271455a665345556d62 esp
exec ipsec sa add 100030 spi 200030 crypto-alg aes-gcm-128 crypto-key 7364655275734271455a665345556d62 esp
exec ipsec tunnel protect ipip30 sa-out 30 sa-in 100030 add
exec set interface ip address loop0 100.0.31.1/32
exec create ipip tunnel src 100.0.31.1 dst 200.0.0.102 p2p
exec ipsec sa add 31 spi 100031 crypto-alg aes-gcm-128 crypto-key 7855444a654e6876426a44654c556141 esp
exec ipsec sa add 100031 spi 200031 crypto-alg aes-gcm-128 crypto-key 7855444a654e6876426a44654c556141 esp
exec ipsec tunnel protect ipip31 sa-out 31 sa-in 100031 add
exec set interface ip address loop0 100.0.32.1/32
exec create ipip tunnel src 100.0.32.1 dst 200.0.0.102 p2p
exec ipsec sa add 32 spi 100032 crypto-alg aes-gcm-128 crypto-key 764d726253684947416d496143564650 esp
exec ipsec sa add 100032 spi 200032 crypto-alg aes-gcm-128 crypto-key 764d726253684947416d496143564650 esp
exec ipsec tunnel protect ipip32 sa-out 32 sa-in 100032 add
exec set interface ip address loop0 100.0.33.1/32
exec create ipip tunnel src 100.0.33.1 dst 200.0.0.102 p2p
exec ipsec sa add 33 spi 100033 crypto-alg aes-gcm-128 crypto-key 66416b466a4a4a4d5053755978556b5a esp
exec ipsec sa add 100033 spi 200033 crypto-alg aes-gcm-128 crypto-key 66416b466a4a4a4d5053755978556b5a esp
exec ipsec tunnel protect ipip33 sa-out 33 sa-in 100033 add
exec set interface ip address loop0 100.0.34.1/32
exec create ipip tunnel src 100.0.34.1 dst 200.0.0.102 p2p
exec ipsec sa add 34 spi 100034 crypto-alg aes-gcm-128 crypto-key 53435a465a5847664872714570665742 esp
exec ipsec sa add 100034 spi 200034 crypto-alg aes-gcm-128 crypto-key 53435a465a5847664872714570665742 esp
exec ipsec tunnel protect ipip34 sa-out 34 sa-in 100034 add
exec set interface ip address loop0 100.0.35.1/32
exec create ipip tunnel src 100.0.35.1 dst 200.0.0.102 p2p
exec ipsec sa add 35 spi 100035 crypto-alg aes-gcm-128 crypto-key 4a645a494a42527562446659626c5572 esp
exec ipsec sa add 100035 spi 200035 crypto-alg aes-gcm-128 crypto-key 4a645a494a42527562446659626c5572 esp
exec ipsec tunnel protect ipip35 sa-out 35 sa-in 100035 add
exec set interface ip address loop0 100.0.36.1/32
exec create ipip tunnel src 100.0.36.1 dst 200.0.0.102 p2p
exec ipsec sa add 36 spi 100036 crypto-alg aes-gcm-128 crypto-key 6f5269434e496643524457566d62686d esp
exec ipsec sa add 100036 spi 200036 crypto-alg aes-gcm-128 crypto-key 6f5269434e496643524457566d62686d esp
exec ipsec tunnel protect ipip36 sa-out 36 sa-in 100036 add
exec set interface ip address loop0 100.0.37.1/32
exec create ipip tunnel src 100.0.37.1 dst 200.0.0.102 p2p
exec ipsec sa add 37 spi 100037 crypto-alg aes-gcm-128 crypto-key 4d536f7344486f48436d4b7064626b58 esp
exec ipsec sa add 100037 spi 200037 crypto-alg aes-gcm-128 crypto-key 4d536f7344486f48436d4b7064626b58 esp
exec ipsec tunnel protect ipip37 sa-out 37 sa-in 100037 add
exec set interface ip address loop0 100.0.38.1/32
exec create ipip tunnel src 100.0.38.1 dst 200.0.0.102 p2p
exec ipsec sa add 38 spi 100038 crypto-alg aes-gcm-128 crypto-key 424a536f43675a514b4d776e53467553 esp
exec ipsec sa add 100038 spi 200038 crypto-alg aes-gcm-128 crypto-key 424a536f43675a514b4d776e53467553 esp
exec ipsec tunnel protect ipip38 sa-out 38 sa-in 100038 add
exec set interface ip address loop0 100.0.39.1/32
exec create ipip tunnel src 100.0.39.1 dst 200.0.0.102 p2p
exec ipsec sa add 39 spi 100039 crypto-alg aes-gcm-128 crypto-key 69534564476842536345616847616962 esp
exec ipsec sa add 100039 spi 200039 crypto-alg aes-gcm-128 crypto-key 69534564476842536345616847616962 esp
exec ipsec tunnel protect ipip39 sa-out 39 sa-in 100039 add
exec set interface unnumbered ipip0 use TenGigabitEthernet8/0/0
exec set interface state ipip0 up
exec ip route add 20.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use TenGigabitEthernet8/0/0
exec set interface state ipip1 up
exec ip route add 20.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use TenGigabitEthernet8/0/0
exec set interface state ipip2 up
exec ip route add 20.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use TenGigabitEthernet8/0/0
exec set interface state ipip3 up
exec ip route add 20.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use TenGigabitEthernet8/0/0
exec set interface state ipip4 up
exec ip route add 20.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use TenGigabitEthernet8/0/0
exec set interface state ipip5 up
exec ip route add 20.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use TenGigabitEthernet8/0/0
exec set interface state ipip6 up
exec ip route add 20.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use TenGigabitEthernet8/0/0
exec set interface state ipip7 up
exec ip route add 20.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use TenGigabitEthernet8/0/0
exec set interface state ipip8 up
exec ip route add 20.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use TenGigabitEthernet8/0/0
exec set interface state ipip9 up
exec ip route add 20.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use TenGigabitEthernet8/0/0
exec set interface state ipip10 up
exec ip route add 20.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use TenGigabitEthernet8/0/0
exec set interface state ipip11 up
exec ip route add 20.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use TenGigabitEthernet8/0/0
exec set interface state ipip12 up
exec ip route add 20.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use TenGigabitEthernet8/0/0
exec set interface state ipip13 up
exec ip route add 20.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use TenGigabitEthernet8/0/0
exec set interface state ipip14 up
exec ip route add 20.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use TenGigabitEthernet8/0/0
exec set interface state ipip15 up
exec ip route add 20.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use TenGigabitEthernet8/0/0
exec set interface state ipip16 up
exec ip route add 20.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use TenGigabitEthernet8/0/0
exec set interface state ipip17 up
exec ip route add 20.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use TenGigabitEthernet8/0/0
exec set interface state ipip18 up
exec ip route add 20.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use TenGigabitEthernet8/0/0
exec set interface state ipip19 up
exec ip route add 20.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use TenGigabitEthernet8/0/0
exec set interface state ipip20 up
exec ip route add 20.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use TenGigabitEthernet8/0/0
exec set interface state ipip21 up
exec ip route add 20.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use TenGigabitEthernet8/0/0
exec set interface state ipip22 up
exec ip route add 20.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use TenGigabitEthernet8/0/0
exec set interface state ipip23 up
exec ip route add 20.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use TenGigabitEthernet8/0/0
exec set interface state ipip24 up
exec ip route add 20.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use TenGigabitEthernet8/0/0
exec set interface state ipip25 up
exec ip route add 20.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use TenGigabitEthernet8/0/0
exec set interface state ipip26 up
exec ip route add 20.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use TenGigabitEthernet8/0/0
exec set interface state ipip27 up
exec ip route add 20.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use TenGigabitEthernet8/0/0
exec set interface state ipip28 up
exec ip route add 20.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use TenGigabitEthernet8/0/0
exec set interface state ipip29 up
exec ip route add 20.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use TenGigabitEthernet8/0/0
exec set interface state ipip30 up
exec ip route add 20.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use TenGigabitEthernet8/0/0
exec set interface state ipip31 up
exec ip route add 20.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use TenGigabitEthernet8/0/0
exec set interface state ipip32 up
exec ip route add 20.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use TenGigabitEthernet8/0/0
exec set interface state ipip33 up
exec ip route add 20.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use TenGigabitEthernet8/0/0
exec set interface state ipip34 up
exec ip route add 20.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use TenGigabitEthernet8/0/0
exec set interface state ipip35 up
exec ip route add 20.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use TenGigabitEthernet8/0/0
exec set interface state ipip36 up
exec ip route add 20.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use TenGigabitEthernet8/0/0
exec set interface state ipip37 up
exec ip route add 20.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use TenGigabitEthernet8/0/0
exec set interface state ipip38 up
exec ip route add 20.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use TenGigabitEthernet8/0/0
exec set interface state ipip39 up
exec ip route add 20.0.0.39/32 via ipip39
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec set interface ip address TenGigabitEthernet8/0/0 200.0.0.102/24.0
exec create ipip tunnel src 200.0.0.102 dst 100.0.0.1 p2p
exec ipsec sa add 100000 spi 200000 crypto-alg aes-gcm-128 crypto-key 517771465243444876486542534c4f4b esp
exec ipsec sa add 0 spi 100000 crypto-alg aes-gcm-128 crypto-key 517771465243444876486542534c4f4b esp
exec ipsec tunnel protect ipip0 sa-out 100000 sa-in 0 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.1.1 p2p
exec ipsec sa add 100001 spi 200001 crypto-alg aes-gcm-128 crypto-key 4b716b54704266574f5961624a7a4143 esp
exec ipsec sa add 1 spi 100001 crypto-alg aes-gcm-128 crypto-key 4b716b54704266574f5961624a7a4143 esp
exec ipsec tunnel protect ipip1 sa-out 100001 sa-in 1 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.2.1 p2p
exec ipsec sa add 100002 spi 200002 crypto-alg aes-gcm-128 crypto-key 50784f7376437069586d79746357566b esp
exec ipsec sa add 2 spi 100002 crypto-alg aes-gcm-128 crypto-key 50784f7376437069586d79746357566b esp
exec ipsec tunnel protect ipip2 sa-out 100002 sa-in 2 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.3.1 p2p
exec ipsec sa add 100003 spi 200003 crypto-alg aes-gcm-128 crypto-key 667361636d6471425374666a4b65496c esp
exec ipsec sa add 3 spi 100003 crypto-alg aes-gcm-128 crypto-key 667361636d6471425374666a4b65496c esp
exec ipsec tunnel protect ipip3 sa-out 100003 sa-in 3 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.4.1 p2p
exec ipsec sa add 100004 spi 200004 crypto-alg aes-gcm-128 crypto-key 634643585a7044634957534962435649 esp
exec ipsec sa add 4 spi 100004 crypto-alg aes-gcm-128 crypto-key 634643585a7044634957534962435649 esp
exec ipsec tunnel protect ipip4 sa-out 100004 sa-in 4 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.5.1 p2p
exec ipsec sa add 100005 spi 200005 crypto-alg aes-gcm-128 crypto-key 5872794d7266664b506672426f5a5566 esp
exec ipsec sa add 5 spi 100005 crypto-alg aes-gcm-128 crypto-key 5872794d7266664b506672426f5a5566 esp
exec ipsec tunnel protect ipip5 sa-out 100005 sa-in 5 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.6.1 p2p
exec ipsec sa add 100006 spi 200006 crypto-alg aes-gcm-128 crypto-key 5a6a664465514d764f65704e72466c73 esp
exec ipsec sa add 6 spi 100006 crypto-alg aes-gcm-128 crypto-key 5a6a664465514d764f65704e72466c73 esp
exec ipsec tunnel protect ipip6 sa-out 100006 sa-in 6 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.7.1 p2p
exec ipsec sa add 100007 spi 200007 crypto-alg aes-gcm-128 crypto-key 767a6750656d524d7555417865737967 esp
exec ipsec sa add 7 spi 100007 crypto-alg aes-gcm-128 crypto-key 767a6750656d524d7555417865737967 esp
exec ipsec tunnel protect ipip7 sa-out 100007 sa-in 7 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.8.1 p2p
exec ipsec sa add 100008 spi 200008 crypto-alg aes-gcm-128 crypto-key 564158694676665a6b4246645871456e esp
exec ipsec sa add 8 spi 100008 crypto-alg aes-gcm-128 crypto-key 564158694676665a6b4246645871456e esp
exec ipsec tunnel protect ipip8 sa-out 100008 sa-in 8 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.9.1 p2p
exec ipsec sa add 100009 spi 200009 crypto-alg aes-gcm-128 crypto-key 75576d4e74446c66584e636262734873 esp
exec ipsec sa add 9 spi 100009 crypto-alg aes-gcm-128 crypto-key 75576d4e74446c66584e636262734873 esp
exec ipsec tunnel protect ipip9 sa-out 100009 sa-in 9 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.10.1 p2p
exec ipsec sa add 100010 spi 200010 crypto-alg aes-gcm-128 crypto-key 794b4b5073586956534754646c554276 esp
exec ipsec sa add 10 spi 100010 crypto-alg aes-gcm-128 crypto-key 794b4b5073586956534754646c554276 esp
exec ipsec tunnel protect ipip10 sa-out 100010 sa-in 10 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.11.1 p2p
exec ipsec sa add 100011 spi 200011 crypto-alg aes-gcm-128 crypto-key 557844567676455a515172616d4c6d6e esp
exec ipsec sa add 11 spi 100011 crypto-alg aes-gcm-128 crypto-key 557844567676455a515172616d4c6d6e esp
exec ipsec tunnel protect ipip11 sa-out 100011 sa-in 11 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.12.1 p2p
exec ipsec sa add 100012 spi 200012 crypto-alg aes-gcm-128 crypto-key 4b7877595a534d4b41777a4e58774373 esp
exec ipsec sa add 12 spi 100012 crypto-alg aes-gcm-128 crypto-key 4b7877595a534d4b41777a4e58774373 esp
exec ipsec tunnel protect ipip12 sa-out 100012 sa-in 12 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.13.1 p2p
exec ipsec sa add 100013 spi 200013 crypto-alg aes-gcm-128 crypto-key 6d704772505649627958504a78766c74 esp
exec ipsec sa add 13 spi 100013 crypto-alg aes-gcm-128 crypto-key 6d704772505649627958504a78766c74 esp
exec ipsec tunnel protect ipip13 sa-out 100013 sa-in 13 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.14.1 p2p
exec ipsec sa add 100014 spi 200014 crypto-alg aes-gcm-128 crypto-key 6e49496f666f4b56724d61784a6e5857 esp
exec ipsec sa add 14 spi 100014 crypto-alg aes-gcm-128 crypto-key 6e49496f666f4b56724d61784a6e5857 esp
exec ipsec tunnel protect ipip14 sa-out 100014 sa-in 14 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.15.1 p2p
exec ipsec sa add 100015 spi 200015 crypto-alg aes-gcm-128 crypto-key 744c795461626a446b774e4155474754 esp
exec ipsec sa add 15 spi 100015 crypto-alg aes-gcm-128 crypto-key 744c795461626a446b774e4155474754 esp
exec ipsec tunnel protect ipip15 sa-out 100015 sa-in 15 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.16.1 p2p
exec ipsec sa add 100016 spi 200016 crypto-alg aes-gcm-128 crypto-key 6a7858746778476661774244746c7643 esp
exec ipsec sa add 16 spi 100016 crypto-alg aes-gcm-128 crypto-key 6a7858746778476661774244746c7643 esp
exec ipsec tunnel protect ipip16 sa-out 100016 sa-in 16 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.17.1 p2p
exec ipsec sa add 100017 spi 200017 crypto-alg aes-gcm-128 crypto-key 414648545143414e627174434a737245 esp
exec ipsec sa add 17 spi 100017 crypto-alg aes-gcm-128 crypto-key 414648545143414e627174434a737245 esp
exec ipsec tunnel protect ipip17 sa-out 100017 sa-in 17 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.18.1 p2p
exec ipsec sa add 100018 spi 200018 crypto-alg aes-gcm-128 crypto-key 6f7655737647426b4a576d7765675376 esp
exec ipsec sa add 18 spi 100018 crypto-alg aes-gcm-128 crypto-key 6f7655737647426b4a576d7765675376 esp
exec ipsec tunnel protect ipip18 sa-out 100018 sa-in 18 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.19.1 p2p
exec ipsec sa add 100019 spi 200019 crypto-alg aes-gcm-128 crypto-key 65746f586469436d4378686172554241 esp
exec ipsec sa add 19 spi 100019 crypto-alg aes-gcm-128 crypto-key 65746f586469436d4378686172554241 esp
exec ipsec tunnel protect ipip19 sa-out 100019 sa-in 19 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.20.1 p2p
exec ipsec sa add 100020 spi 200020 crypto-alg aes-gcm-128 crypto-key 644c636f6b594f73546f726862446843 esp
exec ipsec sa add 20 spi 100020 crypto-alg aes-gcm-128 crypto-key 644c636f6b594f73546f726862446843 esp
exec ipsec tunnel protect ipip20 sa-out 100020 sa-in 20 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.21.1 p2p
exec ipsec sa add 100021 spi 200021 crypto-alg aes-gcm-128 crypto-key 6a7651534a496f734277616474724453 esp
exec ipsec sa add 21 spi 100021 crypto-alg aes-gcm-128 crypto-key 6a7651534a496f734277616474724453 esp
exec ipsec tunnel protect ipip21 sa-out 100021 sa-in 21 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.22.1 p2p
exec ipsec sa add 100022 spi 200022 crypto-alg aes-gcm-128 crypto-key 434377417074684c4367627a41446874 esp
exec ipsec sa add 22 spi 100022 crypto-alg aes-gcm-128 crypto-key 434377417074684c4367627a41446874 esp
exec ipsec tunnel protect ipip22 sa-out 100022 sa-in 22 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.23.1 p2p
exec ipsec sa add 100023 spi 200023 crypto-alg aes-gcm-128 crypto-key 774b48784358434a687677765a715756 esp
exec ipsec sa add 23 spi 100023 crypto-alg aes-gcm-128 crypto-key 774b48784358434a687677765a715756 esp
exec ipsec tunnel protect ipip23 sa-out 100023 sa-in 23 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.24.1 p2p
exec ipsec sa add 100024 spi 200024 crypto-alg aes-gcm-128 crypto-key 6d4b6b7644757161484769576e64766c esp
exec ipsec sa add 24 spi 100024 crypto-alg aes-gcm-128 crypto-key 6d4b6b7644757161484769576e64766c esp
exec ipsec tunnel protect ipip24 sa-out 100024 sa-in 24 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.25.1 p2p
exec ipsec sa add 100025 spi 200025 crypto-alg aes-gcm-128 crypto-key 5746447452647068527775724b62564a esp
exec ipsec sa add 25 spi 100025 crypto-alg aes-gcm-128 crypto-key 5746447452647068527775724b62564a esp
exec ipsec tunnel protect ipip25 sa-out 100025 sa-in 25 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.26.1 p2p
exec ipsec sa add 100026 spi 200026 crypto-alg aes-gcm-128 crypto-key 5241454572504f54674d737049416f45 esp
exec ipsec sa add 26 spi 100026 crypto-alg aes-gcm-128 crypto-key 5241454572504f54674d737049416f45 esp
exec ipsec tunnel protect ipip26 sa-out 100026 sa-in 26 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.27.1 p2p
exec ipsec sa add 100027 spi 200027 crypto-alg aes-gcm-128 crypto-key 4a48746b7678506e53597046666f5356 esp
exec ipsec sa add 27 spi 100027 crypto-alg aes-gcm-128 crypto-key 4a48746b7678506e53597046666f5356 esp
exec ipsec tunnel protect ipip27 sa-out 100027 sa-in 27 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.28.1 p2p
exec ipsec sa add 100028 spi 200028 crypto-alg aes-gcm-128 crypto-key 4852467865734565464f655963486356 esp
exec ipsec sa add 28 spi 100028 crypto-alg aes-gcm-128 crypto-key 4852467865734565464f655963486356 esp
exec ipsec tunnel protect ipip28 sa-out 100028 sa-in 28 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.29.1 p2p
exec ipsec sa add 100029 spi 200029 crypto-alg aes-gcm-128 crypto-key 6249434b655a6a5152736f68634e766d esp
exec ipsec sa add 29 spi 100029 crypto-alg aes-gcm-128 crypto-key 6249434b655a6a5152736f68634e766d esp
exec ipsec tunnel protect ipip29 sa-out 100029 sa-in 29 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.30.1 p2p
exec ipsec sa add 100030 spi 200030 crypto-alg aes-gcm-128 crypto-key 7364655275734271455a665345556d62 esp
exec ipsec sa add 30 spi 100030 crypto-alg aes-gcm-128 crypto-key 7364655275734271455a665345556d62 esp
exec ipsec tunnel protect ipip30 sa-out 100030 sa-in 30 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.31.1 p2p
exec ipsec sa add 100031 spi 200031 crypto-alg aes-gcm-128 crypto-key 7855444a654e6876426a44654c556141 esp
exec ipsec sa add 31 spi 100031 crypto-alg aes-gcm-128 crypto-key 7855444a654e6876426a44654c556141 esp
exec ipsec tunnel protect ipip31 sa-out 100031 sa-in 31 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.32.1 p2p
exec ipsec sa add 100032 spi 200032 crypto-alg aes-gcm-128 crypto-key 764d726253684947416d496143564650 esp
exec ipsec sa add 32 spi 100032 crypto-alg aes-gcm-128 crypto-key 764d726253684947416d496143564650 esp
exec ipsec tunnel protect ipip32 sa-out 100032 sa-in 32 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.33.1 p2p
exec ipsec sa add 100033 spi 200033 crypto-alg aes-gcm-128 crypto-key 66416b466a4a4a4d5053755978556b5a esp
exec ipsec sa add 33 spi 100033 crypto-alg aes-gcm-128 crypto-key 66416b466a4a4a4d5053755978556b5a esp
exec ipsec tunnel protect ipip33 sa-out 100033 sa-in 33 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.34.1 p2p
exec ipsec sa add 100034 spi 200034 crypto-alg aes-gcm-128 crypto-key 53435a465a5847664872714570665742 esp
exec ipsec sa add 34 spi 100034 crypto-alg aes-gcm-128 crypto-key 53435a465a5847664872714570665742 esp
exec ipsec tunnel protect ipip34 sa-out 100034 sa-in 34 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.35.1 p2p
exec ipsec sa add 100035 spi 200035 crypto-alg aes-gcm-128 crypto-key 4a645a494a42527562446659626c5572 esp
exec ipsec sa add 35 spi 100035 crypto-alg aes-gcm-128 crypto-key 4a645a494a42527562446659626c5572 esp
exec ipsec tunnel protect ipip35 sa-out 100035 sa-in 35 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.36.1 p2p
exec ipsec sa add 100036 spi 200036 crypto-alg aes-gcm-128 crypto-key 6f5269434e496643524457566d62686d esp
exec ipsec sa add 36 spi 100036 crypto-alg aes-gcm-128 crypto-key 6f5269434e496643524457566d62686d esp
exec ipsec tunnel protect ipip36 sa-out 100036 sa-in 36 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.37.1 p2p
exec ipsec sa add 100037 spi 200037 crypto-alg aes-gcm-128 crypto-key 4d536f7344486f48436d4b7064626b58 esp
exec ipsec sa add 37 spi 100037 crypto-alg aes-gcm-128 crypto-key 4d536f7344486f48436d4b7064626b58 esp
exec ipsec tunnel protect ipip37 sa-out 100037 sa-in 37 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.38.1 p2p
exec ipsec sa add 100038 spi 200038 crypto-alg aes-gcm-128 crypto-key 424a536f43675a514b4d776e53467553 esp
exec ipsec sa add 38 spi 100038 crypto-alg aes-gcm-128 crypto-key 424a536f43675a514b4d776e53467553 esp
exec ipsec tunnel protect ipip38 sa-out 100038 sa-in 38 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.39.1 p2p
exec ipsec sa add 100039 spi 200039 crypto-alg aes-gcm-128 crypto-key 69534564476842536345616847616962 esp
exec ipsec sa add 39 spi 100039 crypto-alg aes-gcm-128 crypto-key 69534564476842536345616847616962 esp
exec ipsec tunnel protect ipip39 sa-out 100039 sa-in 39 add
exec ip route add 100.0.0.1/8 via 200.0.0.101 TenGigabitEthernet8/0/0
exec set interface unnumbered ipip0 use TenGigabitEthernet8/0/0
exec set interface state ipip0 up
exec ip route add 10.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use TenGigabitEthernet8/0/0
exec set interface state ipip1 up
exec ip route add 10.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use TenGigabitEthernet8/0/0
exec set interface state ipip2 up
exec ip route add 10.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use TenGigabitEthernet8/0/0
exec set interface state ipip3 up
exec ip route add 10.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use TenGigabitEthernet8/0/0
exec set interface state ipip4 up
exec ip route add 10.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use TenGigabitEthernet8/0/0
exec set interface state ipip5 up
exec ip route add 10.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use TenGigabitEthernet8/0/0
exec set interface state ipip6 up
exec ip route add 10.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use TenGigabitEthernet8/0/0
exec set interface state ipip7 up
exec ip route add 10.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use TenGigabitEthernet8/0/0
exec set interface state ipip8 up
exec ip route add 10.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use TenGigabitEthernet8/0/0
exec set interface state ipip9 up
exec ip route add 10.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use TenGigabitEthernet8/0/0
exec set interface state ipip10 up
exec ip route add 10.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use TenGigabitEthernet8/0/0
exec set interface state ipip11 up
exec ip route add 10.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use TenGigabitEthernet8/0/0
exec set interface state ipip12 up
exec ip route add 10.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use TenGigabitEthernet8/0/0
exec set interface state ipip13 up
exec ip route add 10.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use TenGigabitEthernet8/0/0
exec set interface state ipip14 up
exec ip route add 10.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use TenGigabitEthernet8/0/0
exec set interface state ipip15 up
exec ip route add 10.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use TenGigabitEthernet8/0/0
exec set interface state ipip16 up
exec ip route add 10.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use TenGigabitEthernet8/0/0
exec set interface state ipip17 up
exec ip route add 10.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use TenGigabitEthernet8/0/0
exec set interface state ipip18 up
exec ip route add 10.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use TenGigabitEthernet8/0/0
exec set interface state ipip19 up
exec ip route add 10.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use TenGigabitEthernet8/0/0
exec set interface state ipip20 up
exec ip route add 10.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use TenGigabitEthernet8/0/0
exec set interface state ipip21 up
exec ip route add 10.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use TenGigabitEthernet8/0/0
exec set interface state ipip22 up
exec ip route add 10.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use TenGigabitEthernet8/0/0
exec set interface state ipip23 up
exec ip route add 10.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use TenGigabitEthernet8/0/0
exec set interface state ipip24 up
exec ip route add 10.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use TenGigabitEthernet8/0/0
exec set interface state ipip25 up
exec ip route add 10.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use TenGigabitEthernet8/0/0
exec set interface state ipip26 up
exec ip route add 10.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use TenGigabitEthernet8/0/0
exec set interface state ipip27 up
exec ip route add 10.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use TenGigabitEthernet8/0/0
exec set interface state ipip28 up
exec ip route add 10.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use TenGigabitEthernet8/0/0
exec set interface state ipip29 up
exec ip route add 10.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use TenGigabitEthernet8/0/0
exec set interface state ipip30 up
exec ip route add 10.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use TenGigabitEthernet8/0/0
exec set interface state ipip31 up
exec ip route add 10.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use TenGigabitEthernet8/0/0
exec set interface state ipip32 up
exec ip route add 10.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use TenGigabitEthernet8/0/0
exec set interface state ipip33 up
exec ip route add 10.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use TenGigabitEthernet8/0/0
exec set interface state ipip34 up
exec ip route add 10.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use TenGigabitEthernet8/0/0
exec set interface state ipip35 up
exec ip route add 10.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use TenGigabitEthernet8/0/0
exec set interface state ipip36 up
exec ip route add 10.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use TenGigabitEthernet8/0/0
exec set interface state ipip37 up
exec ip route add 10.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use TenGigabitEthernet8/0/0
exec set interface state ipip38 up
exec ip route add 10.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use TenGigabitEthernet8/0/0
exec set interface state ipip39 up
exec ip route add 10.0.0.39/32 via ipip39

 imix-4t4c-ethip4ipsec40tnlsw- 
ip4base-int-aes128gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec create loopback interface
exec set interface state loop0 up
exec set interface ip address TenGigabitEthernet8/0/0 200.0.0.101/24
exec set ip neighbor TenGigabitEthernet8/0/0 200.0.0.102 ac:1f:6b:57:57:fe static
exec set interface ip address loop0 100.0.0.1/32
exec create ipip tunnel src 100.0.0.1 dst 200.0.0.102 p2p
exec ipsec sa add 0 spi 100000 crypto-alg aes-gcm-128 crypto-key 566461664844574e62516641716c6d62 esp
exec ipsec sa add 100000 spi 200000 crypto-alg aes-gcm-128 crypto-key 566461664844574e62516641716c6d62 esp
exec ipsec tunnel protect ipip0 sa-out 0 sa-in 100000 add
exec set interface ip address loop0 100.0.1.1/32
exec create ipip tunnel src 100.0.1.1 dst 200.0.0.102 p2p
exec ipsec sa add 1 spi 100001 crypto-alg aes-gcm-128 crypto-key 41747378784b5345414c716e6b616477 esp
exec ipsec sa add 100001 spi 200001 crypto-alg aes-gcm-128 crypto-key 41747378784b5345414c716e6b616477 esp
exec ipsec tunnel protect ipip1 sa-out 1 sa-in 100001 add
exec set interface ip address loop0 100.0.2.1/32
exec create ipip tunnel src 100.0.2.1 dst 200.0.0.102 p2p
exec ipsec sa add 2 spi 100002 crypto-alg aes-gcm-128 crypto-key 6e41437351616166576a786a5556766e esp
exec ipsec sa add 100002 spi 200002 crypto-alg aes-gcm-128 crypto-key 6e41437351616166576a786a5556766e esp
exec ipsec tunnel protect ipip2 sa-out 2 sa-in 100002 add
exec set interface ip address loop0 100.0.3.1/32
exec create ipip tunnel src 100.0.3.1 dst 200.0.0.102 p2p
exec ipsec sa add 3 spi 100003 crypto-alg aes-gcm-128 crypto-key 6b6d674952536b577767566771755853 esp
exec ipsec sa add 100003 spi 200003 crypto-alg aes-gcm-128 crypto-key 6b6d674952536b577767566771755853 esp
exec ipsec tunnel protect ipip3 sa-out 3 sa-in 100003 add
exec set interface ip address loop0 100.0.4.1/32
exec create ipip tunnel src 100.0.4.1 dst 200.0.0.102 p2p
exec ipsec sa add 4 spi 100004 crypto-alg aes-gcm-128 crypto-key 47716f704849445a524f784c64444555 esp
exec ipsec sa add 100004 spi 200004 crypto-alg aes-gcm-128 crypto-key 47716f704849445a524f784c64444555 esp
exec ipsec tunnel protect ipip4 sa-out 4 sa-in 100004 add
exec set interface ip address loop0 100.0.5.1/32
exec create ipip tunnel src 100.0.5.1 dst 200.0.0.102 p2p
exec ipsec sa add 5 spi 100005 crypto-alg aes-gcm-128 crypto-key 4d47787446424354494b4f53746e6152 esp
exec ipsec sa add 100005 spi 200005 crypto-alg aes-gcm-128 crypto-key 4d47787446424354494b4f53746e6152 esp
exec ipsec tunnel protect ipip5 sa-out 5 sa-in 100005 add
exec set interface ip address loop0 100.0.6.1/32
exec create ipip tunnel src 100.0.6.1 dst 200.0.0.102 p2p
exec ipsec sa add 6 spi 100006 crypto-alg aes-gcm-128 crypto-key 4d4a484c514d4e4259774c7161466168 esp
exec ipsec sa add 100006 spi 200006 crypto-alg aes-gcm-128 crypto-key 4d4a484c514d4e4259774c7161466168 esp
exec ipsec tunnel protect ipip6 sa-out 6 sa-in 100006 add
exec set interface ip address loop0 100.0.7.1/32
exec create ipip tunnel src 100.0.7.1 dst 200.0.0.102 p2p
exec ipsec sa add 7 spi 100007 crypto-alg aes-gcm-128 crypto-key 766d47445879465567706d4b6250644d esp
exec ipsec sa add 100007 spi 200007 crypto-alg aes-gcm-128 crypto-key 766d47445879465567706d4b6250644d esp
exec ipsec tunnel protect ipip7 sa-out 7 sa-in 100007 add
exec set interface ip address loop0 100.0.8.1/32
exec create ipip tunnel src 100.0.8.1 dst 200.0.0.102 p2p
exec ipsec sa add 8 spi 100008 crypto-alg aes-gcm-128 crypto-key 434571676473797345557652614f4c64 esp
exec ipsec sa add 100008 spi 200008 crypto-alg aes-gcm-128 crypto-key 434571676473797345557652614f4c64 esp
exec ipsec tunnel protect ipip8 sa-out 8 sa-in 100008 add
exec set interface ip address loop0 100.0.9.1/32
exec create ipip tunnel src 100.0.9.1 dst 200.0.0.102 p2p
exec ipsec sa add 9 spi 100009 crypto-alg aes-gcm-128 crypto-key 455161475454457a6172494e5a504b4d esp
exec ipsec sa add 100009 spi 200009 crypto-alg aes-gcm-128 crypto-key 455161475454457a6172494e5a504b4d esp
exec ipsec tunnel protect ipip9 sa-out 9 sa-in 100009 add
exec set interface ip address loop0 100.0.10.1/32
exec create ipip tunnel src 100.0.10.1 dst 200.0.0.102 p2p
exec ipsec sa add 10 spi 100010 crypto-alg aes-gcm-128 crypto-key 70625a4e69704b4e6f45627946497a45 esp
exec ipsec sa add 100010 spi 200010 crypto-alg aes-gcm-128 crypto-key 70625a4e69704b4e6f45627946497a45 esp
exec ipsec tunnel protect ipip10 sa-out 10 sa-in 100010 add
exec set interface ip address loop0 100.0.11.1/32
exec create ipip tunnel src 100.0.11.1 dst 200.0.0.102 p2p
exec ipsec sa add 11 spi 100011 crypto-alg aes-gcm-128 crypto-key 6b6c5a446d5a74657152437446694351 esp
exec ipsec sa add 100011 spi 200011 crypto-alg aes-gcm-128 crypto-key 6b6c5a446d5a74657152437446694351 esp
exec ipsec tunnel protect ipip11 sa-out 11 sa-in 100011 add
exec set interface ip address loop0 100.0.12.1/32
exec create ipip tunnel src 100.0.12.1 dst 200.0.0.102 p2p
exec ipsec sa add 12 spi 100012 crypto-alg aes-gcm-128 crypto-key 70705569674a6665777951594b596143 esp
exec ipsec sa add 100012 spi 200012 crypto-alg aes-gcm-128 crypto-key 70705569674a6665777951594b596143 esp
exec ipsec tunnel protect ipip12 sa-out 12 sa-in 100012 add
exec set interface ip address loop0 100.0.13.1/32
exec create ipip tunnel src 100.0.13.1 dst 200.0.0.102 p2p
exec ipsec sa add 13 spi 100013 crypto-alg aes-gcm-128 crypto-key 4b52644443514c6c6d41585461615258 esp
exec ipsec sa add 100013 spi 200013 crypto-alg aes-gcm-128 crypto-key 4b52644443514c6c6d41585461615258 esp
exec ipsec tunnel protect ipip13 sa-out 13 sa-in 100013 add
exec set interface ip address loop0 100.0.14.1/32
exec create ipip tunnel src 100.0.14.1 dst 200.0.0.102 p2p
exec ipsec sa add 14 spi 100014 crypto-alg aes-gcm-128 crypto-key 5a52557a49736d6c79457a4e73415348 esp
exec ipsec sa add 100014 spi 200014 crypto-alg aes-gcm-128 crypto-key 5a52557a49736d6c79457a4e73415348 esp
exec ipsec tunnel protect ipip14 sa-out 14 sa-in 100014 add
exec set interface ip address loop0 100.0.15.1/32
exec create ipip tunnel src 100.0.15.1 dst 200.0.0.102 p2p
exec ipsec sa add 15 spi 100015 crypto-alg aes-gcm-128 crypto-key 506a49466a544a644b6c674a55515563 esp
exec ipsec sa add 100015 spi 200015 crypto-alg aes-gcm-128 crypto-key 506a49466a544a644b6c674a55515563 esp
exec ipsec tunnel protect ipip15 sa-out 15 sa-in 100015 add
exec set interface ip address loop0 100.0.16.1/32
exec create ipip tunnel src 100.0.16.1 dst 200.0.0.102 p2p
exec ipsec sa add 16 spi 100016 crypto-alg aes-gcm-128 crypto-key 475a6b436d4153665141517541434c47 esp
exec ipsec sa add 100016 spi 200016 crypto-alg aes-gcm-128 crypto-key 475a6b436d4153665141517541434c47 esp
exec ipsec tunnel protect ipip16 sa-out 16 sa-in 100016 add
exec set interface ip address loop0 100.0.17.1/32
exec create ipip tunnel src 100.0.17.1 dst 200.0.0.102 p2p
exec ipsec sa add 17 spi 100017 crypto-alg aes-gcm-128 crypto-key 534c4d4a6b546c434261576365595075 esp
exec ipsec sa add 100017 spi 200017 crypto-alg aes-gcm-128 crypto-key 534c4d4a6b546c434261576365595075 esp
exec ipsec tunnel protect ipip17 sa-out 17 sa-in 100017 add
exec set interface ip address loop0 100.0.18.1/32
exec create ipip tunnel src 100.0.18.1 dst 200.0.0.102 p2p
exec ipsec sa add 18 spi 100018 crypto-alg aes-gcm-128 crypto-key 654f414e416253644a704e7a71615871 esp
exec ipsec sa add 100018 spi 200018 crypto-alg aes-gcm-128 crypto-key 654f414e416253644a704e7a71615871 esp
exec ipsec tunnel protect ipip18 sa-out 18 sa-in 100018 add
exec set interface ip address loop0 100.0.19.1/32
exec create ipip tunnel src 100.0.19.1 dst 200.0.0.102 p2p
exec ipsec sa add 19 spi 100019 crypto-alg aes-gcm-128 crypto-key 424e44575275785a6f65454e4b4b4d4d esp
exec ipsec sa add 100019 spi 200019 crypto-alg aes-gcm-128 crypto-key 424e44575275785a6f65454e4b4b4d4d esp
exec ipsec tunnel protect ipip19 sa-out 19 sa-in 100019 add
exec set interface ip address loop0 100.0.20.1/32
exec create ipip tunnel src 100.0.20.1 dst 200.0.0.102 p2p
exec ipsec sa add 20 spi 100020 crypto-alg aes-gcm-128 crypto-key 634c6e42626d734b734e4a5a58726978 esp
exec ipsec sa add 100020 spi 200020 crypto-alg aes-gcm-128 crypto-key 634c6e42626d734b734e4a5a58726978 esp
exec ipsec tunnel protect ipip20 sa-out 20 sa-in 100020 add
exec set interface ip address loop0 100.0.21.1/32
exec create ipip tunnel src 100.0.21.1 dst 200.0.0.102 p2p
exec ipsec sa add 21 spi 100021 crypto-alg aes-gcm-128 crypto-key 696d5857636249455257527177627770 esp
exec ipsec sa add 100021 spi 200021 crypto-alg aes-gcm-128 crypto-key 696d5857636249455257527177627770 esp
exec ipsec tunnel protect ipip21 sa-out 21 sa-in 100021 add
exec set interface ip address loop0 100.0.22.1/32
exec create ipip tunnel src 100.0.22.1 dst 200.0.0.102 p2p
exec ipsec sa add 22 spi 100022 crypto-alg aes-gcm-128 crypto-key 4456536e4c5679616c43624e4a5a705a esp
exec ipsec sa add 100022 spi 200022 crypto-alg aes-gcm-128 crypto-key 4456536e4c5679616c43624e4a5a705a esp
exec ipsec tunnel protect ipip22 sa-out 22 sa-in 100022 add
exec set interface ip address loop0 100.0.23.1/32
exec create ipip tunnel src 100.0.23.1 dst 200.0.0.102 p2p
exec ipsec sa add 23 spi 100023 crypto-alg aes-gcm-128 crypto-key 676a57664175794575686272666e654c esp
exec ipsec sa add 100023 spi 200023 crypto-alg aes-gcm-128 crypto-key 676a57664175794575686272666e654c esp
exec ipsec tunnel protect ipip23 sa-out 23 sa-in 100023 add
exec set interface ip address loop0 100.0.24.1/32
exec create ipip tunnel src 100.0.24.1 dst 200.0.0.102 p2p
exec ipsec sa add 24 spi 100024 crypto-alg aes-gcm-128 crypto-key 514f4155494f48714f714171666c466d esp
exec ipsec sa add 100024 spi 200024 crypto-alg aes-gcm-128 crypto-key 514f4155494f48714f714171666c466d esp
exec ipsec tunnel protect ipip24 sa-out 24 sa-in 100024 add
exec set interface ip address loop0 100.0.25.1/32
exec create ipip tunnel src 100.0.25.1 dst 200.0.0.102 p2p
exec ipsec sa add 25 spi 100025 crypto-alg aes-gcm-128 crypto-key 67565675706d4952496c45496c545272 esp
exec ipsec sa add 100025 spi 200025 crypto-alg aes-gcm-128 crypto-key 67565675706d4952496c45496c545272 esp
exec ipsec tunnel protect ipip25 sa-out 25 sa-in 100025 add
exec set interface ip address loop0 100.0.26.1/32
exec create ipip tunnel src 100.0.26.1 dst 200.0.0.102 p2p
exec ipsec sa add 26 spi 100026 crypto-alg aes-gcm-128 crypto-key 6b4c68754c4d73417479766d43615053 esp
exec ipsec sa add 100026 spi 200026 crypto-alg aes-gcm-128 crypto-key 6b4c68754c4d73417479766d43615053 esp
exec ipsec tunnel protect ipip26 sa-out 26 sa-in 100026 add
exec set interface ip address loop0 100.0.27.1/32
exec create ipip tunnel src 100.0.27.1 dst 200.0.0.102 p2p
exec ipsec sa add 27 spi 100027 crypto-alg aes-gcm-128 crypto-key 53715066536370526645637745644a6c esp
exec ipsec sa add 100027 spi 200027 crypto-alg aes-gcm-128 crypto-key 53715066536370526645637745644a6c esp
exec ipsec tunnel protect ipip27 sa-out 27 sa-in 100027 add
exec set interface ip address loop0 100.0.28.1/32
exec create ipip tunnel src 100.0.28.1 dst 200.0.0.102 p2p
exec ipsec sa add 28 spi 100028 crypto-alg aes-gcm-128 crypto-key 6c5357756668655a484274674759727a esp
exec ipsec sa add 100028 spi 200028 crypto-alg aes-gcm-128 crypto-key 6c5357756668655a484274674759727a esp
exec ipsec tunnel protect ipip28 sa-out 28 sa-in 100028 add
exec set interface ip address loop0 100.0.29.1/32
exec create ipip tunnel src 100.0.29.1 dst 200.0.0.102 p2p
exec ipsec sa add 29 spi 100029 crypto-alg aes-gcm-128 crypto-key 6f556642624c68724a6e487262657342 esp
exec ipsec sa add 100029 spi 200029 crypto-alg aes-gcm-128 crypto-key 6f556642624c68724a6e487262657342 esp
exec ipsec tunnel protect ipip29 sa-out 29 sa-in 100029 add
exec set interface ip address loop0 100.0.30.1/32
exec create ipip tunnel src 100.0.30.1 dst 200.0.0.102 p2p
exec ipsec sa add 30 spi 100030 crypto-alg aes-gcm-128 crypto-key 44656b78627071654775427450417073 esp
exec ipsec sa add 100030 spi 200030 crypto-alg aes-gcm-128 crypto-key 44656b78627071654775427450417073 esp
exec ipsec tunnel protect ipip30 sa-out 30 sa-in 100030 add
exec set interface ip address loop0 100.0.31.1/32
exec create ipip tunnel src 100.0.31.1 dst 200.0.0.102 p2p
exec ipsec sa add 31 spi 100031 crypto-alg aes-gcm-128 crypto-key 64624d4e6a564e4867567a684d546851 esp
exec ipsec sa add 100031 spi 200031 crypto-alg aes-gcm-128 crypto-key 64624d4e6a564e4867567a684d546851 esp
exec ipsec tunnel protect ipip31 sa-out 31 sa-in 100031 add
exec set interface ip address loop0 100.0.32.1/32
exec create ipip tunnel src 100.0.32.1 dst 200.0.0.102 p2p
exec ipsec sa add 32 spi 100032 crypto-alg aes-gcm-128 crypto-key 637a584e7667434a6e69714b6c7a6f78 esp
exec ipsec sa add 100032 spi 200032 crypto-alg aes-gcm-128 crypto-key 637a584e7667434a6e69714b6c7a6f78 esp
exec ipsec tunnel protect ipip32 sa-out 32 sa-in 100032 add
exec set interface ip address loop0 100.0.33.1/32
exec create ipip tunnel src 100.0.33.1 dst 200.0.0.102 p2p
exec ipsec sa add 33 spi 100033 crypto-alg aes-gcm-128 crypto-key 705751575a676a436b664776567a5954 esp
exec ipsec sa add 100033 spi 200033 crypto-alg aes-gcm-128 crypto-key 705751575a676a436b664776567a5954 esp
exec ipsec tunnel protect ipip33 sa-out 33 sa-in 100033 add
exec set interface ip address loop0 100.0.34.1/32
exec create ipip tunnel src 100.0.34.1 dst 200.0.0.102 p2p
exec ipsec sa add 34 spi 100034 crypto-alg aes-gcm-128 crypto-key 6366765245767a69587763484f7a6457 esp
exec ipsec sa add 100034 spi 200034 crypto-alg aes-gcm-128 crypto-key 6366765245767a69587763484f7a6457 esp
exec ipsec tunnel protect ipip34 sa-out 34 sa-in 100034 add
exec set interface ip address loop0 100.0.35.1/32
exec create ipip tunnel src 100.0.35.1 dst 200.0.0.102 p2p
exec ipsec sa add 35 spi 100035 crypto-alg aes-gcm-128 crypto-key 574649565263595a7a64747a676d554f esp
exec ipsec sa add 100035 spi 200035 crypto-alg aes-gcm-128 crypto-key 574649565263595a7a64747a676d554f esp
exec ipsec tunnel protect ipip35 sa-out 35 sa-in 100035 add
exec set interface ip address loop0 100.0.36.1/32
exec create ipip tunnel src 100.0.36.1 dst 200.0.0.102 p2p
exec ipsec sa add 36 spi 100036 crypto-alg aes-gcm-128 crypto-key 6b754c6a6d7750705a506b6778614150 esp
exec ipsec sa add 100036 spi 200036 crypto-alg aes-gcm-128 crypto-key 6b754c6a6d7750705a506b6778614150 esp
exec ipsec tunnel protect ipip36 sa-out 36 sa-in 100036 add
exec set interface ip address loop0 100.0.37.1/32
exec create ipip tunnel src 100.0.37.1 dst 200.0.0.102 p2p
exec ipsec sa add 37 spi 100037 crypto-alg aes-gcm-128 crypto-key 595870694b575043697344716c774c48 esp
exec ipsec sa add 100037 spi 200037 crypto-alg aes-gcm-128 crypto-key 595870694b575043697344716c774c48 esp
exec ipsec tunnel protect ipip37 sa-out 37 sa-in 100037 add
exec set interface ip address loop0 100.0.38.1/32
exec create ipip tunnel src 100.0.38.1 dst 200.0.0.102 p2p
exec ipsec sa add 38 spi 100038 crypto-alg aes-gcm-128 crypto-key 737a6f6e425a694861434b544a50784f esp
exec ipsec sa add 100038 spi 200038 crypto-alg aes-gcm-128 crypto-key 737a6f6e425a694861434b544a50784f esp
exec ipsec tunnel protect ipip38 sa-out 38 sa-in 100038 add
exec set interface ip address loop0 100.0.39.1/32
exec create ipip tunnel src 100.0.39.1 dst 200.0.0.102 p2p
exec ipsec sa add 39 spi 100039 crypto-alg aes-gcm-128 crypto-key 6b5a454e4f626547496f4b4279674375 esp
exec ipsec sa add 100039 spi 200039 crypto-alg aes-gcm-128 crypto-key 6b5a454e4f626547496f4b4279674375 esp
exec ipsec tunnel protect ipip39 sa-out 39 sa-in 100039 add
exec set interface unnumbered ipip0 use TenGigabitEthernet8/0/0
exec set interface state ipip0 up
exec ip route add 20.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use TenGigabitEthernet8/0/0
exec set interface state ipip1 up
exec ip route add 20.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use TenGigabitEthernet8/0/0
exec set interface state ipip2 up
exec ip route add 20.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use TenGigabitEthernet8/0/0
exec set interface state ipip3 up
exec ip route add 20.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use TenGigabitEthernet8/0/0
exec set interface state ipip4 up
exec ip route add 20.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use TenGigabitEthernet8/0/0
exec set interface state ipip5 up
exec ip route add 20.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use TenGigabitEthernet8/0/0
exec set interface state ipip6 up
exec ip route add 20.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use TenGigabitEthernet8/0/0
exec set interface state ipip7 up
exec ip route add 20.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use TenGigabitEthernet8/0/0
exec set interface state ipip8 up
exec ip route add 20.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use TenGigabitEthernet8/0/0
exec set interface state ipip9 up
exec ip route add 20.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use TenGigabitEthernet8/0/0
exec set interface state ipip10 up
exec ip route add 20.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use TenGigabitEthernet8/0/0
exec set interface state ipip11 up
exec ip route add 20.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use TenGigabitEthernet8/0/0
exec set interface state ipip12 up
exec ip route add 20.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use TenGigabitEthernet8/0/0
exec set interface state ipip13 up
exec ip route add 20.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use TenGigabitEthernet8/0/0
exec set interface state ipip14 up
exec ip route add 20.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use TenGigabitEthernet8/0/0
exec set interface state ipip15 up
exec ip route add 20.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use TenGigabitEthernet8/0/0
exec set interface state ipip16 up
exec ip route add 20.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use TenGigabitEthernet8/0/0
exec set interface state ipip17 up
exec ip route add 20.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use TenGigabitEthernet8/0/0
exec set interface state ipip18 up
exec ip route add 20.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use TenGigabitEthernet8/0/0
exec set interface state ipip19 up
exec ip route add 20.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use TenGigabitEthernet8/0/0
exec set interface state ipip20 up
exec ip route add 20.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use TenGigabitEthernet8/0/0
exec set interface state ipip21 up
exec ip route add 20.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use TenGigabitEthernet8/0/0
exec set interface state ipip22 up
exec ip route add 20.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use TenGigabitEthernet8/0/0
exec set interface state ipip23 up
exec ip route add 20.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use TenGigabitEthernet8/0/0
exec set interface state ipip24 up
exec ip route add 20.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use TenGigabitEthernet8/0/0
exec set interface state ipip25 up
exec ip route add 20.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use TenGigabitEthernet8/0/0
exec set interface state ipip26 up
exec ip route add 20.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use TenGigabitEthernet8/0/0
exec set interface state ipip27 up
exec ip route add 20.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use TenGigabitEthernet8/0/0
exec set interface state ipip28 up
exec ip route add 20.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use TenGigabitEthernet8/0/0
exec set interface state ipip29 up
exec ip route add 20.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use TenGigabitEthernet8/0/0
exec set interface state ipip30 up
exec ip route add 20.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use TenGigabitEthernet8/0/0
exec set interface state ipip31 up
exec ip route add 20.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use TenGigabitEthernet8/0/0
exec set interface state ipip32 up
exec ip route add 20.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use TenGigabitEthernet8/0/0
exec set interface state ipip33 up
exec ip route add 20.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use TenGigabitEthernet8/0/0
exec set interface state ipip34 up
exec ip route add 20.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use TenGigabitEthernet8/0/0
exec set interface state ipip35 up
exec ip route add 20.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use TenGigabitEthernet8/0/0
exec set interface state ipip36 up
exec ip route add 20.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use TenGigabitEthernet8/0/0
exec set interface state ipip37 up
exec ip route add 20.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use TenGigabitEthernet8/0/0
exec set interface state ipip38 up
exec ip route add 20.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use TenGigabitEthernet8/0/0
exec set interface state ipip39 up
exec ip route add 20.0.0.39/32 via ipip39
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec set interface ip address TenGigabitEthernet8/0/0 200.0.0.102/24.0
exec create ipip tunnel src 200.0.0.102 dst 100.0.0.1 p2p
exec ipsec sa add 100000 spi 200000 crypto-alg aes-gcm-128 crypto-key 566461664844574e62516641716c6d62 esp
exec ipsec sa add 0 spi 100000 crypto-alg aes-gcm-128 crypto-key 566461664844574e62516641716c6d62 esp
exec ipsec tunnel protect ipip0 sa-out 100000 sa-in 0 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.1.1 p2p
exec ipsec sa add 100001 spi 200001 crypto-alg aes-gcm-128 crypto-key 41747378784b5345414c716e6b616477 esp
exec ipsec sa add 1 spi 100001 crypto-alg aes-gcm-128 crypto-key 41747378784b5345414c716e6b616477 esp
exec ipsec tunnel protect ipip1 sa-out 100001 sa-in 1 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.2.1 p2p
exec ipsec sa add 100002 spi 200002 crypto-alg aes-gcm-128 crypto-key 6e41437351616166576a786a5556766e esp
exec ipsec sa add 2 spi 100002 crypto-alg aes-gcm-128 crypto-key 6e41437351616166576a786a5556766e esp
exec ipsec tunnel protect ipip2 sa-out 100002 sa-in 2 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.3.1 p2p
exec ipsec sa add 100003 spi 200003 crypto-alg aes-gcm-128 crypto-key 6b6d674952536b577767566771755853 esp
exec ipsec sa add 3 spi 100003 crypto-alg aes-gcm-128 crypto-key 6b6d674952536b577767566771755853 esp
exec ipsec tunnel protect ipip3 sa-out 100003 sa-in 3 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.4.1 p2p
exec ipsec sa add 100004 spi 200004 crypto-alg aes-gcm-128 crypto-key 47716f704849445a524f784c64444555 esp
exec ipsec sa add 4 spi 100004 crypto-alg aes-gcm-128 crypto-key 47716f704849445a524f784c64444555 esp
exec ipsec tunnel protect ipip4 sa-out 100004 sa-in 4 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.5.1 p2p
exec ipsec sa add 100005 spi 200005 crypto-alg aes-gcm-128 crypto-key 4d47787446424354494b4f53746e6152 esp
exec ipsec sa add 5 spi 100005 crypto-alg aes-gcm-128 crypto-key 4d47787446424354494b4f53746e6152 esp
exec ipsec tunnel protect ipip5 sa-out 100005 sa-in 5 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.6.1 p2p
exec ipsec sa add 100006 spi 200006 crypto-alg aes-gcm-128 crypto-key 4d4a484c514d4e4259774c7161466168 esp
exec ipsec sa add 6 spi 100006 crypto-alg aes-gcm-128 crypto-key 4d4a484c514d4e4259774c7161466168 esp
exec ipsec tunnel protect ipip6 sa-out 100006 sa-in 6 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.7.1 p2p
exec ipsec sa add 100007 spi 200007 crypto-alg aes-gcm-128 crypto-key 766d47445879465567706d4b6250644d esp
exec ipsec sa add 7 spi 100007 crypto-alg aes-gcm-128 crypto-key 766d47445879465567706d4b6250644d esp
exec ipsec tunnel protect ipip7 sa-out 100007 sa-in 7 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.8.1 p2p
exec ipsec sa add 100008 spi 200008 crypto-alg aes-gcm-128 crypto-key 434571676473797345557652614f4c64 esp
exec ipsec sa add 8 spi 100008 crypto-alg aes-gcm-128 crypto-key 434571676473797345557652614f4c64 esp
exec ipsec tunnel protect ipip8 sa-out 100008 sa-in 8 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.9.1 p2p
exec ipsec sa add 100009 spi 200009 crypto-alg aes-gcm-128 crypto-key 455161475454457a6172494e5a504b4d esp
exec ipsec sa add 9 spi 100009 crypto-alg aes-gcm-128 crypto-key 455161475454457a6172494e5a504b4d esp
exec ipsec tunnel protect ipip9 sa-out 100009 sa-in 9 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.10.1 p2p
exec ipsec sa add 100010 spi 200010 crypto-alg aes-gcm-128 crypto-key 70625a4e69704b4e6f45627946497a45 esp
exec ipsec sa add 10 spi 100010 crypto-alg aes-gcm-128 crypto-key 70625a4e69704b4e6f45627946497a45 esp
exec ipsec tunnel protect ipip10 sa-out 100010 sa-in 10 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.11.1 p2p
exec ipsec sa add 100011 spi 200011 crypto-alg aes-gcm-128 crypto-key 6b6c5a446d5a74657152437446694351 esp
exec ipsec sa add 11 spi 100011 crypto-alg aes-gcm-128 crypto-key 6b6c5a446d5a74657152437446694351 esp
exec ipsec tunnel protect ipip11 sa-out 100011 sa-in 11 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.12.1 p2p
exec ipsec sa add 100012 spi 200012 crypto-alg aes-gcm-128 crypto-key 70705569674a6665777951594b596143 esp
exec ipsec sa add 12 spi 100012 crypto-alg aes-gcm-128 crypto-key 70705569674a6665777951594b596143 esp
exec ipsec tunnel protect ipip12 sa-out 100012 sa-in 12 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.13.1 p2p
exec ipsec sa add 100013 spi 200013 crypto-alg aes-gcm-128 crypto-key 4b52644443514c6c6d41585461615258 esp
exec ipsec sa add 13 spi 100013 crypto-alg aes-gcm-128 crypto-key 4b52644443514c6c6d41585461615258 esp
exec ipsec tunnel protect ipip13 sa-out 100013 sa-in 13 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.14.1 p2p
exec ipsec sa add 100014 spi 200014 crypto-alg aes-gcm-128 crypto-key 5a52557a49736d6c79457a4e73415348 esp
exec ipsec sa add 14 spi 100014 crypto-alg aes-gcm-128 crypto-key 5a52557a49736d6c79457a4e73415348 esp
exec ipsec tunnel protect ipip14 sa-out 100014 sa-in 14 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.15.1 p2p
exec ipsec sa add 100015 spi 200015 crypto-alg aes-gcm-128 crypto-key 506a49466a544a644b6c674a55515563 esp
exec ipsec sa add 15 spi 100015 crypto-alg aes-gcm-128 crypto-key 506a49466a544a644b6c674a55515563 esp
exec ipsec tunnel protect ipip15 sa-out 100015 sa-in 15 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.16.1 p2p
exec ipsec sa add 100016 spi 200016 crypto-alg aes-gcm-128 crypto-key 475a6b436d4153665141517541434c47 esp
exec ipsec sa add 16 spi 100016 crypto-alg aes-gcm-128 crypto-key 475a6b436d4153665141517541434c47 esp
exec ipsec tunnel protect ipip16 sa-out 100016 sa-in 16 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.17.1 p2p
exec ipsec sa add 100017 spi 200017 crypto-alg aes-gcm-128 crypto-key 534c4d4a6b546c434261576365595075 esp
exec ipsec sa add 17 spi 100017 crypto-alg aes-gcm-128 crypto-key 534c4d4a6b546c434261576365595075 esp
exec ipsec tunnel protect ipip17 sa-out 100017 sa-in 17 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.18.1 p2p
exec ipsec sa add 100018 spi 200018 crypto-alg aes-gcm-128 crypto-key 654f414e416253644a704e7a71615871 esp
exec ipsec sa add 18 spi 100018 crypto-alg aes-gcm-128 crypto-key 654f414e416253644a704e7a71615871 esp
exec ipsec tunnel protect ipip18 sa-out 100018 sa-in 18 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.19.1 p2p
exec ipsec sa add 100019 spi 200019 crypto-alg aes-gcm-128 crypto-key 424e44575275785a6f65454e4b4b4d4d esp
exec ipsec sa add 19 spi 100019 crypto-alg aes-gcm-128 crypto-key 424e44575275785a6f65454e4b4b4d4d esp
exec ipsec tunnel protect ipip19 sa-out 100019 sa-in 19 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.20.1 p2p
exec ipsec sa add 100020 spi 200020 crypto-alg aes-gcm-128 crypto-key 634c6e42626d734b734e4a5a58726978 esp
exec ipsec sa add 20 spi 100020 crypto-alg aes-gcm-128 crypto-key 634c6e42626d734b734e4a5a58726978 esp
exec ipsec tunnel protect ipip20 sa-out 100020 sa-in 20 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.21.1 p2p
exec ipsec sa add 100021 spi 200021 crypto-alg aes-gcm-128 crypto-key 696d5857636249455257527177627770 esp
exec ipsec sa add 21 spi 100021 crypto-alg aes-gcm-128 crypto-key 696d5857636249455257527177627770 esp
exec ipsec tunnel protect ipip21 sa-out 100021 sa-in 21 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.22.1 p2p
exec ipsec sa add 100022 spi 200022 crypto-alg aes-gcm-128 crypto-key 4456536e4c5679616c43624e4a5a705a esp
exec ipsec sa add 22 spi 100022 crypto-alg aes-gcm-128 crypto-key 4456536e4c5679616c43624e4a5a705a esp
exec ipsec tunnel protect ipip22 sa-out 100022 sa-in 22 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.23.1 p2p
exec ipsec sa add 100023 spi 200023 crypto-alg aes-gcm-128 crypto-key 676a57664175794575686272666e654c esp
exec ipsec sa add 23 spi 100023 crypto-alg aes-gcm-128 crypto-key 676a57664175794575686272666e654c esp
exec ipsec tunnel protect ipip23 sa-out 100023 sa-in 23 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.24.1 p2p
exec ipsec sa add 100024 spi 200024 crypto-alg aes-gcm-128 crypto-key 514f4155494f48714f714171666c466d esp
exec ipsec sa add 24 spi 100024 crypto-alg aes-gcm-128 crypto-key 514f4155494f48714f714171666c466d esp
exec ipsec tunnel protect ipip24 sa-out 100024 sa-in 24 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.25.1 p2p
exec ipsec sa add 100025 spi 200025 crypto-alg aes-gcm-128 crypto-key 67565675706d4952496c45496c545272 esp
exec ipsec sa add 25 spi 100025 crypto-alg aes-gcm-128 crypto-key 67565675706d4952496c45496c545272 esp
exec ipsec tunnel protect ipip25 sa-out 100025 sa-in 25 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.26.1 p2p
exec ipsec sa add 100026 spi 200026 crypto-alg aes-gcm-128 crypto-key 6b4c68754c4d73417479766d43615053 esp
exec ipsec sa add 26 spi 100026 crypto-alg aes-gcm-128 crypto-key 6b4c68754c4d73417479766d43615053 esp
exec ipsec tunnel protect ipip26 sa-out 100026 sa-in 26 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.27.1 p2p
exec ipsec sa add 100027 spi 200027 crypto-alg aes-gcm-128 crypto-key 53715066536370526645637745644a6c esp
exec ipsec sa add 27 spi 100027 crypto-alg aes-gcm-128 crypto-key 53715066536370526645637745644a6c esp
exec ipsec tunnel protect ipip27 sa-out 100027 sa-in 27 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.28.1 p2p
exec ipsec sa add 100028 spi 200028 crypto-alg aes-gcm-128 crypto-key 6c5357756668655a484274674759727a esp
exec ipsec sa add 28 spi 100028 crypto-alg aes-gcm-128 crypto-key 6c5357756668655a484274674759727a esp
exec ipsec tunnel protect ipip28 sa-out 100028 sa-in 28 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.29.1 p2p
exec ipsec sa add 100029 spi 200029 crypto-alg aes-gcm-128 crypto-key 6f556642624c68724a6e487262657342 esp
exec ipsec sa add 29 spi 100029 crypto-alg aes-gcm-128 crypto-key 6f556642624c68724a6e487262657342 esp
exec ipsec tunnel protect ipip29 sa-out 100029 sa-in 29 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.30.1 p2p
exec ipsec sa add 100030 spi 200030 crypto-alg aes-gcm-128 crypto-key 44656b78627071654775427450417073 esp
exec ipsec sa add 30 spi 100030 crypto-alg aes-gcm-128 crypto-key 44656b78627071654775427450417073 esp
exec ipsec tunnel protect ipip30 sa-out 100030 sa-in 30 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.31.1 p2p
exec ipsec sa add 100031 spi 200031 crypto-alg aes-gcm-128 crypto-key 64624d4e6a564e4867567a684d546851 esp
exec ipsec sa add 31 spi 100031 crypto-alg aes-gcm-128 crypto-key 64624d4e6a564e4867567a684d546851 esp
exec ipsec tunnel protect ipip31 sa-out 100031 sa-in 31 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.32.1 p2p
exec ipsec sa add 100032 spi 200032 crypto-alg aes-gcm-128 crypto-key 637a584e7667434a6e69714b6c7a6f78 esp
exec ipsec sa add 32 spi 100032 crypto-alg aes-gcm-128 crypto-key 637a584e7667434a6e69714b6c7a6f78 esp
exec ipsec tunnel protect ipip32 sa-out 100032 sa-in 32 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.33.1 p2p
exec ipsec sa add 100033 spi 200033 crypto-alg aes-gcm-128 crypto-key 705751575a676a436b664776567a5954 esp
exec ipsec sa add 33 spi 100033 crypto-alg aes-gcm-128 crypto-key 705751575a676a436b664776567a5954 esp
exec ipsec tunnel protect ipip33 sa-out 100033 sa-in 33 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.34.1 p2p
exec ipsec sa add 100034 spi 200034 crypto-alg aes-gcm-128 crypto-key 6366765245767a69587763484f7a6457 esp
exec ipsec sa add 34 spi 100034 crypto-alg aes-gcm-128 crypto-key 6366765245767a69587763484f7a6457 esp
exec ipsec tunnel protect ipip34 sa-out 100034 sa-in 34 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.35.1 p2p
exec ipsec sa add 100035 spi 200035 crypto-alg aes-gcm-128 crypto-key 574649565263595a7a64747a676d554f esp
exec ipsec sa add 35 spi 100035 crypto-alg aes-gcm-128 crypto-key 574649565263595a7a64747a676d554f esp
exec ipsec tunnel protect ipip35 sa-out 100035 sa-in 35 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.36.1 p2p
exec ipsec sa add 100036 spi 200036 crypto-alg aes-gcm-128 crypto-key 6b754c6a6d7750705a506b6778614150 esp
exec ipsec sa add 36 spi 100036 crypto-alg aes-gcm-128 crypto-key 6b754c6a6d7750705a506b6778614150 esp
exec ipsec tunnel protect ipip36 sa-out 100036 sa-in 36 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.37.1 p2p
exec ipsec sa add 100037 spi 200037 crypto-alg aes-gcm-128 crypto-key 595870694b575043697344716c774c48 esp
exec ipsec sa add 37 spi 100037 crypto-alg aes-gcm-128 crypto-key 595870694b575043697344716c774c48 esp
exec ipsec tunnel protect ipip37 sa-out 100037 sa-in 37 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.38.1 p2p
exec ipsec sa add 100038 spi 200038 crypto-alg aes-gcm-128 crypto-key 737a6f6e425a694861434b544a50784f esp
exec ipsec sa add 38 spi 100038 crypto-alg aes-gcm-128 crypto-key 737a6f6e425a694861434b544a50784f esp
exec ipsec tunnel protect ipip38 sa-out 100038 sa-in 38 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.39.1 p2p
exec ipsec sa add 100039 spi 200039 crypto-alg aes-gcm-128 crypto-key 6b5a454e4f626547496f4b4279674375 esp
exec ipsec sa add 39 spi 100039 crypto-alg aes-gcm-128 crypto-key 6b5a454e4f626547496f4b4279674375 esp
exec ipsec tunnel protect ipip39 sa-out 100039 sa-in 39 add
exec ip route add 100.0.0.1/8 via 200.0.0.101 TenGigabitEthernet8/0/0
exec set interface unnumbered ipip0 use TenGigabitEthernet8/0/0
exec set interface state ipip0 up
exec ip route add 10.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use TenGigabitEthernet8/0/0
exec set interface state ipip1 up
exec ip route add 10.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use TenGigabitEthernet8/0/0
exec set interface state ipip2 up
exec ip route add 10.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use TenGigabitEthernet8/0/0
exec set interface state ipip3 up
exec ip route add 10.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use TenGigabitEthernet8/0/0
exec set interface state ipip4 up
exec ip route add 10.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use TenGigabitEthernet8/0/0
exec set interface state ipip5 up
exec ip route add 10.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use TenGigabitEthernet8/0/0
exec set interface state ipip6 up
exec ip route add 10.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use TenGigabitEthernet8/0/0
exec set interface state ipip7 up
exec ip route add 10.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use TenGigabitEthernet8/0/0
exec set interface state ipip8 up
exec ip route add 10.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use TenGigabitEthernet8/0/0
exec set interface state ipip9 up
exec ip route add 10.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use TenGigabitEthernet8/0/0
exec set interface state ipip10 up
exec ip route add 10.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use TenGigabitEthernet8/0/0
exec set interface state ipip11 up
exec ip route add 10.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use TenGigabitEthernet8/0/0
exec set interface state ipip12 up
exec ip route add 10.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use TenGigabitEthernet8/0/0
exec set interface state ipip13 up
exec ip route add 10.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use TenGigabitEthernet8/0/0
exec set interface state ipip14 up
exec ip route add 10.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use TenGigabitEthernet8/0/0
exec set interface state ipip15 up
exec ip route add 10.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use TenGigabitEthernet8/0/0
exec set interface state ipip16 up
exec ip route add 10.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use TenGigabitEthernet8/0/0
exec set interface state ipip17 up
exec ip route add 10.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use TenGigabitEthernet8/0/0
exec set interface state ipip18 up
exec ip route add 10.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use TenGigabitEthernet8/0/0
exec set interface state ipip19 up
exec ip route add 10.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use TenGigabitEthernet8/0/0
exec set interface state ipip20 up
exec ip route add 10.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use TenGigabitEthernet8/0/0
exec set interface state ipip21 up
exec ip route add 10.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use TenGigabitEthernet8/0/0
exec set interface state ipip22 up
exec ip route add 10.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use TenGigabitEthernet8/0/0
exec set interface state ipip23 up
exec ip route add 10.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use TenGigabitEthernet8/0/0
exec set interface state ipip24 up
exec ip route add 10.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use TenGigabitEthernet8/0/0
exec set interface state ipip25 up
exec ip route add 10.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use TenGigabitEthernet8/0/0
exec set interface state ipip26 up
exec ip route add 10.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use TenGigabitEthernet8/0/0
exec set interface state ipip27 up
exec ip route add 10.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use TenGigabitEthernet8/0/0
exec set interface state ipip28 up
exec ip route add 10.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use TenGigabitEthernet8/0/0
exec set interface state ipip29 up
exec ip route add 10.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use TenGigabitEthernet8/0/0
exec set interface state ipip30 up
exec ip route add 10.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use TenGigabitEthernet8/0/0
exec set interface state ipip31 up
exec ip route add 10.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use TenGigabitEthernet8/0/0
exec set interface state ipip32 up
exec ip route add 10.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use TenGigabitEthernet8/0/0
exec set interface state ipip33 up
exec ip route add 10.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use TenGigabitEthernet8/0/0
exec set interface state ipip34 up
exec ip route add 10.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use TenGigabitEthernet8/0/0
exec set interface state ipip35 up
exec ip route add 10.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use TenGigabitEthernet8/0/0
exec set interface state ipip36 up
exec ip route add 10.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use TenGigabitEthernet8/0/0
exec set interface state ipip37 up
exec ip route add 10.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use TenGigabitEthernet8/0/0
exec set interface state ipip38 up
exec ip route add 10.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use TenGigabitEthernet8/0/0
exec set interface state ipip39 up
exec ip route add 10.0.0.39/32 via ipip39

10ge2p1x553-ethip4ipsec40tnlsw-ip4base-int-aes256gcm-ndrpdr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular topology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG verification: TG finds and reports throughput NDR (Non Drop Rate) with zero packet loss tolerance and throughput PDR (Partial Drop Rate) with non-zero packet loss tolerance (LT) expressed in percentage of packets transmitted. NDR and PDR are discovered for different Ethernet L2 frame sizes using MLRsearch library.

Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to number of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG node interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 64b-1t1c-ethip4ipsec40tnlsw- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec create loopback interface
exec set interface state loop0 up
exec set interface ip address TenGigabitEthernet8/0/0 200.0.0.101/24
exec set ip neighbor TenGigabitEthernet8/0/0 200.0.0.102 ac:1f:6b:57:57:fe static
exec set interface ip address loop0 100.0.0.1/32
exec create ipip tunnel src 100.0.0.1 dst 200.0.0.102 p2p
exec ipsec sa add 0 spi 100000 crypto-alg aes-gcm-256 crypto-key 62644c64516b4645656b494567794d416d424a724c43596479477a4c434d476f esp
exec ipsec sa add 100000 spi 200000 crypto-alg aes-gcm-256 crypto-key 62644c64516b4645656b494567794d416d424a724c43596479477a4c434d476f esp
exec ipsec tunnel protect ipip0 sa-out 0 sa-in 100000 add
exec set interface ip address loop0 100.0.1.1/32
exec create ipip tunnel src 100.0.1.1 dst 200.0.0.102 p2p
exec ipsec sa add 1 spi 100001 crypto-alg aes-gcm-256 crypto-key 43486a7a49514a4e59537258614d5a4a6b5044706b6f6a544674466d63645772 esp
exec ipsec sa add 100001 spi 200001 crypto-alg aes-gcm-256 crypto-key 43486a7a49514a4e59537258614d5a4a6b5044706b6f6a544674466d63645772 esp
exec ipsec tunnel protect ipip1 sa-out 1 sa-in 100001 add
exec set interface ip address loop0 100.0.2.1/32
exec create ipip tunnel src 100.0.2.1 dst 200.0.0.102 p2p
exec ipsec sa add 2 spi 100002 crypto-alg aes-gcm-256 crypto-key 4d706275586841414c576a50706d43756f54524b6a6b636c7977504e6b55506b esp
exec ipsec sa add 100002 spi 200002 crypto-alg aes-gcm-256 crypto-key 4d706275586841414c576a50706d43756f54524b6a6b636c7977504e6b55506b esp
exec ipsec tunnel protect ipip2 sa-out 2 sa-in 100002 add
exec set interface ip address loop0 100.0.3.1/32
exec create ipip tunnel src 100.0.3.1 dst 200.0.0.102 p2p
exec ipsec sa add 3 spi 100003 crypto-alg aes-gcm-256 crypto-key 576a5a6c4a79576c4e72637458436c6b526f795a636c565575556c5449577248 esp
exec ipsec sa add 100003 spi 200003 crypto-alg aes-gcm-256 crypto-key 576a5a6c4a79576c4e72637458436c6b526f795a636c565575556c5449577248 esp
exec ipsec tunnel protect ipip3 sa-out 3 sa-in 100003 add
exec set interface ip address loop0 100.0.4.1/32
exec create ipip tunnel src 100.0.4.1 dst 200.0.0.102 p2p
exec ipsec sa add 4 spi 100004 crypto-alg aes-gcm-256 crypto-key 637243586155415a6c7a6b4761455a4564676f7979696944735866505849654e esp
exec ipsec sa add 100004 spi 200004 crypto-alg aes-gcm-256 crypto-key 637243586155415a6c7a6b4761455a4564676f7979696944735866505849654e esp
exec ipsec tunnel protect ipip4 sa-out 4 sa-in 100004 add
exec set interface ip address loop0 100.0.5.1/32
exec create ipip tunnel src 100.0.5.1 dst 200.0.0.102 p2p
exec ipsec sa add 5 spi 100005 crypto-alg aes-gcm-256 crypto-key 456a497a6663716a486a53416e5278414e61754e4f77736f47737a415a6e6a49 esp
exec ipsec sa add 100005 spi 200005 crypto-alg aes-gcm-256 crypto-key 456a497a6663716a486a53416e5278414e61754e4f77736f47737a415a6e6a49 esp
exec ipsec tunnel protect ipip5 sa-out 5 sa-in 100005 add
exec set interface ip address loop0 100.0.6.1/32
exec create ipip tunnel src 100.0.6.1 dst 200.0.0.102 p2p
exec ipsec sa add 6 spi 100006 crypto-alg aes-gcm-256 crypto-key 62784f73686d4c476a6d7543514b556b4458557a4e5263527955427257574254 esp
exec ipsec sa add 100006 spi 200006 crypto-alg aes-gcm-256 crypto-key 62784f73686d4c476a6d7543514b556b4458557a4e5263527955427257574254 esp
exec ipsec tunnel protect ipip6 sa-out 6 sa-in 100006 add
exec set interface ip address loop0 100.0.7.1/32
exec create ipip tunnel src 100.0.7.1 dst 200.0.0.102 p2p
exec ipsec sa add 7 spi 100007 crypto-alg aes-gcm-256 crypto-key 577a414149746965656a735545564b4d536275585a6162784c5448497276417a esp
exec ipsec sa add 100007 spi 200007 crypto-alg aes-gcm-256 crypto-key 577a414149746965656a735545564b4d536275585a6162784c5448497276417a esp
exec ipsec tunnel protect ipip7 sa-out 7 sa-in 100007 add
exec set interface ip address loop0 100.0.8.1/32
exec create ipip tunnel src 100.0.8.1 dst 200.0.0.102 p2p
exec ipsec sa add 8 spi 100008 crypto-alg aes-gcm-256 crypto-key 764e5a717244504c6c646b4c496f7874764e6b4551525a6a6961684f704a5242 esp
exec ipsec sa add 100008 spi 200008 crypto-alg aes-gcm-256 crypto-key 764e5a717244504c6c646b4c496f7874764e6b4551525a6a6961684f704a5242 esp
exec ipsec tunnel protect ipip8 sa-out 8 sa-in 100008 add
exec set interface ip address loop0 100.0.9.1/32
exec create ipip tunnel src 100.0.9.1 dst 200.0.0.102 p2p
exec ipsec sa add 9 spi 100009 crypto-alg aes-gcm-256 crypto-key 526a6f77557970744f5365474b6d4a514f6c4b4c436546566e4d6d6f4b584e6e esp
exec ipsec sa add 100009 spi 200009 crypto-alg aes-gcm-256 crypto-key 526a6f77557970744f5365474b6d4a514f6c4b4c436546566e4d6d6f4b584e6e esp
exec ipsec tunnel protect ipip9 sa-out 9 sa-in 100009 add
exec set interface ip address loop0 100.0.10.1/32
exec create ipip tunnel src 100.0.10.1 dst 200.0.0.102 p2p
exec ipsec sa add 10 spi 100010 crypto-alg aes-gcm-256 crypto-key 6f6d58426154746d4353755263666576695257704b4559585163767962414861 esp
exec ipsec sa add 100010 spi 200010 crypto-alg aes-gcm-256 crypto-key 6f6d58426154746d4353755263666576695257704b4559585163767962414861 esp
exec ipsec tunnel protect ipip10 sa-out 10 sa-in 100010 add
exec set interface ip address loop0 100.0.11.1/32
exec create ipip tunnel src 100.0.11.1 dst 200.0.0.102 p2p
exec ipsec sa add 11 spi 100011 crypto-alg aes-gcm-256 crypto-key 53656a78536f6262504946586c67504c7370676e614653556a49637355547662 esp
exec ipsec sa add 100011 spi 200011 crypto-alg aes-gcm-256 crypto-key 53656a78536f6262504946586c67504c7370676e614653556a49637355547662 esp
exec ipsec tunnel protect ipip11 sa-out 11 sa-in 100011 add
exec set interface ip address loop0 100.0.12.1/32
exec create ipip tunnel src 100.0.12.1 dst 200.0.0.102 p2p
exec ipsec sa add 12 spi 100012 crypto-alg aes-gcm-256 crypto-key 4b42744e56766777686a7a7350686e6d4a6e54526873755a6263426a415a744e esp
exec ipsec sa add 100012 spi 200012 crypto-alg aes-gcm-256 crypto-key 4b42744e56766777686a7a7350686e6d4a6e54526873755a6263426a415a744e esp
exec ipsec tunnel protect ipip12 sa-out 12 sa-in 100012 add
exec set interface ip address loop0 100.0.13.1/32
exec create ipip tunnel src 100.0.13.1 dst 200.0.0.102 p2p
exec ipsec sa add 13 spi 100013 crypto-alg aes-gcm-256 crypto-key 4f6a45694b6152574770666e585a72754f7a5058756b796e4c5a77476a584c50 esp
exec ipsec sa add 100013 spi 200013 crypto-alg aes-gcm-256 crypto-key 4f6a45694b6152574770666e585a72754f7a5058756b796e4c5a77476a584c50 esp
exec ipsec tunnel protect ipip13 sa-out 13 sa-in 100013 add
exec set interface ip address loop0 100.0.14.1/32
exec create ipip tunnel src 100.0.14.1 dst 200.0.0.102 p2p
exec ipsec sa add 14 spi 100014 crypto-alg aes-gcm-256 crypto-key 426a456c6b48636d6c674f596a614278464857666267535a504f684f6c687345 esp
exec ipsec sa add 100014 spi 200014 crypto-alg aes-gcm-256 crypto-key 426a456c6b48636d6c674f596a614278464857666267535a504f684f6c687345 esp
exec ipsec tunnel protect ipip14 sa-out 14 sa-in 100014 add
exec set interface ip address loop0 100.0.15.1/32
exec create ipip tunnel src 100.0.15.1 dst 200.0.0.102 p2p
exec ipsec sa add 15 spi 100015 crypto-alg aes-gcm-256 crypto-key 79597044577745727554657a6e427a65666f54426b7462735a56436f78576e49 esp
exec ipsec sa add 100015 spi 200015 crypto-alg aes-gcm-256 crypto-key 79597044577745727554657a6e427a65666f54426b7462735a56436f78576e49 esp
exec ipsec tunnel protect ipip15 sa-out 15 sa-in 100015 add
exec set interface ip address loop0 100.0.16.1/32
exec create ipip tunnel src 100.0.16.1 dst 200.0.0.102 p2p
exec ipsec sa add 16 spi 100016 crypto-alg aes-gcm-256 crypto-key 616b777855514366546f6554706c5545716a7578667376426b7a46475441536d esp
exec ipsec sa add 100016 spi 200016 crypto-alg aes-gcm-256 crypto-key 616b777855514366546f6554706c5545716a7578667376426b7a46475441536d esp
exec ipsec tunnel protect ipip16 sa-out 16 sa-in 100016 add
exec set interface ip address loop0 100.0.17.1/32
exec create ipip tunnel src 100.0.17.1 dst 200.0.0.102 p2p
exec ipsec sa add 17 spi 100017 crypto-alg aes-gcm-256 crypto-key 58787969537a61674f517a4f76566e6e6e747a7371706f4b5a575978454c4d4a esp
exec ipsec sa add 100017 spi 200017 crypto-alg aes-gcm-256 crypto-key 58787969537a61674f517a4f76566e6e6e747a7371706f4b5a575978454c4d4a esp
exec ipsec tunnel protect ipip17 sa-out 17 sa-in 100017 add
exec set interface ip address loop0 100.0.18.1/32
exec create ipip tunnel src 100.0.18.1 dst 200.0.0.102 p2p
exec ipsec sa add 18 spi 100018 crypto-alg aes-gcm-256 crypto-key 534f76584775664c6e6f4d454e68644c6f4a4e4a486b7a49714d516d78785446 esp
exec ipsec sa add 100018 spi 200018 crypto-alg aes-gcm-256 crypto-key 534f76584775664c6e6f4d454e68644c6f4a4e4a486b7a49714d516d78785446 esp
exec ipsec tunnel protect ipip18 sa-out 18 sa-in 100018 add
exec set interface ip address loop0 100.0.19.1/32
exec create ipip tunnel src 100.0.19.1 dst 200.0.0.102 p2p
exec ipsec sa add 19 spi 100019 crypto-alg aes-gcm-256 crypto-key 724a54616f6d4965627477536667516966725277656e646561434b577467766e esp
exec ipsec sa add 100019 spi 200019 crypto-alg aes-gcm-256 crypto-key 724a54616f6d4965627477536667516966725277656e646561434b577467766e esp
exec ipsec tunnel protect ipip19 sa-out 19 sa-in 100019 add
exec set interface ip address loop0 100.0.20.1/32
exec create ipip tunnel src 100.0.20.1 dst 200.0.0.102 p2p
exec ipsec sa add 20 spi 100020 crypto-alg aes-gcm-256 crypto-key 4c7172677643436f6152756646726c6b6744476d506e756b6d5159627553544b esp
exec ipsec sa add 100020 spi 200020 crypto-alg aes-gcm-256 crypto-key 4c7172677643436f6152756646726c6b6744476d506e756b6d5159627553544b esp
exec ipsec tunnel protect ipip20 sa-out 20 sa-in 100020 add
exec set interface ip address loop0 100.0.21.1/32
exec create ipip tunnel src 100.0.21.1 dst 200.0.0.102 p2p
exec ipsec sa add 21 spi 100021 crypto-alg aes-gcm-256 crypto-key 434c514b73557470777a5047704f71726544677877686b6e4b5452574f57574e esp
exec ipsec sa add 100021 spi 200021 crypto-alg aes-gcm-256 crypto-key 434c514b73557470777a5047704f71726544677877686b6e4b5452574f57574e esp
exec ipsec tunnel protect ipip21 sa-out 21 sa-in 100021 add
exec set interface ip address loop0 100.0.22.1/32
exec create ipip tunnel src 100.0.22.1 dst 200.0.0.102 p2p
exec ipsec sa add 22 spi 100022 crypto-alg aes-gcm-256 crypto-key 665757755854704e435a6d527547715369466e6c516b4f65565459426d4a5370 esp
exec ipsec sa add 100022 spi 200022 crypto-alg aes-gcm-256 crypto-key 665757755854704e435a6d527547715369466e6c516b4f65565459426d4a5370 esp
exec ipsec tunnel protect ipip22 sa-out 22 sa-in 100022 add
exec set interface ip address loop0 100.0.23.1/32
exec create ipip tunnel src 100.0.23.1 dst 200.0.0.102 p2p
exec ipsec sa add 23 spi 100023 crypto-alg aes-gcm-256 crypto-key 7154434a4e45425654595154656f4b68726e6b7153655861486d764b484e6562 esp
exec ipsec sa add 100023 spi 200023 crypto-alg aes-gcm-256 crypto-key 7154434a4e45425654595154656f4b68726e6b7153655861486d764b484e6562 esp
exec ipsec tunnel protect ipip23 sa-out 23 sa-in 100023 add
exec set interface ip address loop0 100.0.24.1/32
exec create ipip tunnel src 100.0.24.1 dst 200.0.0.102 p2p
exec ipsec sa add 24 spi 100024 crypto-alg aes-gcm-256 crypto-key 78686f706c44786249456c48466774797a764273674364706352414f51624f4a esp
exec ipsec sa add 100024 spi 200024 crypto-alg aes-gcm-256 crypto-key 78686f706c44786249456c48466774797a764273674364706352414f51624f4a esp
exec ipsec tunnel protect ipip24 sa-out 24 sa-in 100024 add
exec set interface ip address loop0 100.0.25.1/32
exec create ipip tunnel src 100.0.25.1 dst 200.0.0.102 p2p
exec ipsec sa add 25 spi 100025 crypto-alg aes-gcm-256 crypto-key 424f445055556d465a68576b7a7a6f6f757344446c52475043614f585275756f esp
exec ipsec sa add 100025 spi 200025 crypto-alg aes-gcm-256 crypto-key 424f445055556d465a68576b7a7a6f6f757344446c52475043614f585275756f esp
exec ipsec tunnel protect ipip25 sa-out 25 sa-in 100025 add
exec set interface ip address loop0 100.0.26.1/32
exec create ipip tunnel src 100.0.26.1 dst 200.0.0.102 p2p
exec ipsec sa add 26 spi 100026 crypto-alg aes-gcm-256 crypto-key 5266757744426c6852746b756e476f6a45786559474146554f6e517a594f6564 esp
exec ipsec sa add 100026 spi 200026 crypto-alg aes-gcm-256 crypto-key 5266757744426c6852746b756e476f6a45786559474146554f6e517a594f6564 esp
exec ipsec tunnel protect ipip26 sa-out 26 sa-in 100026 add
exec set interface ip address loop0 100.0.27.1/32
exec create ipip tunnel src 100.0.27.1 dst 200.0.0.102 p2p
exec ipsec sa add 27 spi 100027 crypto-alg aes-gcm-256 crypto-key 7a456a554962566a6c4a57616b41486457754666596c544a677651636f506e48 esp
exec ipsec sa add 100027 spi 200027 crypto-alg aes-gcm-256 crypto-key 7a456a554962566a6c4a57616b41486457754666596c544a677651636f506e48 esp
exec ipsec tunnel protect ipip27 sa-out 27 sa-in 100027 add
exec set interface ip address loop0 100.0.28.1/32
exec create ipip tunnel src 100.0.28.1 dst 200.0.0.102 p2p
exec ipsec sa add 28 spi 100028 crypto-alg aes-gcm-256 crypto-key 724a54657841767868627364576b736a4b514673544359434f61566e44625151 esp
exec ipsec sa add 100028 spi 200028 crypto-alg aes-gcm-256 crypto-key 724a54657841767868627364576b736a4b514673544359434f61566e44625151 esp
exec ipsec tunnel protect ipip28 sa-out 28 sa-in 100028 add
exec set interface ip address loop0 100.0.29.1/32
exec create ipip tunnel src 100.0.29.1 dst 200.0.0.102 p2p
exec ipsec sa add 29 spi 100029 crypto-alg aes-gcm-256 crypto-key 495164684e686a43654475517a50714f454f7946556c4f714a76557352784c42 esp
exec ipsec sa add 100029 spi 200029 crypto-alg aes-gcm-256 crypto-key 495164684e686a43654475517a50714f454f7946556c4f714a76557352784c42 esp
exec ipsec tunnel protect ipip29 sa-out 29 sa-in 100029 add
exec set interface ip address loop0 100.0.30.1/32
exec create ipip tunnel src 100.0.30.1 dst 200.0.0.102 p2p
exec ipsec sa add 30 spi 100030 crypto-alg aes-gcm-256 crypto-key 444446694e764643417a6f66656b57716e674d6a7349746668416354494b7842 esp
exec ipsec sa add 100030 spi 200030 crypto-alg aes-gcm-256 crypto-key 444446694e764643417a6f66656b57716e674d6a7349746668416354494b7842 esp
exec ipsec tunnel protect ipip30 sa-out 30 sa-in 100030 add
exec set interface ip address loop0 100.0.31.1/32
exec create ipip tunnel src 100.0.31.1 dst 200.0.0.102 p2p
exec ipsec sa add 31 spi 100031 crypto-alg aes-gcm-256 crypto-key 6946786a47664b4c6f66575644656b4c526d7245614479584b4b506a6a4c7753 esp
exec ipsec sa add 100031 spi 200031 crypto-alg aes-gcm-256 crypto-key 6946786a47664b4c6f66575644656b4c526d7245614479584b4b506a6a4c7753 esp
exec ipsec tunnel protect ipip31 sa-out 31 sa-in 100031 add
exec set interface ip address loop0 100.0.32.1/32
exec create ipip tunnel src 100.0.32.1 dst 200.0.0.102 p2p
exec ipsec sa add 32 spi 100032 crypto-alg aes-gcm-256 crypto-key 786f496f6977536a747a5879447572464e4b6e6773556664466e7179524d656a esp
exec ipsec sa add 100032 spi 200032 crypto-alg aes-gcm-256 crypto-key 786f496f6977536a747a5879447572464e4b6e6773556664466e7179524d656a esp
exec ipsec tunnel protect ipip32 sa-out 32 sa-in 100032 add
exec set interface ip address loop0 100.0.33.1/32
exec create ipip tunnel src 100.0.33.1 dst 200.0.0.102 p2p
exec ipsec sa add 33 spi 100033 crypto-alg aes-gcm-256 crypto-key 694b4d6e706a6658485a6d73734d51756944587554545668706774687a474745 esp
exec ipsec sa add 100033 spi 200033 crypto-alg aes-gcm-256 crypto-key 694b4d6e706a6658485a6d73734d51756944587554545668706774687a474745 esp
exec ipsec tunnel protect ipip33 sa-out 33 sa-in 100033 add
exec set interface ip address loop0 100.0.34.1/32
exec create ipip tunnel src 100.0.34.1 dst 200.0.0.102 p2p
exec ipsec sa add 34 spi 100034 crypto-alg aes-gcm-256 crypto-key 4b6d59476578434c6d745562785374624f676c50516c495561514d45644d704c esp
exec ipsec sa add 100034 spi 200034 crypto-alg aes-gcm-256 crypto-key 4b6d59476578434c6d745562785374624f676c50516c495561514d45644d704c esp
exec ipsec tunnel protect ipip34 sa-out 34 sa-in 100034 add
exec set interface ip address loop0 100.0.35.1/32
exec create ipip tunnel src 100.0.35.1 dst 200.0.0.102 p2p
exec ipsec sa add 35 spi 100035 crypto-alg aes-gcm-256 crypto-key 564854634e6f71426d72764d50745744564a6d50754f7355426b616f53735376 esp
exec ipsec sa add 100035 spi 200035 crypto-alg aes-gcm-256 crypto-key 564854634e6f71426d72764d50745744564a6d50754f7355426b616f53735376 esp
exec ipsec tunnel protect ipip35 sa-out 35 sa-in 100035 add
exec set interface ip address loop0 100.0.36.1/32
exec create ipip tunnel src 100.0.36.1 dst 200.0.0.102 p2p
exec ipsec sa add 36 spi 100036 crypto-alg aes-gcm-256 crypto-key 46494d756255596d6241766f4f7a6f425a454173655a47654b4654745a5a456f esp
exec ipsec sa add 100036 spi 200036 crypto-alg aes-gcm-256 crypto-key 46494d756255596d6241766f4f7a6f425a454173655a47654b4654745a5a456f esp
exec ipsec tunnel protect ipip36 sa-out 36 sa-in 100036 add
exec set interface ip address loop0 100.0.37.1/32
exec create ipip tunnel src 100.0.37.1 dst 200.0.0.102 p2p
exec ipsec sa add 37 spi 100037 crypto-alg aes-gcm-256 crypto-key 51444655456a5258447a716e7a6a496f4273694e4757764d6a536d5457564a76 esp
exec ipsec sa add 100037 spi 200037 crypto-alg aes-gcm-256 crypto-key 51444655456a5258447a716e7a6a496f4273694e4757764d6a536d5457564a76 esp
exec ipsec tunnel protect ipip37 sa-out 37 sa-in 100037 add
exec set interface ip address loop0 100.0.38.1/32
exec create ipip tunnel src 100.0.38.1 dst 200.0.0.102 p2p
exec ipsec sa add 38 spi 100038 crypto-alg aes-gcm-256 crypto-key 63694a4a6663776845506c434c435a436e76475a574b4c504562515050457050 esp
exec ipsec sa add 100038 spi 200038 crypto-alg aes-gcm-256 crypto-key 63694a4a6663776845506c434c435a436e76475a574b4c504562515050457050 esp
exec ipsec tunnel protect ipip38 sa-out 38 sa-in 100038 add
exec set interface ip address loop0 100.0.39.1/32
exec create ipip tunnel src 100.0.39.1 dst 200.0.0.102 p2p
exec ipsec sa add 39 spi 100039 crypto-alg aes-gcm-256 crypto-key 746264717550706c78424c7263425867414d754e4a6546787076614764577464 esp
exec ipsec sa add 100039 spi 200039 crypto-alg aes-gcm-256 crypto-key 746264717550706c78424c7263425867414d754e4a6546787076614764577464 esp
exec ipsec tunnel protect ipip39 sa-out 39 sa-in 100039 add
exec set interface unnumbered ipip0 use TenGigabitEthernet8/0/0
exec set interface state ipip0 up
exec ip route add 20.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use TenGigabitEthernet8/0/0
exec set interface state ipip1 up
exec ip route add 20.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use TenGigabitEthernet8/0/0
exec set interface state ipip2 up
exec ip route add 20.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use TenGigabitEthernet8/0/0
exec set interface state ipip3 up
exec ip route add 20.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use TenGigabitEthernet8/0/0
exec set interface state ipip4 up
exec ip route add 20.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use TenGigabitEthernet8/0/0
exec set interface state ipip5 up
exec ip route add 20.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use TenGigabitEthernet8/0/0
exec set interface state ipip6 up
exec ip route add 20.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use TenGigabitEthernet8/0/0
exec set interface state ipip7 up
exec ip route add 20.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use TenGigabitEthernet8/0/0
exec set interface state ipip8 up
exec ip route add 20.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use TenGigabitEthernet8/0/0
exec set interface state ipip9 up
exec ip route add 20.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use TenGigabitEthernet8/0/0
exec set interface state ipip10 up
exec ip route add 20.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use TenGigabitEthernet8/0/0
exec set interface state ipip11 up
exec ip route add 20.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use TenGigabitEthernet8/0/0
exec set interface state ipip12 up
exec ip route add 20.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use TenGigabitEthernet8/0/0
exec set interface state ipip13 up
exec ip route add 20.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use TenGigabitEthernet8/0/0
exec set interface state ipip14 up
exec ip route add 20.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use TenGigabitEthernet8/0/0
exec set interface state ipip15 up
exec ip route add 20.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use TenGigabitEthernet8/0/0
exec set interface state ipip16 up
exec ip route add 20.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use TenGigabitEthernet8/0/0
exec set interface state ipip17 up
exec ip route add 20.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use TenGigabitEthernet8/0/0
exec set interface state ipip18 up
exec ip route add 20.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use TenGigabitEthernet8/0/0
exec set interface state ipip19 up
exec ip route add 20.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use TenGigabitEthernet8/0/0
exec set interface state ipip20 up
exec ip route add 20.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use TenGigabitEthernet8/0/0
exec set interface state ipip21 up
exec ip route add 20.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use TenGigabitEthernet8/0/0
exec set interface state ipip22 up
exec ip route add 20.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use TenGigabitEthernet8/0/0
exec set interface state ipip23 up
exec ip route add 20.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use TenGigabitEthernet8/0/0
exec set interface state ipip24 up
exec ip route add 20.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use TenGigabitEthernet8/0/0
exec set interface state ipip25 up
exec ip route add 20.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use TenGigabitEthernet8/0/0
exec set interface state ipip26 up
exec ip route add 20.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use TenGigabitEthernet8/0/0
exec set interface state ipip27 up
exec ip route add 20.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use TenGigabitEthernet8/0/0
exec set interface state ipip28 up
exec ip route add 20.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use TenGigabitEthernet8/0/0
exec set interface state ipip29 up
exec ip route add 20.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use TenGigabitEthernet8/0/0
exec set interface state ipip30 up
exec ip route add 20.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use TenGigabitEthernet8/0/0
exec set interface state ipip31 up
exec ip route add 20.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use TenGigabitEthernet8/0/0
exec set interface state ipip32 up
exec ip route add 20.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use TenGigabitEthernet8/0/0
exec set interface state ipip33 up
exec ip route add 20.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use TenGigabitEthernet8/0/0
exec set interface state ipip34 up
exec ip route add 20.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use TenGigabitEthernet8/0/0
exec set interface state ipip35 up
exec ip route add 20.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use TenGigabitEthernet8/0/0
exec set interface state ipip36 up
exec ip route add 20.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use TenGigabitEthernet8/0/0
exec set interface state ipip37 up
exec ip route add 20.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use TenGigabitEthernet8/0/0
exec set interface state ipip38 up
exec ip route add 20.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use TenGigabitEthernet8/0/0
exec set interface state ipip39 up
exec ip route add 20.0.0.39/32 via ipip39
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec set interface ip address TenGigabitEthernet8/0/0 200.0.0.102/24.0
exec create ipip tunnel src 200.0.0.102 dst 100.0.0.1 p2p
exec ipsec sa add 100000 spi 200000 crypto-alg aes-gcm-256 crypto-key 62644c64516b4645656b494567794d416d424a724c43596479477a4c434d476f esp
exec ipsec sa add 0 spi 100000 crypto-alg aes-gcm-256 crypto-key 62644c64516b4645656b494567794d416d424a724c43596479477a4c434d476f esp
exec ipsec tunnel protect ipip0 sa-out 100000 sa-in 0 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.1.1 p2p
exec ipsec sa add 100001 spi 200001 crypto-alg aes-gcm-256 crypto-key 43486a7a49514a4e59537258614d5a4a6b5044706b6f6a544674466d63645772 esp
exec ipsec sa add 1 spi 100001 crypto-alg aes-gcm-256 crypto-key 43486a7a49514a4e59537258614d5a4a6b5044706b6f6a544674466d63645772 esp
exec ipsec tunnel protect ipip1 sa-out 100001 sa-in 1 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.2.1 p2p
exec ipsec sa add 100002 spi 200002 crypto-alg aes-gcm-256 crypto-key 4d706275586841414c576a50706d43756f54524b6a6b636c7977504e6b55506b esp
exec ipsec sa add 2 spi 100002 crypto-alg aes-gcm-256 crypto-key 4d706275586841414c576a50706d43756f54524b6a6b636c7977504e6b55506b esp
exec ipsec tunnel protect ipip2 sa-out 100002 sa-in 2 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.3.1 p2p
exec ipsec sa add 100003 spi 200003 crypto-alg aes-gcm-256 crypto-key 576a5a6c4a79576c4e72637458436c6b526f795a636c565575556c5449577248 esp
exec ipsec sa add 3 spi 100003 crypto-alg aes-gcm-256 crypto-key 576a5a6c4a79576c4e72637458436c6b526f795a636c565575556c5449577248 esp
exec ipsec tunnel protect ipip3 sa-out 100003 sa-in 3 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.4.1 p2p
exec ipsec sa add 100004 spi 200004 crypto-alg aes-gcm-256 crypto-key 637243586155415a6c7a6b4761455a4564676f7979696944735866505849654e esp
exec ipsec sa add 4 spi 100004 crypto-alg aes-gcm-256 crypto-key 637243586155415a6c7a6b4761455a4564676f7979696944735866505849654e esp
exec ipsec tunnel protect ipip4 sa-out 100004 sa-in 4 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.5.1 p2p
exec ipsec sa add 100005 spi 200005 crypto-alg aes-gcm-256 crypto-key 456a497a6663716a486a53416e5278414e61754e4f77736f47737a415a6e6a49 esp
exec ipsec sa add 5 spi 100005 crypto-alg aes-gcm-256 crypto-key 456a497a6663716a486a53416e5278414e61754e4f77736f47737a415a6e6a49 esp
exec ipsec tunnel protect ipip5 sa-out 100005 sa-in 5 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.6.1 p2p
exec ipsec sa add 100006 spi 200006 crypto-alg aes-gcm-256 crypto-key 62784f73686d4c476a6d7543514b556b4458557a4e5263527955427257574254 esp
exec ipsec sa add 6 spi 100006 crypto-alg aes-gcm-256 crypto-key 62784f73686d4c476a6d7543514b556b4458557a4e5263527955427257574254 esp
exec ipsec tunnel protect ipip6 sa-out 100006 sa-in 6 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.7.1 p2p
exec ipsec sa add 100007 spi 200007 crypto-alg aes-gcm-256 crypto-key 577a414149746965656a735545564b4d536275585a6162784c5448497276417a esp
exec ipsec sa add 7 spi 100007 crypto-alg aes-gcm-256 crypto-key 577a414149746965656a735545564b4d536275585a6162784c5448497276417a esp
exec ipsec tunnel protect ipip7 sa-out 100007 sa-in 7 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.8.1 p2p
exec ipsec sa add 100008 spi 200008 crypto-alg aes-gcm-256 crypto-key 764e5a717244504c6c646b4c496f7874764e6b4551525a6a6961684f704a5242 esp
exec ipsec sa add 8 spi 100008 crypto-alg aes-gcm-256 crypto-key 764e5a717244504c6c646b4c496f7874764e6b4551525a6a6961684f704a5242 esp
exec ipsec tunnel protect ipip8 sa-out 100008 sa-in 8 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.9.1 p2p
exec ipsec sa add 100009 spi 200009 crypto-alg aes-gcm-256 crypto-key 526a6f77557970744f5365474b6d4a514f6c4b4c436546566e4d6d6f4b584e6e esp
exec ipsec sa add 9 spi 100009 crypto-alg aes-gcm-256 crypto-key 526a6f77557970744f5365474b6d4a514f6c4b4c436546566e4d6d6f4b584e6e esp
exec ipsec tunnel protect ipip9 sa-out 100009 sa-in 9 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.10.1 p2p
exec ipsec sa add 100010 spi 200010 crypto-alg aes-gcm-256 crypto-key 6f6d58426154746d4353755263666576695257704b4559585163767962414861 esp
exec ipsec sa add 10 spi 100010 crypto-alg aes-gcm-256 crypto-key 6f6d58426154746d4353755263666576695257704b4559585163767962414861 esp
exec ipsec tunnel protect ipip10 sa-out 100010 sa-in 10 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.11.1 p2p
exec ipsec sa add 100011 spi 200011 crypto-alg aes-gcm-256 crypto-key 53656a78536f6262504946586c67504c7370676e614653556a49637355547662 esp
exec ipsec sa add 11 spi 100011 crypto-alg aes-gcm-256 crypto-key 53656a78536f6262504946586c67504c7370676e614653556a49637355547662 esp
exec ipsec tunnel protect ipip11 sa-out 100011 sa-in 11 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.12.1 p2p
exec ipsec sa add 100012 spi 200012 crypto-alg aes-gcm-256 crypto-key 4b42744e56766777686a7a7350686e6d4a6e54526873755a6263426a415a744e esp
exec ipsec sa add 12 spi 100012 crypto-alg aes-gcm-256 crypto-key 4b42744e56766777686a7a7350686e6d4a6e54526873755a6263426a415a744e esp
exec ipsec tunnel protect ipip12 sa-out 100012 sa-in 12 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.13.1 p2p
exec ipsec sa add 100013 spi 200013 crypto-alg aes-gcm-256 crypto-key 4f6a45694b6152574770666e585a72754f7a5058756b796e4c5a77476a584c50 esp
exec ipsec sa add 13 spi 100013 crypto-alg aes-gcm-256 crypto-key 4f6a45694b6152574770666e585a72754f7a5058756b796e4c5a77476a584c50 esp
exec ipsec tunnel protect ipip13 sa-out 100013 sa-in 13 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.14.1 p2p
exec ipsec sa add 100014 spi 200014 crypto-alg aes-gcm-256 crypto-key 426a456c6b48636d6c674f596a614278464857666267535a504f684f6c687345 esp
exec ipsec sa add 14 spi 100014 crypto-alg aes-gcm-256 crypto-key 426a456c6b48636d6c674f596a614278464857666267535a504f684f6c687345 esp
exec ipsec tunnel protect ipip14 sa-out 100014 sa-in 14 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.15.1 p2p
exec ipsec sa add 100015 spi 200015 crypto-alg aes-gcm-256 crypto-key 79597044577745727554657a6e427a65666f54426b7462735a56436f78576e49 esp
exec ipsec sa add 15 spi 100015 crypto-alg aes-gcm-256 crypto-key 79597044577745727554657a6e427a65666f54426b7462735a56436f78576e49 esp
exec ipsec tunnel protect ipip15 sa-out 100015 sa-in 15 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.16.1 p2p
exec ipsec sa add 100016 spi 200016 crypto-alg aes-gcm-256 crypto-key 616b777855514366546f6554706c5545716a7578667376426b7a46475441536d esp
exec ipsec sa add 16 spi 100016 crypto-alg aes-gcm-256 crypto-key 616b777855514366546f6554706c5545716a7578667376426b7a46475441536d esp
exec ipsec tunnel protect ipip16 sa-out 100016 sa-in 16 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.17.1 p2p
exec ipsec sa add 100017 spi 200017 crypto-alg aes-gcm-256 crypto-key 58787969537a61674f517a4f76566e6e6e747a7371706f4b5a575978454c4d4a esp
exec ipsec sa add 17 spi 100017 crypto-alg aes-gcm-256 crypto-key 58787969537a61674f517a4f76566e6e6e747a7371706f4b5a575978454c4d4a esp
exec ipsec tunnel protect ipip17 sa-out 100017 sa-in 17 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.18.1 p2p
exec ipsec sa add 100018 spi 200018 crypto-alg aes-gcm-256 crypto-key 534f76584775664c6e6f4d454e68644c6f4a4e4a486b7a49714d516d78785446 esp
exec ipsec sa add 18 spi 100018 crypto-alg aes-gcm-256 crypto-key 534f76584775664c6e6f4d454e68644c6f4a4e4a486b7a49714d516d78785446 esp
exec ipsec tunnel protect ipip18 sa-out 100018 sa-in 18 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.19.1 p2p
exec ipsec sa add 100019 spi 200019 crypto-alg aes-gcm-256 crypto-key 724a54616f6d4965627477536667516966725277656e646561434b577467766e esp
exec ipsec sa add 19 spi 100019 crypto-alg aes-gcm-256 crypto-key 724a54616f6d4965627477536667516966725277656e646561434b577467766e esp
exec ipsec tunnel protect ipip19 sa-out 100019 sa-in 19 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.20.1 p2p
exec ipsec sa add 100020 spi 200020 crypto-alg aes-gcm-256 crypto-key 4c7172677643436f6152756646726c6b6744476d506e756b6d5159627553544b esp
exec ipsec sa add 20 spi 100020 crypto-alg aes-gcm-256 crypto-key 4c7172677643436f6152756646726c6b6744476d506e756b6d5159627553544b esp
exec ipsec tunnel protect ipip20 sa-out 100020 sa-in 20 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.21.1 p2p
exec ipsec sa add 100021 spi 200021 crypto-alg aes-gcm-256 crypto-key 434c514b73557470777a5047704f71726544677877686b6e4b5452574f57574e esp
exec ipsec sa add 21 spi 100021 crypto-alg aes-gcm-256 crypto-key 434c514b73557470777a5047704f71726544677877686b6e4b5452574f57574e esp
exec ipsec tunnel protect ipip21 sa-out 100021 sa-in 21 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.22.1 p2p
exec ipsec sa add 100022 spi 200022 crypto-alg aes-gcm-256 crypto-key 665757755854704e435a6d527547715369466e6c516b4f65565459426d4a5370 esp
exec ipsec sa add 22 spi 100022 crypto-alg aes-gcm-256 crypto-key 665757755854704e435a6d527547715369466e6c516b4f65565459426d4a5370 esp
exec ipsec tunnel protect ipip22 sa-out 100022 sa-in 22 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.23.1 p2p
exec ipsec sa add 100023 spi 200023 crypto-alg aes-gcm-256 crypto-key 7154434a4e45425654595154656f4b68726e6b7153655861486d764b484e6562 esp
exec ipsec sa add 23 spi 100023 crypto-alg aes-gcm-256 crypto-key 7154434a4e45425654595154656f4b68726e6b7153655861486d764b484e6562 esp
exec ipsec tunnel protect ipip23 sa-out 100023 sa-in 23 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.24.1 p2p
exec ipsec sa add 100024 spi 200024 crypto-alg aes-gcm-256 crypto-key 78686f706c44786249456c48466774797a764273674364706352414f51624f4a esp
exec ipsec sa add 24 spi 100024 crypto-alg aes-gcm-256 crypto-key 78686f706c44786249456c48466774797a764273674364706352414f51624f4a esp
exec ipsec tunnel protect ipip24 sa-out 100024 sa-in 24 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.25.1 p2p
exec ipsec sa add 100025 spi 200025 crypto-alg aes-gcm-256 crypto-key 424f445055556d465a68576b7a7a6f6f757344446c52475043614f585275756f esp
exec ipsec sa add 25 spi 100025 crypto-alg aes-gcm-256 crypto-key 424f445055556d465a68576b7a7a6f6f757344446c52475043614f585275756f esp
exec ipsec tunnel protect ipip25 sa-out 100025 sa-in 25 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.26.1 p2p
exec ipsec sa add 100026 spi 200026 crypto-alg aes-gcm-256 crypto-key 5266757744426c6852746b756e476f6a45786559474146554f6e517a594f6564 esp
exec ipsec sa add 26 spi 100026 crypto-alg aes-gcm-256 crypto-key 5266757744426c6852746b756e476f6a45786559474146554f6e517a594f6564 esp
exec ipsec tunnel protect ipip26 sa-out 100026 sa-in 26 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.27.1 p2p
exec ipsec sa add 100027 spi 200027 crypto-alg aes-gcm-256 crypto-key 7a456a554962566a6c4a57616b41486457754666596c544a677651636f506e48 esp
exec ipsec sa add 27 spi 100027 crypto-alg aes-gcm-256 crypto-key 7a456a554962566a6c4a57616b41486457754666596c544a677651636f506e48 esp
exec ipsec tunnel protect ipip27 sa-out 100027 sa-in 27 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.28.1 p2p
exec ipsec sa add 100028 spi 200028 crypto-alg aes-gcm-256 crypto-key 724a54657841767868627364576b736a4b514673544359434f61566e44625151 esp
exec ipsec sa add 28 spi 100028 crypto-alg aes-gcm-256 crypto-key 724a54657841767868627364576b736a4b514673544359434f61566e44625151 esp
exec ipsec tunnel protect ipip28 sa-out 100028 sa-in 28 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.29.1 p2p
exec ipsec sa add 100029 spi 200029 crypto-alg aes-gcm-256 crypto-key 495164684e686a43654475517a50714f454f7946556c4f714a76557352784c42 esp
exec ipsec sa add 29 spi 100029 crypto-alg aes-gcm-256 crypto-key 495164684e686a43654475517a50714f454f7946556c4f714a76557352784c42 esp
exec ipsec tunnel protect ipip29 sa-out 100029 sa-in 29 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.30.1 p2p
exec ipsec sa add 100030 spi 200030 crypto-alg aes-gcm-256 crypto-key 444446694e764643417a6f66656b57716e674d6a7349746668416354494b7842 esp
exec ipsec sa add 30 spi 100030 crypto-alg aes-gcm-256 crypto-key 444446694e764643417a6f66656b57716e674d6a7349746668416354494b7842 esp
exec ipsec tunnel protect ipip30 sa-out 100030 sa-in 30 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.31.1 p2p
exec ipsec sa add 100031 spi 200031 crypto-alg aes-gcm-256 crypto-key 6946786a47664b4c6f66575644656b4c526d7245614479584b4b506a6a4c7753 esp
exec ipsec sa add 31 spi 100031 crypto-alg aes-gcm-256 crypto-key 6946786a47664b4c6f66575644656b4c526d7245614479584b4b506a6a4c7753 esp
exec ipsec tunnel protect ipip31 sa-out 100031 sa-in 31 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.32.1 p2p
exec ipsec sa add 100032 spi 200032 crypto-alg aes-gcm-256 crypto-key 786f496f6977536a747a5879447572464e4b6e6773556664466e7179524d656a esp
exec ipsec sa add 32 spi 100032 crypto-alg aes-gcm-256 crypto-key 786f496f6977536a747a5879447572464e4b6e6773556664466e7179524d656a esp
exec ipsec tunnel protect ipip32 sa-out 100032 sa-in 32 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.33.1 p2p
exec ipsec sa add 100033 spi 200033 crypto-alg aes-gcm-256 crypto-key 694b4d6e706a6658485a6d73734d51756944587554545668706774687a474745 esp
exec ipsec sa add 33 spi 100033 crypto-alg aes-gcm-256 crypto-key 694b4d6e706a6658485a6d73734d51756944587554545668706774687a474745 esp
exec ipsec tunnel protect ipip33 sa-out 100033 sa-in 33 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.34.1 p2p
exec ipsec sa add 100034 spi 200034 crypto-alg aes-gcm-256 crypto-key 4b6d59476578434c6d745562785374624f676c50516c495561514d45644d704c esp
exec ipsec sa add 34 spi 100034 crypto-alg aes-gcm-256 crypto-key 4b6d59476578434c6d745562785374624f676c50516c495561514d45644d704c esp
exec ipsec tunnel protect ipip34 sa-out 100034 sa-in 34 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.35.1 p2p
exec ipsec sa add 100035 spi 200035 crypto-alg aes-gcm-256 crypto-key 564854634e6f71426d72764d50745744564a6d50754f7355426b616f53735376 esp
exec ipsec sa add 35 spi 100035 crypto-alg aes-gcm-256 crypto-key 564854634e6f71426d72764d50745744564a6d50754f7355426b616f53735376 esp
exec ipsec tunnel protect ipip35 sa-out 100035 sa-in 35 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.36.1 p2p
exec ipsec sa add 100036 spi 200036 crypto-alg aes-gcm-256 crypto-key 46494d756255596d6241766f4f7a6f425a454173655a47654b4654745a5a456f esp
exec ipsec sa add 36 spi 100036 crypto-alg aes-gcm-256 crypto-key 46494d756255596d6241766f4f7a6f425a454173655a47654b4654745a5a456f esp
exec ipsec tunnel protect ipip36 sa-out 100036 sa-in 36 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.37.1 p2p
exec ipsec sa add 100037 spi 200037 crypto-alg aes-gcm-256 crypto-key 51444655456a5258447a716e7a6a496f4273694e4757764d6a536d5457564a76 esp
exec ipsec sa add 37 spi 100037 crypto-alg aes-gcm-256 crypto-key 51444655456a5258447a716e7a6a496f4273694e4757764d6a536d5457564a76 esp
exec ipsec tunnel protect ipip37 sa-out 100037 sa-in 37 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.38.1 p2p
exec ipsec sa add 100038 spi 200038 crypto-alg aes-gcm-256 crypto-key 63694a4a6663776845506c434c435a436e76475a574b4c504562515050457050 esp
exec ipsec sa add 38 spi 100038 crypto-alg aes-gcm-256 crypto-key 63694a4a6663776845506c434c435a436e76475a574b4c504562515050457050 esp
exec ipsec tunnel protect ipip38 sa-out 100038 sa-in 38 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.39.1 p2p
exec ipsec sa add 100039 spi 200039 crypto-alg aes-gcm-256 crypto-key 746264717550706c78424c7263425867414d754e4a6546787076614764577464 esp
exec ipsec sa add 39 spi 100039 crypto-alg aes-gcm-256 crypto-key 746264717550706c78424c7263425867414d754e4a6546787076614764577464 esp
exec ipsec tunnel protect ipip39 sa-out 100039 sa-in 39 add
exec ip route add 100.0.0.1/8 via 200.0.0.101 TenGigabitEthernet8/0/0
exec set interface unnumbered ipip0 use TenGigabitEthernet8/0/0
exec set interface state ipip0 up
exec ip route add 10.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use TenGigabitEthernet8/0/0
exec set interface state ipip1 up
exec ip route add 10.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use TenGigabitEthernet8/0/0
exec set interface state ipip2 up
exec ip route add 10.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use TenGigabitEthernet8/0/0
exec set interface state ipip3 up
exec ip route add 10.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use TenGigabitEthernet8/0/0
exec set interface state ipip4 up
exec ip route add 10.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use TenGigabitEthernet8/0/0
exec set interface state ipip5 up
exec ip route add 10.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use TenGigabitEthernet8/0/0
exec set interface state ipip6 up
exec ip route add 10.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use TenGigabitEthernet8/0/0
exec set interface state ipip7 up
exec ip route add 10.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use TenGigabitEthernet8/0/0
exec set interface state ipip8 up
exec ip route add 10.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use TenGigabitEthernet8/0/0
exec set interface state ipip9 up
exec ip route add 10.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use TenGigabitEthernet8/0/0
exec set interface state ipip10 up
exec ip route add 10.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use TenGigabitEthernet8/0/0
exec set interface state ipip11 up
exec ip route add 10.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use TenGigabitEthernet8/0/0
exec set interface state ipip12 up
exec ip route add 10.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use TenGigabitEthernet8/0/0
exec set interface state ipip13 up
exec ip route add 10.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use TenGigabitEthernet8/0/0
exec set interface state ipip14 up
exec ip route add 10.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use TenGigabitEthernet8/0/0
exec set interface state ipip15 up
exec ip route add 10.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use TenGigabitEthernet8/0/0
exec set interface state ipip16 up
exec ip route add 10.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use TenGigabitEthernet8/0/0
exec set interface state ipip17 up
exec ip route add 10.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use TenGigabitEthernet8/0/0
exec set interface state ipip18 up
exec ip route add 10.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use TenGigabitEthernet8/0/0
exec set interface state ipip19 up
exec ip route add 10.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use TenGigabitEthernet8/0/0
exec set interface state ipip20 up
exec ip route add 10.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use TenGigabitEthernet8/0/0
exec set interface state ipip21 up
exec ip route add 10.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use TenGigabitEthernet8/0/0
exec set interface state ipip22 up
exec ip route add 10.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use TenGigabitEthernet8/0/0
exec set interface state ipip23 up
exec ip route add 10.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use TenGigabitEthernet8/0/0
exec set interface state ipip24 up
exec ip route add 10.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use TenGigabitEthernet8/0/0
exec set interface state ipip25 up
exec ip route add 10.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use TenGigabitEthernet8/0/0
exec set interface state ipip26 up
exec ip route add 10.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use TenGigabitEthernet8/0/0
exec set interface state ipip27 up
exec ip route add 10.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use TenGigabitEthernet8/0/0
exec set interface state ipip28 up
exec ip route add 10.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use TenGigabitEthernet8/0/0
exec set interface state ipip29 up
exec ip route add 10.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use TenGigabitEthernet8/0/0
exec set interface state ipip30 up
exec ip route add 10.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use TenGigabitEthernet8/0/0
exec set interface state ipip31 up
exec ip route add 10.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use TenGigabitEthernet8/0/0
exec set interface state ipip32 up
exec ip route add 10.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use TenGigabitEthernet8/0/0
exec set interface state ipip33 up
exec ip route add 10.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use TenGigabitEthernet8/0/0
exec set interface state ipip34 up
exec ip route add 10.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use TenGigabitEthernet8/0/0
exec set interface state ipip35 up
exec ip route add 10.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use TenGigabitEthernet8/0/0
exec set interface state ipip36 up
exec ip route add 10.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use TenGigabitEthernet8/0/0
exec set interface state ipip37 up
exec ip route add 10.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use TenGigabitEthernet8/0/0
exec set interface state ipip38 up
exec ip route add 10.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use TenGigabitEthernet8/0/0
exec set interface state ipip39 up
exec ip route add 10.0.0.39/32 via ipip39

 64b-2t2c-ethip4ipsec40tnlsw- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec create loopback interface
exec set interface state loop0 up
exec set interface ip address TenGigabitEthernet8/0/0 200.0.0.101/24
exec set ip neighbor TenGigabitEthernet8/0/0 200.0.0.102 ac:1f:6b:57:57:fe static
exec set interface ip address loop0 100.0.0.1/32
exec create ipip tunnel src 100.0.0.1 dst 200.0.0.102 p2p
exec ipsec sa add 0 spi 100000 crypto-alg aes-gcm-256 crypto-key 705046507952685a6f45454c4d696f5761724d644b496a77485a69644d517578 esp
exec ipsec sa add 100000 spi 200000 crypto-alg aes-gcm-256 crypto-key 705046507952685a6f45454c4d696f5761724d644b496a77485a69644d517578 esp
exec ipsec tunnel protect ipip0 sa-out 0 sa-in 100000 add
exec set interface ip address loop0 100.0.1.1/32
exec create ipip tunnel src 100.0.1.1 dst 200.0.0.102 p2p
exec ipsec sa add 1 spi 100001 crypto-alg aes-gcm-256 crypto-key 68774e595945524c68494b756365684957476b6c4d794e71414d4e45715a4a50 esp
exec ipsec sa add 100001 spi 200001 crypto-alg aes-gcm-256 crypto-key 68774e595945524c68494b756365684957476b6c4d794e71414d4e45715a4a50 esp
exec ipsec tunnel protect ipip1 sa-out 1 sa-in 100001 add
exec set interface ip address loop0 100.0.2.1/32
exec create ipip tunnel src 100.0.2.1 dst 200.0.0.102 p2p
exec ipsec sa add 2 spi 100002 crypto-alg aes-gcm-256 crypto-key 717a4a7a4b64596f48496272434a6c41456f5046644562555142414172514a65 esp
exec ipsec sa add 100002 spi 200002 crypto-alg aes-gcm-256 crypto-key 717a4a7a4b64596f48496272434a6c41456f5046644562555142414172514a65 esp
exec ipsec tunnel protect ipip2 sa-out 2 sa-in 100002 add
exec set interface ip address loop0 100.0.3.1/32
exec create ipip tunnel src 100.0.3.1 dst 200.0.0.102 p2p
exec ipsec sa add 3 spi 100003 crypto-alg aes-gcm-256 crypto-key 42454a4c6e6f4c6e4b536b4c4c6d726f4d4c72584f477a6d626f57714c6d4373 esp
exec ipsec sa add 100003 spi 200003 crypto-alg aes-gcm-256 crypto-key 42454a4c6e6f4c6e4b536b4c4c6d726f4d4c72584f477a6d626f57714c6d4373 esp
exec ipsec tunnel protect ipip3 sa-out 3 sa-in 100003 add
exec set interface ip address loop0 100.0.4.1/32
exec create ipip tunnel src 100.0.4.1 dst 200.0.0.102 p2p
exec ipsec sa add 4 spi 100004 crypto-alg aes-gcm-256 crypto-key 556257576a51434e735a4f4c6554424753666b484c4463556478764a72504548 esp
exec ipsec sa add 100004 spi 200004 crypto-alg aes-gcm-256 crypto-key 556257576a51434e735a4f4c6554424753666b484c4463556478764a72504548 esp
exec ipsec tunnel protect ipip4 sa-out 4 sa-in 100004 add
exec set interface ip address loop0 100.0.5.1/32
exec create ipip tunnel src 100.0.5.1 dst 200.0.0.102 p2p
exec ipsec sa add 5 spi 100005 crypto-alg aes-gcm-256 crypto-key 50427455734e4e59714c546e7853424e6559426750735153464e567378675554 esp
exec ipsec sa add 100005 spi 200005 crypto-alg aes-gcm-256 crypto-key 50427455734e4e59714c546e7853424e6559426750735153464e567378675554 esp
exec ipsec tunnel protect ipip5 sa-out 5 sa-in 100005 add
exec set interface ip address loop0 100.0.6.1/32
exec create ipip tunnel src 100.0.6.1 dst 200.0.0.102 p2p
exec ipsec sa add 6 spi 100006 crypto-alg aes-gcm-256 crypto-key 4b556950586b617454506c44526647534c655751504249544262776f6769624d esp
exec ipsec sa add 100006 spi 200006 crypto-alg aes-gcm-256 crypto-key 4b556950586b617454506c44526647534c655751504249544262776f6769624d esp
exec ipsec tunnel protect ipip6 sa-out 6 sa-in 100006 add
exec set interface ip address loop0 100.0.7.1/32
exec create ipip tunnel src 100.0.7.1 dst 200.0.0.102 p2p
exec ipsec sa add 7 spi 100007 crypto-alg aes-gcm-256 crypto-key 4f536e70746e50636d4e77784e79754c7651555673696d49577066474e457661 esp
exec ipsec sa add 100007 spi 200007 crypto-alg aes-gcm-256 crypto-key 4f536e70746e50636d4e77784e79754c7651555673696d49577066474e457661 esp
exec ipsec tunnel protect ipip7 sa-out 7 sa-in 100007 add
exec set interface ip address loop0 100.0.8.1/32
exec create ipip tunnel src 100.0.8.1 dst 200.0.0.102 p2p
exec ipsec sa add 8 spi 100008 crypto-alg aes-gcm-256 crypto-key 6a4a446c6249514c5179634351766d6e534872564b52726748505671785a764d esp
exec ipsec sa add 100008 spi 200008 crypto-alg aes-gcm-256 crypto-key 6a4a446c6249514c5179634351766d6e534872564b52726748505671785a764d esp
exec ipsec tunnel protect ipip8 sa-out 8 sa-in 100008 add
exec set interface ip address loop0 100.0.9.1/32
exec create ipip tunnel src 100.0.9.1 dst 200.0.0.102 p2p
exec ipsec sa add 9 spi 100009 crypto-alg aes-gcm-256 crypto-key 7152535062784d6672745964536f4c66737044584f6363684b4f524676516850 esp
exec ipsec sa add 100009 spi 200009 crypto-alg aes-gcm-256 crypto-key 7152535062784d6672745964536f4c66737044584f6363684b4f524676516850 esp
exec ipsec tunnel protect ipip9 sa-out 9 sa-in 100009 add
exec set interface ip address loop0 100.0.10.1/32
exec create ipip tunnel src 100.0.10.1 dst 200.0.0.102 p2p
exec ipsec sa add 10 spi 100010 crypto-alg aes-gcm-256 crypto-key 444f72555277697156715255665372766e645157704666696b6f6e4443776166 esp
exec ipsec sa add 100010 spi 200010 crypto-alg aes-gcm-256 crypto-key 444f72555277697156715255665372766e645157704666696b6f6e4443776166 esp
exec ipsec tunnel protect ipip10 sa-out 10 sa-in 100010 add
exec set interface ip address loop0 100.0.11.1/32
exec create ipip tunnel src 100.0.11.1 dst 200.0.0.102 p2p
exec ipsec sa add 11 spi 100011 crypto-alg aes-gcm-256 crypto-key 64546b645945657a517173446157785042487557664749666367427743716159 esp
exec ipsec sa add 100011 spi 200011 crypto-alg aes-gcm-256 crypto-key 64546b645945657a517173446157785042487557664749666367427743716159 esp
exec ipsec tunnel protect ipip11 sa-out 11 sa-in 100011 add
exec set interface ip address loop0 100.0.12.1/32
exec create ipip tunnel src 100.0.12.1 dst 200.0.0.102 p2p
exec ipsec sa add 12 spi 100012 crypto-alg aes-gcm-256 crypto-key 6e654570724871754152675373627245774779776e426242414855684d525078 esp
exec ipsec sa add 100012 spi 200012 crypto-alg aes-gcm-256 crypto-key 6e654570724871754152675373627245774779776e426242414855684d525078 esp
exec ipsec tunnel protect ipip12 sa-out 12 sa-in 100012 add
exec set interface ip address loop0 100.0.13.1/32
exec create ipip tunnel src 100.0.13.1 dst 200.0.0.102 p2p
exec ipsec sa add 13 spi 100013 crypto-alg aes-gcm-256 crypto-key 6e47556770494e757764596b51544950696259415075646e6b556c5a68645059 esp
exec ipsec sa add 100013 spi 200013 crypto-alg aes-gcm-256 crypto-key 6e47556770494e757764596b51544950696259415075646e6b556c5a68645059 esp
exec ipsec tunnel protect ipip13 sa-out 13 sa-in 100013 add
exec set interface ip address loop0 100.0.14.1/32
exec create ipip tunnel src 100.0.14.1 dst 200.0.0.102 p2p
exec ipsec sa add 14 spi 100014 crypto-alg aes-gcm-256 crypto-key 526d70754a4f587245756242416c45475a554f74415574414c575251746c764c esp
exec ipsec sa add 100014 spi 200014 crypto-alg aes-gcm-256 crypto-key 526d70754a4f587245756242416c45475a554f74415574414c575251746c764c esp
exec ipsec tunnel protect ipip14 sa-out 14 sa-in 100014 add
exec set interface ip address loop0 100.0.15.1/32
exec create ipip tunnel src 100.0.15.1 dst 200.0.0.102 p2p
exec ipsec sa add 15 spi 100015 crypto-alg aes-gcm-256 crypto-key 7a6e544274556e76596f4f7a6b70576161456563525a6a7264514b6d4f744d4d esp
exec ipsec sa add 100015 spi 200015 crypto-alg aes-gcm-256 crypto-key 7a6e544274556e76596f4f7a6b70576161456563525a6a7264514b6d4f744d4d esp
exec ipsec tunnel protect ipip15 sa-out 15 sa-in 100015 add
exec set interface ip address loop0 100.0.16.1/32
exec create ipip tunnel src 100.0.16.1 dst 200.0.0.102 p2p
exec ipsec sa add 16 spi 100016 crypto-alg aes-gcm-256 crypto-key 50666b7659635476714c67676a476f714c444a77486c715a5045454242775357 esp
exec ipsec sa add 100016 spi 200016 crypto-alg aes-gcm-256 crypto-key 50666b7659635476714c67676a476f714c444a77486c715a5045454242775357 esp
exec ipsec tunnel protect ipip16 sa-out 16 sa-in 100016 add
exec set interface ip address loop0 100.0.17.1/32
exec create ipip tunnel src 100.0.17.1 dst 200.0.0.102 p2p
exec ipsec sa add 17 spi 100017 crypto-alg aes-gcm-256 crypto-key 6c476565585359536b46616642436457415347515263644a567169594f6d446c esp
exec ipsec sa add 100017 spi 200017 crypto-alg aes-gcm-256 crypto-key 6c476565585359536b46616642436457415347515263644a567169594f6d446c esp
exec ipsec tunnel protect ipip17 sa-out 17 sa-in 100017 add
exec set interface ip address loop0 100.0.18.1/32
exec create ipip tunnel src 100.0.18.1 dst 200.0.0.102 p2p
exec ipsec sa add 18 spi 100018 crypto-alg aes-gcm-256 crypto-key 7a6156627041564a534a637073424a747857714245734e6c6d465a634e65766e esp
exec ipsec sa add 100018 spi 200018 crypto-alg aes-gcm-256 crypto-key 7a6156627041564a534a637073424a747857714245734e6c6d465a634e65766e esp
exec ipsec tunnel protect ipip18 sa-out 18 sa-in 100018 add
exec set interface ip address loop0 100.0.19.1/32
exec create ipip tunnel src 100.0.19.1 dst 200.0.0.102 p2p
exec ipsec sa add 19 spi 100019 crypto-alg aes-gcm-256 crypto-key 43764a616f6953625066414a4142445a7779715354777a7374744a77584b4c4f esp
exec ipsec sa add 100019 spi 200019 crypto-alg aes-gcm-256 crypto-key 43764a616f6953625066414a4142445a7779715354777a7374744a77584b4c4f esp
exec ipsec tunnel protect ipip19 sa-out 19 sa-in 100019 add
exec set interface ip address loop0 100.0.20.1/32
exec create ipip tunnel src 100.0.20.1 dst 200.0.0.102 p2p
exec ipsec sa add 20 spi 100020 crypto-alg aes-gcm-256 crypto-key 547753635a566b65746758764b5677764b6d77535466426b724f45716574744b esp
exec ipsec sa add 100020 spi 200020 crypto-alg aes-gcm-256 crypto-key 547753635a566b65746758764b5677764b6d77535466426b724f45716574744b esp
exec ipsec tunnel protect ipip20 sa-out 20 sa-in 100020 add
exec set interface ip address loop0 100.0.21.1/32
exec create ipip tunnel src 100.0.21.1 dst 200.0.0.102 p2p
exec ipsec sa add 21 spi 100021 crypto-alg aes-gcm-256 crypto-key 4f73707968434c46756867666d486767556f744b7465796f7569557874646c61 esp
exec ipsec sa add 100021 spi 200021 crypto-alg aes-gcm-256 crypto-key 4f73707968434c46756867666d486767556f744b7465796f7569557874646c61 esp
exec ipsec tunnel protect ipip21 sa-out 21 sa-in 100021 add
exec set interface ip address loop0 100.0.22.1/32
exec create ipip tunnel src 100.0.22.1 dst 200.0.0.102 p2p
exec ipsec sa add 22 spi 100022 crypto-alg aes-gcm-256 crypto-key 4249706d6b4c536b6c4d696c6a525a6a47464b4f634d77454943737953474470 esp
exec ipsec sa add 100022 spi 200022 crypto-alg aes-gcm-256 crypto-key 4249706d6b4c536b6c4d696c6a525a6a47464b4f634d77454943737953474470 esp
exec ipsec tunnel protect ipip22 sa-out 22 sa-in 100022 add
exec set interface ip address loop0 100.0.23.1/32
exec create ipip tunnel src 100.0.23.1 dst 200.0.0.102 p2p
exec ipsec sa add 23 spi 100023 crypto-alg aes-gcm-256 crypto-key 49736e5a574b6578644748674477474c42557358787866566c6d445576745964 esp
exec ipsec sa add 100023 spi 200023 crypto-alg aes-gcm-256 crypto-key 49736e5a574b6578644748674477474c42557358787866566c6d445576745964 esp
exec ipsec tunnel protect ipip23 sa-out 23 sa-in 100023 add
exec set interface ip address loop0 100.0.24.1/32
exec create ipip tunnel src 100.0.24.1 dst 200.0.0.102 p2p
exec ipsec sa add 24 spi 100024 crypto-alg aes-gcm-256 crypto-key 7649766d6c706a465549536b4d79535665726f56505361466561686547624244 esp
exec ipsec sa add 100024 spi 200024 crypto-alg aes-gcm-256 crypto-key 7649766d6c706a465549536b4d79535665726f56505361466561686547624244 esp
exec ipsec tunnel protect ipip24 sa-out 24 sa-in 100024 add
exec set interface ip address loop0 100.0.25.1/32
exec create ipip tunnel src 100.0.25.1 dst 200.0.0.102 p2p
exec ipsec sa add 25 spi 100025 crypto-alg aes-gcm-256 crypto-key 5062506969586564456452524d436a4252517a47414c647a6549574c7a4a434f esp
exec ipsec sa add 100025 spi 200025 crypto-alg aes-gcm-256 crypto-key 5062506969586564456452524d436a4252517a47414c647a6549574c7a4a434f esp
exec ipsec tunnel protect ipip25 sa-out 25 sa-in 100025 add
exec set interface ip address loop0 100.0.26.1/32
exec create ipip tunnel src 100.0.26.1 dst 200.0.0.102 p2p
exec ipsec sa add 26 spi 100026 crypto-alg aes-gcm-256 crypto-key 77596f7a4979506469524a5265576c6c62675650636b7579776e69446d475975 esp
exec ipsec sa add 100026 spi 200026 crypto-alg aes-gcm-256 crypto-key 77596f7a4979506469524a5265576c6c62675650636b7579776e69446d475975 esp
exec ipsec tunnel protect ipip26 sa-out 26 sa-in 100026 add
exec set interface ip address loop0 100.0.27.1/32
exec create ipip tunnel src 100.0.27.1 dst 200.0.0.102 p2p
exec ipsec sa add 27 spi 100027 crypto-alg aes-gcm-256 crypto-key 465776676d65776d6f6f4c6a4c4a484672597047764a4f4e6f704f634c484273 esp
exec ipsec sa add 100027 spi 200027 crypto-alg aes-gcm-256 crypto-key 465776676d65776d6f6f4c6a4c4a484672597047764a4f4e6f704f634c484273 esp
exec ipsec tunnel protect ipip27 sa-out 27 sa-in 100027 add
exec set interface ip address loop0 100.0.28.1/32
exec create ipip tunnel src 100.0.28.1 dst 200.0.0.102 p2p
exec ipsec sa add 28 spi 100028 crypto-alg aes-gcm-256 crypto-key 6b78505944556c744f62416975435a4b4a6a4268566a78685272505448787a45 esp
exec ipsec sa add 100028 spi 200028 crypto-alg aes-gcm-256 crypto-key 6b78505944556c744f62416975435a4b4a6a4268566a78685272505448787a45 esp
exec ipsec tunnel protect ipip28 sa-out 28 sa-in 100028 add
exec set interface ip address loop0 100.0.29.1/32
exec create ipip tunnel src 100.0.29.1 dst 200.0.0.102 p2p
exec ipsec sa add 29 spi 100029 crypto-alg aes-gcm-256 crypto-key 716a5958594d4e6c425a43566a6c7574595854547478705555575a6259714877 esp
exec ipsec sa add 100029 spi 200029 crypto-alg aes-gcm-256 crypto-key 716a5958594d4e6c425a43566a6c7574595854547478705555575a6259714877 esp
exec ipsec tunnel protect ipip29 sa-out 29 sa-in 100029 add
exec set interface ip address loop0 100.0.30.1/32
exec create ipip tunnel src 100.0.30.1 dst 200.0.0.102 p2p
exec ipsec sa add 30 spi 100030 crypto-alg aes-gcm-256 crypto-key 6555737971476e6e74726a494f6c647a626a4f646d616a6f48726568585a465a esp
exec ipsec sa add 100030 spi 200030 crypto-alg aes-gcm-256 crypto-key 6555737971476e6e74726a494f6c647a626a4f646d616a6f48726568585a465a esp
exec ipsec tunnel protect ipip30 sa-out 30 sa-in 100030 add
exec set interface ip address loop0 100.0.31.1/32
exec create ipip tunnel src 100.0.31.1 dst 200.0.0.102 p2p
exec ipsec sa add 31 spi 100031 crypto-alg aes-gcm-256 crypto-key 4973436c5458655a486b6c776158634f755a6b4767497a67797155706b626373 esp
exec ipsec sa add 100031 spi 200031 crypto-alg aes-gcm-256 crypto-key 4973436c5458655a486b6c776158634f755a6b4767497a67797155706b626373 esp
exec ipsec tunnel protect ipip31 sa-out 31 sa-in 100031 add
exec set interface ip address loop0 100.0.32.1/32
exec create ipip tunnel src 100.0.32.1 dst 200.0.0.102 p2p
exec ipsec sa add 32 spi 100032 crypto-alg aes-gcm-256 crypto-key 755162624249444d635158476656655541745674635857494144656e4a57616c esp
exec ipsec sa add 100032 spi 200032 crypto-alg aes-gcm-256 crypto-key 755162624249444d635158476656655541745674635857494144656e4a57616c esp
exec ipsec tunnel protect ipip32 sa-out 32 sa-in 100032 add
exec set interface ip address loop0 100.0.33.1/32
exec create ipip tunnel src 100.0.33.1 dst 200.0.0.102 p2p
exec ipsec sa add 33 spi 100033 crypto-alg aes-gcm-256 crypto-key 41547450514c5a4f4e62786e58775a6c77634545414a7a744e706f4a4d524853 esp
exec ipsec sa add 100033 spi 200033 crypto-alg aes-gcm-256 crypto-key 41547450514c5a4f4e62786e58775a6c77634545414a7a744e706f4a4d524853 esp
exec ipsec tunnel protect ipip33 sa-out 33 sa-in 100033 add
exec set interface ip address loop0 100.0.34.1/32
exec create ipip tunnel src 100.0.34.1 dst 200.0.0.102 p2p
exec ipsec sa add 34 spi 100034 crypto-alg aes-gcm-256 crypto-key 764d4a797874427a486a6c785746506a4f75754a505a4b594e4c6b5262676472 esp
exec ipsec sa add 100034 spi 200034 crypto-alg aes-gcm-256 crypto-key 764d4a797874427a486a6c785746506a4f75754a505a4b594e4c6b5262676472 esp
exec ipsec tunnel protect ipip34 sa-out 34 sa-in 100034 add
exec set interface ip address loop0 100.0.35.1/32
exec create ipip tunnel src 100.0.35.1 dst 200.0.0.102 p2p
exec ipsec sa add 35 spi 100035 crypto-alg aes-gcm-256 crypto-key 4976436f414e705a534a5a50576c7a6b4d50536e51594c684e6e7456474d7247 esp
exec ipsec sa add 100035 spi 200035 crypto-alg aes-gcm-256 crypto-key 4976436f414e705a534a5a50576c7a6b4d50536e51594c684e6e7456474d7247 esp
exec ipsec tunnel protect ipip35 sa-out 35 sa-in 100035 add
exec set interface ip address loop0 100.0.36.1/32
exec create ipip tunnel src 100.0.36.1 dst 200.0.0.102 p2p
exec ipsec sa add 36 spi 100036 crypto-alg aes-gcm-256 crypto-key 46456e43426d4d4961435942746d7475674e43446c694b78526c4163626b6843 esp
exec ipsec sa add 100036 spi 200036 crypto-alg aes-gcm-256 crypto-key 46456e43426d4d4961435942746d7475674e43446c694b78526c4163626b6843 esp
exec ipsec tunnel protect ipip36 sa-out 36 sa-in 100036 add
exec set interface ip address loop0 100.0.37.1/32
exec create ipip tunnel src 100.0.37.1 dst 200.0.0.102 p2p
exec ipsec sa add 37 spi 100037 crypto-alg aes-gcm-256 crypto-key 7377724771684a4f664e6e7478544746636163766653424b46666478636d5859 esp
exec ipsec sa add 100037 spi 200037 crypto-alg aes-gcm-256 crypto-key 7377724771684a4f664e6e7478544746636163766653424b46666478636d5859 esp
exec ipsec tunnel protect ipip37 sa-out 37 sa-in 100037 add
exec set interface ip address loop0 100.0.38.1/32
exec create ipip tunnel src 100.0.38.1 dst 200.0.0.102 p2p
exec ipsec sa add 38 spi 100038 crypto-alg aes-gcm-256 crypto-key 695a73534f704e6b6656464e5a785262486e5543426e525378594f625270414b esp
exec ipsec sa add 100038 spi 200038 crypto-alg aes-gcm-256 crypto-key 695a73534f704e6b6656464e5a785262486e5543426e525378594f625270414b esp
exec ipsec tunnel protect ipip38 sa-out 38 sa-in 100038 add
exec set interface ip address loop0 100.0.39.1/32
exec create ipip tunnel src 100.0.39.1 dst 200.0.0.102 p2p
exec ipsec sa add 39 spi 100039 crypto-alg aes-gcm-256 crypto-key 735143506d4d79595363677167696b6b4c4f557a757a7670646c536562507378 esp
exec ipsec sa add 100039 spi 200039 crypto-alg aes-gcm-256 crypto-key 735143506d4d79595363677167696b6b4c4f557a757a7670646c536562507378 esp
exec ipsec tunnel protect ipip39 sa-out 39 sa-in 100039 add
exec set interface unnumbered ipip0 use TenGigabitEthernet8/0/0
exec set interface state ipip0 up
exec ip route add 20.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use TenGigabitEthernet8/0/0
exec set interface state ipip1 up
exec ip route add 20.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use TenGigabitEthernet8/0/0
exec set interface state ipip2 up
exec ip route add 20.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use TenGigabitEthernet8/0/0
exec set interface state ipip3 up
exec ip route add 20.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use TenGigabitEthernet8/0/0
exec set interface state ipip4 up
exec ip route add 20.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use TenGigabitEthernet8/0/0
exec set interface state ipip5 up
exec ip route add 20.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use TenGigabitEthernet8/0/0
exec set interface state ipip6 up
exec ip route add 20.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use TenGigabitEthernet8/0/0
exec set interface state ipip7 up
exec ip route add 20.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use TenGigabitEthernet8/0/0
exec set interface state ipip8 up
exec ip route add 20.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use TenGigabitEthernet8/0/0
exec set interface state ipip9 up
exec ip route add 20.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use TenGigabitEthernet8/0/0
exec set interface state ipip10 up
exec ip route add 20.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use TenGigabitEthernet8/0/0
exec set interface state ipip11 up
exec ip route add 20.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use TenGigabitEthernet8/0/0
exec set interface state ipip12 up
exec ip route add 20.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use TenGigabitEthernet8/0/0
exec set interface state ipip13 up
exec ip route add 20.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use TenGigabitEthernet8/0/0
exec set interface state ipip14 up
exec ip route add 20.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use TenGigabitEthernet8/0/0
exec set interface state ipip15 up
exec ip route add 20.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use TenGigabitEthernet8/0/0
exec set interface state ipip16 up
exec ip route add 20.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use TenGigabitEthernet8/0/0
exec set interface state ipip17 up
exec ip route add 20.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use TenGigabitEthernet8/0/0
exec set interface state ipip18 up
exec ip route add 20.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use TenGigabitEthernet8/0/0
exec set interface state ipip19 up
exec ip route add 20.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use TenGigabitEthernet8/0/0
exec set interface state ipip20 up
exec ip route add 20.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use TenGigabitEthernet8/0/0
exec set interface state ipip21 up
exec ip route add 20.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use TenGigabitEthernet8/0/0
exec set interface state ipip22 up
exec ip route add 20.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use TenGigabitEthernet8/0/0
exec set interface state ipip23 up
exec ip route add 20.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use TenGigabitEthernet8/0/0
exec set interface state ipip24 up
exec ip route add 20.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use TenGigabitEthernet8/0/0
exec set interface state ipip25 up
exec ip route add 20.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use TenGigabitEthernet8/0/0
exec set interface state ipip26 up
exec ip route add 20.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use TenGigabitEthernet8/0/0
exec set interface state ipip27 up
exec ip route add 20.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use TenGigabitEthernet8/0/0
exec set interface state ipip28 up
exec ip route add 20.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use TenGigabitEthernet8/0/0
exec set interface state ipip29 up
exec ip route add 20.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use TenGigabitEthernet8/0/0
exec set interface state ipip30 up
exec ip route add 20.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use TenGigabitEthernet8/0/0
exec set interface state ipip31 up
exec ip route add 20.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use TenGigabitEthernet8/0/0
exec set interface state ipip32 up
exec ip route add 20.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use TenGigabitEthernet8/0/0
exec set interface state ipip33 up
exec ip route add 20.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use TenGigabitEthernet8/0/0
exec set interface state ipip34 up
exec ip route add 20.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use TenGigabitEthernet8/0/0
exec set interface state ipip35 up
exec ip route add 20.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use TenGigabitEthernet8/0/0
exec set interface state ipip36 up
exec ip route add 20.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use TenGigabitEthernet8/0/0
exec set interface state ipip37 up
exec ip route add 20.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use TenGigabitEthernet8/0/0
exec set interface state ipip38 up
exec ip route add 20.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use TenGigabitEthernet8/0/0
exec set interface state ipip39 up
exec ip route add 20.0.0.39/32 via ipip39
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec set interface ip address TenGigabitEthernet8/0/0 200.0.0.102/24.0
exec create ipip tunnel src 200.0.0.102 dst 100.0.0.1 p2p
exec ipsec sa add 100000 spi 200000 crypto-alg aes-gcm-256 crypto-key 705046507952685a6f45454c4d696f5761724d644b496a77485a69644d517578 esp
exec ipsec sa add 0 spi 100000 crypto-alg aes-gcm-256 crypto-key 705046507952685a6f45454c4d696f5761724d644b496a77485a69644d517578 esp
exec ipsec tunnel protect ipip0 sa-out 100000 sa-in 0 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.1.1 p2p
exec ipsec sa add 100001 spi 200001 crypto-alg aes-gcm-256 crypto-key 68774e595945524c68494b756365684957476b6c4d794e71414d4e45715a4a50 esp
exec ipsec sa add 1 spi 100001 crypto-alg aes-gcm-256 crypto-key 68774e595945524c68494b756365684957476b6c4d794e71414d4e45715a4a50 esp
exec ipsec tunnel protect ipip1 sa-out 100001 sa-in 1 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.2.1 p2p
exec ipsec sa add 100002 spi 200002 crypto-alg aes-gcm-256 crypto-key 717a4a7a4b64596f48496272434a6c41456f5046644562555142414172514a65 esp
exec ipsec sa add 2 spi 100002 crypto-alg aes-gcm-256 crypto-key 717a4a7a4b64596f48496272434a6c41456f5046644562555142414172514a65 esp
exec ipsec tunnel protect ipip2 sa-out 100002 sa-in 2 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.3.1 p2p
exec ipsec sa add 100003 spi 200003 crypto-alg aes-gcm-256 crypto-key 42454a4c6e6f4c6e4b536b4c4c6d726f4d4c72584f477a6d626f57714c6d4373 esp
exec ipsec sa add 3 spi 100003 crypto-alg aes-gcm-256 crypto-key 42454a4c6e6f4c6e4b536b4c4c6d726f4d4c72584f477a6d626f57714c6d4373 esp
exec ipsec tunnel protect ipip3 sa-out 100003 sa-in 3 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.4.1 p2p
exec ipsec sa add 100004 spi 200004 crypto-alg aes-gcm-256 crypto-key 556257576a51434e735a4f4c6554424753666b484c4463556478764a72504548 esp
exec ipsec sa add 4 spi 100004 crypto-alg aes-gcm-256 crypto-key 556257576a51434e735a4f4c6554424753666b484c4463556478764a72504548 esp
exec ipsec tunnel protect ipip4 sa-out 100004 sa-in 4 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.5.1 p2p
exec ipsec sa add 100005 spi 200005 crypto-alg aes-gcm-256 crypto-key 50427455734e4e59714c546e7853424e6559426750735153464e567378675554 esp
exec ipsec sa add 5 spi 100005 crypto-alg aes-gcm-256 crypto-key 50427455734e4e59714c546e7853424e6559426750735153464e567378675554 esp
exec ipsec tunnel protect ipip5 sa-out 100005 sa-in 5 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.6.1 p2p
exec ipsec sa add 100006 spi 200006 crypto-alg aes-gcm-256 crypto-key 4b556950586b617454506c44526647534c655751504249544262776f6769624d esp
exec ipsec sa add 6 spi 100006 crypto-alg aes-gcm-256 crypto-key 4b556950586b617454506c44526647534c655751504249544262776f6769624d esp
exec ipsec tunnel protect ipip6 sa-out 100006 sa-in 6 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.7.1 p2p
exec ipsec sa add 100007 spi 200007 crypto-alg aes-gcm-256 crypto-key 4f536e70746e50636d4e77784e79754c7651555673696d49577066474e457661 esp
exec ipsec sa add 7 spi 100007 crypto-alg aes-gcm-256 crypto-key 4f536e70746e50636d4e77784e79754c7651555673696d49577066474e457661 esp
exec ipsec tunnel protect ipip7 sa-out 100007 sa-in 7 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.8.1 p2p
exec ipsec sa add 100008 spi 200008 crypto-alg aes-gcm-256 crypto-key 6a4a446c6249514c5179634351766d6e534872564b52726748505671785a764d esp
exec ipsec sa add 8 spi 100008 crypto-alg aes-gcm-256 crypto-key 6a4a446c6249514c5179634351766d6e534872564b52726748505671785a764d esp
exec ipsec tunnel protect ipip8 sa-out 100008 sa-in 8 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.9.1 p2p
exec ipsec sa add 100009 spi 200009 crypto-alg aes-gcm-256 crypto-key 7152535062784d6672745964536f4c66737044584f6363684b4f524676516850 esp
exec ipsec sa add 9 spi 100009 crypto-alg aes-gcm-256 crypto-key 7152535062784d6672745964536f4c66737044584f6363684b4f524676516850 esp
exec ipsec tunnel protect ipip9 sa-out 100009 sa-in 9 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.10.1 p2p
exec ipsec sa add 100010 spi 200010 crypto-alg aes-gcm-256 crypto-key 444f72555277697156715255665372766e645157704666696b6f6e4443776166 esp
exec ipsec sa add 10 spi 100010 crypto-alg aes-gcm-256 crypto-key 444f72555277697156715255665372766e645157704666696b6f6e4443776166 esp
exec ipsec tunnel protect ipip10 sa-out 100010 sa-in 10 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.11.1 p2p
exec ipsec sa add 100011 spi 200011 crypto-alg aes-gcm-256 crypto-key 64546b645945657a517173446157785042487557664749666367427743716159 esp
exec ipsec sa add 11 spi 100011 crypto-alg aes-gcm-256 crypto-key 64546b645945657a517173446157785042487557664749666367427743716159 esp
exec ipsec tunnel protect ipip11 sa-out 100011 sa-in 11 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.12.1 p2p
exec ipsec sa add 100012 spi 200012 crypto-alg aes-gcm-256 crypto-key 6e654570724871754152675373627245774779776e426242414855684d525078 esp
exec ipsec sa add 12 spi 100012 crypto-alg aes-gcm-256 crypto-key 6e654570724871754152675373627245774779776e426242414855684d525078 esp
exec ipsec tunnel protect ipip12 sa-out 100012 sa-in 12 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.13.1 p2p
exec ipsec sa add 100013 spi 200013 crypto-alg aes-gcm-256 crypto-key 6e47556770494e757764596b51544950696259415075646e6b556c5a68645059 esp
exec ipsec sa add 13 spi 100013 crypto-alg aes-gcm-256 crypto-key 6e47556770494e757764596b51544950696259415075646e6b556c5a68645059 esp
exec ipsec tunnel protect ipip13 sa-out 100013 sa-in 13 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.14.1 p2p
exec ipsec sa add 100014 spi 200014 crypto-alg aes-gcm-256 crypto-key 526d70754a4f587245756242416c45475a554f74415574414c575251746c764c esp
exec ipsec sa add 14 spi 100014 crypto-alg aes-gcm-256 crypto-key 526d70754a4f587245756242416c45475a554f74415574414c575251746c764c esp
exec ipsec tunnel protect ipip14 sa-out 100014 sa-in 14 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.15.1 p2p
exec ipsec sa add 100015 spi 200015 crypto-alg aes-gcm-256 crypto-key 7a6e544274556e76596f4f7a6b70576161456563525a6a7264514b6d4f744d4d esp
exec ipsec sa add 15 spi 100015 crypto-alg aes-gcm-256 crypto-key 7a6e544274556e76596f4f7a6b70576161456563525a6a7264514b6d4f744d4d esp
exec ipsec tunnel protect ipip15 sa-out 100015 sa-in 15 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.16.1 p2p
exec ipsec sa add 100016 spi 200016 crypto-alg aes-gcm-256 crypto-key 50666b7659635476714c67676a476f714c444a77486c715a5045454242775357 esp
exec ipsec sa add 16 spi 100016 crypto-alg aes-gcm-256 crypto-key 50666b7659635476714c67676a476f714c444a77486c715a5045454242775357 esp
exec ipsec tunnel protect ipip16 sa-out 100016 sa-in 16 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.17.1 p2p
exec ipsec sa add 100017 spi 200017 crypto-alg aes-gcm-256 crypto-key 6c476565585359536b46616642436457415347515263644a567169594f6d446c esp
exec ipsec sa add 17 spi 100017 crypto-alg aes-gcm-256 crypto-key 6c476565585359536b46616642436457415347515263644a567169594f6d446c esp
exec ipsec tunnel protect ipip17 sa-out 100017 sa-in 17 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.18.1 p2p
exec ipsec sa add 100018 spi 200018 crypto-alg aes-gcm-256 crypto-key 7a6156627041564a534a637073424a747857714245734e6c6d465a634e65766e esp
exec ipsec sa add 18 spi 100018 crypto-alg aes-gcm-256 crypto-key 7a6156627041564a534a637073424a747857714245734e6c6d465a634e65766e esp
exec ipsec tunnel protect ipip18 sa-out 100018 sa-in 18 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.19.1 p2p
exec ipsec sa add 100019 spi 200019 crypto-alg aes-gcm-256 crypto-key 43764a616f6953625066414a4142445a7779715354777a7374744a77584b4c4f esp
exec ipsec sa add 19 spi 100019 crypto-alg aes-gcm-256 crypto-key 43764a616f6953625066414a4142445a7779715354777a7374744a77584b4c4f esp
exec ipsec tunnel protect ipip19 sa-out 100019 sa-in 19 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.20.1 p2p
exec ipsec sa add 100020 spi 200020 crypto-alg aes-gcm-256 crypto-key 547753635a566b65746758764b5677764b6d77535466426b724f45716574744b esp
exec ipsec sa add 20 spi 100020 crypto-alg aes-gcm-256 crypto-key 547753635a566b65746758764b5677764b6d77535466426b724f45716574744b esp
exec ipsec tunnel protect ipip20 sa-out 100020 sa-in 20 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.21.1 p2p
exec ipsec sa add 100021 spi 200021 crypto-alg aes-gcm-256 crypto-key 4f73707968434c46756867666d486767556f744b7465796f7569557874646c61 esp
exec ipsec sa add 21 spi 100021 crypto-alg aes-gcm-256 crypto-key 4f73707968434c46756867666d486767556f744b7465796f7569557874646c61 esp
exec ipsec tunnel protect ipip21 sa-out 100021 sa-in 21 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.22.1 p2p
exec ipsec sa add 100022 spi 200022 crypto-alg aes-gcm-256 crypto-key 4249706d6b4c536b6c4d696c6a525a6a47464b4f634d77454943737953474470 esp
exec ipsec sa add 22 spi 100022 crypto-alg aes-gcm-256 crypto-key 4249706d6b4c536b6c4d696c6a525a6a47464b4f634d77454943737953474470 esp
exec ipsec tunnel protect ipip22 sa-out 100022 sa-in 22 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.23.1 p2p
exec ipsec sa add 100023 spi 200023 crypto-alg aes-gcm-256 crypto-key 49736e5a574b6578644748674477474c42557358787866566c6d445576745964 esp
exec ipsec sa add 23 spi 100023 crypto-alg aes-gcm-256 crypto-key 49736e5a574b6578644748674477474c42557358787866566c6d445576745964 esp
exec ipsec tunnel protect ipip23 sa-out 100023 sa-in 23 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.24.1 p2p
exec ipsec sa add 100024 spi 200024 crypto-alg aes-gcm-256 crypto-key 7649766d6c706a465549536b4d79535665726f56505361466561686547624244 esp
exec ipsec sa add 24 spi 100024 crypto-alg aes-gcm-256 crypto-key 7649766d6c706a465549536b4d79535665726f56505361466561686547624244 esp
exec ipsec tunnel protect ipip24 sa-out 100024 sa-in 24 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.25.1 p2p
exec ipsec sa add 100025 spi 200025 crypto-alg aes-gcm-256 crypto-key 5062506969586564456452524d436a4252517a47414c647a6549574c7a4a434f esp
exec ipsec sa add 25 spi 100025 crypto-alg aes-gcm-256 crypto-key 5062506969586564456452524d436a4252517a47414c647a6549574c7a4a434f esp
exec ipsec tunnel protect ipip25 sa-out 100025 sa-in 25 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.26.1 p2p
exec ipsec sa add 100026 spi 200026 crypto-alg aes-gcm-256 crypto-key 77596f7a4979506469524a5265576c6c62675650636b7579776e69446d475975 esp
exec ipsec sa add 26 spi 100026 crypto-alg aes-gcm-256 crypto-key 77596f7a4979506469524a5265576c6c62675650636b7579776e69446d475975 esp
exec ipsec tunnel protect ipip26 sa-out 100026 sa-in 26 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.27.1 p2p
exec ipsec sa add 100027 spi 200027 crypto-alg aes-gcm-256 crypto-key 465776676d65776d6f6f4c6a4c4a484672597047764a4f4e6f704f634c484273 esp
exec ipsec sa add 27 spi 100027 crypto-alg aes-gcm-256 crypto-key 465776676d65776d6f6f4c6a4c4a484672597047764a4f4e6f704f634c484273 esp
exec ipsec tunnel protect ipip27 sa-out 100027 sa-in 27 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.28.1 p2p
exec ipsec sa add 100028 spi 200028 crypto-alg aes-gcm-256 crypto-key 6b78505944556c744f62416975435a4b4a6a4268566a78685272505448787a45 esp
exec ipsec sa add 28 spi 100028 crypto-alg aes-gcm-256 crypto-key 6b78505944556c744f62416975435a4b4a6a4268566a78685272505448787a45 esp
exec ipsec tunnel protect ipip28 sa-out 100028 sa-in 28 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.29.1 p2p
exec ipsec sa add 100029 spi 200029 crypto-alg aes-gcm-256 crypto-key 716a5958594d4e6c425a43566a6c7574595854547478705555575a6259714877 esp
exec ipsec sa add 29 spi 100029 crypto-alg aes-gcm-256 crypto-key 716a5958594d4e6c425a43566a6c7574595854547478705555575a6259714877 esp
exec ipsec tunnel protect ipip29 sa-out 100029 sa-in 29 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.30.1 p2p
exec ipsec sa add 100030 spi 200030 crypto-alg aes-gcm-256 crypto-key 6555737971476e6e74726a494f6c647a626a4f646d616a6f48726568585a465a esp
exec ipsec sa add 30 spi 100030 crypto-alg aes-gcm-256 crypto-key 6555737971476e6e74726a494f6c647a626a4f646d616a6f48726568585a465a esp
exec ipsec tunnel protect ipip30 sa-out 100030 sa-in 30 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.31.1 p2p
exec ipsec sa add 100031 spi 200031 crypto-alg aes-gcm-256 crypto-key 4973436c5458655a486b6c776158634f755a6b4767497a67797155706b626373 esp
exec ipsec sa add 31 spi 100031 crypto-alg aes-gcm-256 crypto-key 4973436c5458655a486b6c776158634f755a6b4767497a67797155706b626373 esp
exec ipsec tunnel protect ipip31 sa-out 100031 sa-in 31 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.32.1 p2p
exec ipsec sa add 100032 spi 200032 crypto-alg aes-gcm-256 crypto-key 755162624249444d635158476656655541745674635857494144656e4a57616c esp
exec ipsec sa add 32 spi 100032 crypto-alg aes-gcm-256 crypto-key 755162624249444d635158476656655541745674635857494144656e4a57616c esp
exec ipsec tunnel protect ipip32 sa-out 100032 sa-in 32 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.33.1 p2p
exec ipsec sa add 100033 spi 200033 crypto-alg aes-gcm-256 crypto-key 41547450514c5a4f4e62786e58775a6c77634545414a7a744e706f4a4d524853 esp
exec ipsec sa add 33 spi 100033 crypto-alg aes-gcm-256 crypto-key 41547450514c5a4f4e62786e58775a6c77634545414a7a744e706f4a4d524853 esp
exec ipsec tunnel protect ipip33 sa-out 100033 sa-in 33 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.34.1 p2p
exec ipsec sa add 100034 spi 200034 crypto-alg aes-gcm-256 crypto-key 764d4a797874427a486a6c785746506a4f75754a505a4b594e4c6b5262676472 esp
exec ipsec sa add 34 spi 100034 crypto-alg aes-gcm-256 crypto-key 764d4a797874427a486a6c785746506a4f75754a505a4b594e4c6b5262676472 esp
exec ipsec tunnel protect ipip34 sa-out 100034 sa-in 34 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.35.1 p2p
exec ipsec sa add 100035 spi 200035 crypto-alg aes-gcm-256 crypto-key 4976436f414e705a534a5a50576c7a6b4d50536e51594c684e6e7456474d7247 esp
exec ipsec sa add 35 spi 100035 crypto-alg aes-gcm-256 crypto-key 4976436f414e705a534a5a50576c7a6b4d50536e51594c684e6e7456474d7247 esp
exec ipsec tunnel protect ipip35 sa-out 100035 sa-in 35 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.36.1 p2p
exec ipsec sa add 100036 spi 200036 crypto-alg aes-gcm-256 crypto-key 46456e43426d4d4961435942746d7475674e43446c694b78526c4163626b6843 esp
exec ipsec sa add 36 spi 100036 crypto-alg aes-gcm-256 crypto-key 46456e43426d4d4961435942746d7475674e43446c694b78526c4163626b6843 esp
exec ipsec tunnel protect ipip36 sa-out 100036 sa-in 36 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.37.1 p2p
exec ipsec sa add 100037 spi 200037 crypto-alg aes-gcm-256 crypto-key 7377724771684a4f664e6e7478544746636163766653424b46666478636d5859 esp
exec ipsec sa add 37 spi 100037 crypto-alg aes-gcm-256 crypto-key 7377724771684a4f664e6e7478544746636163766653424b46666478636d5859 esp
exec ipsec tunnel protect ipip37 sa-out 100037 sa-in 37 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.38.1 p2p
exec ipsec sa add 100038 spi 200038 crypto-alg aes-gcm-256 crypto-key 695a73534f704e6b6656464e5a785262486e5543426e525378594f625270414b esp
exec ipsec sa add 38 spi 100038 crypto-alg aes-gcm-256 crypto-key 695a73534f704e6b6656464e5a785262486e5543426e525378594f625270414b esp
exec ipsec tunnel protect ipip38 sa-out 100038 sa-in 38 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.39.1 p2p
exec ipsec sa add 100039 spi 200039 crypto-alg aes-gcm-256 crypto-key 735143506d4d79595363677167696b6b4c4f557a757a7670646c536562507378 esp
exec ipsec sa add 39 spi 100039 crypto-alg aes-gcm-256 crypto-key 735143506d4d79595363677167696b6b4c4f557a757a7670646c536562507378 esp
exec ipsec tunnel protect ipip39 sa-out 100039 sa-in 39 add
exec ip route add 100.0.0.1/8 via 200.0.0.101 TenGigabitEthernet8/0/0
exec set interface unnumbered ipip0 use TenGigabitEthernet8/0/0
exec set interface state ipip0 up
exec ip route add 10.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use TenGigabitEthernet8/0/0
exec set interface state ipip1 up
exec ip route add 10.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use TenGigabitEthernet8/0/0
exec set interface state ipip2 up
exec ip route add 10.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use TenGigabitEthernet8/0/0
exec set interface state ipip3 up
exec ip route add 10.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use TenGigabitEthernet8/0/0
exec set interface state ipip4 up
exec ip route add 10.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use TenGigabitEthernet8/0/0
exec set interface state ipip5 up
exec ip route add 10.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use TenGigabitEthernet8/0/0
exec set interface state ipip6 up
exec ip route add 10.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use TenGigabitEthernet8/0/0
exec set interface state ipip7 up
exec ip route add 10.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use TenGigabitEthernet8/0/0
exec set interface state ipip8 up
exec ip route add 10.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use TenGigabitEthernet8/0/0
exec set interface state ipip9 up
exec ip route add 10.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use TenGigabitEthernet8/0/0
exec set interface state ipip10 up
exec ip route add 10.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use TenGigabitEthernet8/0/0
exec set interface state ipip11 up
exec ip route add 10.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use TenGigabitEthernet8/0/0
exec set interface state ipip12 up
exec ip route add 10.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use TenGigabitEthernet8/0/0
exec set interface state ipip13 up
exec ip route add 10.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use TenGigabitEthernet8/0/0
exec set interface state ipip14 up
exec ip route add 10.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use TenGigabitEthernet8/0/0
exec set interface state ipip15 up
exec ip route add 10.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use TenGigabitEthernet8/0/0
exec set interface state ipip16 up
exec ip route add 10.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use TenGigabitEthernet8/0/0
exec set interface state ipip17 up
exec ip route add 10.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use TenGigabitEthernet8/0/0
exec set interface state ipip18 up
exec ip route add 10.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use TenGigabitEthernet8/0/0
exec set interface state ipip19 up
exec ip route add 10.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use TenGigabitEthernet8/0/0
exec set interface state ipip20 up
exec ip route add 10.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use TenGigabitEthernet8/0/0
exec set interface state ipip21 up
exec ip route add 10.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use TenGigabitEthernet8/0/0
exec set interface state ipip22 up
exec ip route add 10.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use TenGigabitEthernet8/0/0
exec set interface state ipip23 up
exec ip route add 10.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use TenGigabitEthernet8/0/0
exec set interface state ipip24 up
exec ip route add 10.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use TenGigabitEthernet8/0/0
exec set interface state ipip25 up
exec ip route add 10.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use TenGigabitEthernet8/0/0
exec set interface state ipip26 up
exec ip route add 10.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use TenGigabitEthernet8/0/0
exec set interface state ipip27 up
exec ip route add 10.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use TenGigabitEthernet8/0/0
exec set interface state ipip28 up
exec ip route add 10.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use TenGigabitEthernet8/0/0
exec set interface state ipip29 up
exec ip route add 10.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use TenGigabitEthernet8/0/0
exec set interface state ipip30 up
exec ip route add 10.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use TenGigabitEthernet8/0/0
exec set interface state ipip31 up
exec ip route add 10.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use TenGigabitEthernet8/0/0
exec set interface state ipip32 up
exec ip route add 10.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use TenGigabitEthernet8/0/0
exec set interface state ipip33 up
exec ip route add 10.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use TenGigabitEthernet8/0/0
exec set interface state ipip34 up
exec ip route add 10.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use TenGigabitEthernet8/0/0
exec set interface state ipip35 up
exec ip route add 10.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use TenGigabitEthernet8/0/0
exec set interface state ipip36 up
exec ip route add 10.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use TenGigabitEthernet8/0/0
exec set interface state ipip37 up
exec ip route add 10.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use TenGigabitEthernet8/0/0
exec set interface state ipip38 up
exec ip route add 10.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use TenGigabitEthernet8/0/0
exec set interface state ipip39 up
exec ip route add 10.0.0.39/32 via ipip39

 64b-4t4c-ethip4ipsec40tnlsw- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec create loopback interface
exec set interface state loop0 up
exec set interface ip address TenGigabitEthernet8/0/0 200.0.0.101/24
exec set ip neighbor TenGigabitEthernet8/0/0 200.0.0.102 ac:1f:6b:57:57:fe static
exec set interface ip address loop0 100.0.0.1/32
exec create ipip tunnel src 100.0.0.1 dst 200.0.0.102 p2p
exec ipsec sa add 0 spi 100000 crypto-alg aes-gcm-256 crypto-key 7a65796f554a45507674586a737951505744486d554d456973754269434a4e63 esp
exec ipsec sa add 100000 spi 200000 crypto-alg aes-gcm-256 crypto-key 7a65796f554a45507674586a737951505744486d554d456973754269434a4e63 esp
exec ipsec tunnel protect ipip0 sa-out 0 sa-in 100000 add
exec set interface ip address loop0 100.0.1.1/32
exec create ipip tunnel src 100.0.1.1 dst 200.0.0.102 p2p
exec ipsec sa add 1 spi 100001 crypto-alg aes-gcm-256 crypto-key 4f6644784e6d66414a674643794c574f68734c4c574b745652687259444a7048 esp
exec ipsec sa add 100001 spi 200001 crypto-alg aes-gcm-256 crypto-key 4f6644784e6d66414a674643794c574f68734c4c574b745652687259444a7048 esp
exec ipsec tunnel protect ipip1 sa-out 1 sa-in 100001 add
exec set interface ip address loop0 100.0.2.1/32
exec create ipip tunnel src 100.0.2.1 dst 200.0.0.102 p2p
exec ipsec sa add 2 spi 100002 crypto-alg aes-gcm-256 crypto-key 664f775748634d50694279796d696d61416356666356494a735947445443455a esp
exec ipsec sa add 100002 spi 200002 crypto-alg aes-gcm-256 crypto-key 664f775748634d50694279796d696d61416356666356494a735947445443455a esp
exec ipsec tunnel protect ipip2 sa-out 2 sa-in 100002 add
exec set interface ip address loop0 100.0.3.1/32
exec create ipip tunnel src 100.0.3.1 dst 200.0.0.102 p2p
exec ipsec sa add 3 spi 100003 crypto-alg aes-gcm-256 crypto-key 6741704b7668756c637171514f586144566a426d65464d624253557061585041 esp
exec ipsec sa add 100003 spi 200003 crypto-alg aes-gcm-256 crypto-key 6741704b7668756c637171514f586144566a426d65464d624253557061585041 esp
exec ipsec tunnel protect ipip3 sa-out 3 sa-in 100003 add
exec set interface ip address loop0 100.0.4.1/32
exec create ipip tunnel src 100.0.4.1 dst 200.0.0.102 p2p
exec ipsec sa add 4 spi 100004 crypto-alg aes-gcm-256 crypto-key 4b68625252446f785658736e45715048657a78744b49694a6d6853535a516761 esp
exec ipsec sa add 100004 spi 200004 crypto-alg aes-gcm-256 crypto-key 4b68625252446f785658736e45715048657a78744b49694a6d6853535a516761 esp
exec ipsec tunnel protect ipip4 sa-out 4 sa-in 100004 add
exec set interface ip address loop0 100.0.5.1/32
exec create ipip tunnel src 100.0.5.1 dst 200.0.0.102 p2p
exec ipsec sa add 5 spi 100005 crypto-alg aes-gcm-256 crypto-key 6e7656725762534b784d696f71487362534452524156597042597a775744737a esp
exec ipsec sa add 100005 spi 200005 crypto-alg aes-gcm-256 crypto-key 6e7656725762534b784d696f71487362534452524156597042597a775744737a esp
exec ipsec tunnel protect ipip5 sa-out 5 sa-in 100005 add
exec set interface ip address loop0 100.0.6.1/32
exec create ipip tunnel src 100.0.6.1 dst 200.0.0.102 p2p
exec ipsec sa add 6 spi 100006 crypto-alg aes-gcm-256 crypto-key 4567584946724f6f4d4a494768464b72735346566b69724267737950426c5264 esp
exec ipsec sa add 100006 spi 200006 crypto-alg aes-gcm-256 crypto-key 4567584946724f6f4d4a494768464b72735346566b69724267737950426c5264 esp
exec ipsec tunnel protect ipip6 sa-out 6 sa-in 100006 add
exec set interface ip address loop0 100.0.7.1/32
exec create ipip tunnel src 100.0.7.1 dst 200.0.0.102 p2p
exec ipsec sa add 7 spi 100007 crypto-alg aes-gcm-256 crypto-key 6a6c76416e666b5077524d4d73596444736e716178637a78454669555868616b esp
exec ipsec sa add 100007 spi 200007 crypto-alg aes-gcm-256 crypto-key 6a6c76416e666b5077524d4d73596444736e716178637a78454669555868616b esp
exec ipsec tunnel protect ipip7 sa-out 7 sa-in 100007 add
exec set interface ip address loop0 100.0.8.1/32
exec create ipip tunnel src 100.0.8.1 dst 200.0.0.102 p2p
exec ipsec sa add 8 spi 100008 crypto-alg aes-gcm-256 crypto-key 715073544772576d64734c746b63706e634472765779775551685a667849554d esp
exec ipsec sa add 100008 spi 200008 crypto-alg aes-gcm-256 crypto-key 715073544772576d64734c746b63706e634472765779775551685a667849554d esp
exec ipsec tunnel protect ipip8 sa-out 8 sa-in 100008 add
exec set interface ip address loop0 100.0.9.1/32
exec create ipip tunnel src 100.0.9.1 dst 200.0.0.102 p2p
exec ipsec sa add 9 spi 100009 crypto-alg aes-gcm-256 crypto-key 566548626d4277676a43494c6c6d616d63426e44514d5346726855786b777372 esp
exec ipsec sa add 100009 spi 200009 crypto-alg aes-gcm-256 crypto-key 566548626d4277676a43494c6c6d616d63426e44514d5346726855786b777372 esp
exec ipsec tunnel protect ipip9 sa-out 9 sa-in 100009 add
exec set interface ip address loop0 100.0.10.1/32
exec create ipip tunnel src 100.0.10.1 dst 200.0.0.102 p2p
exec ipsec sa add 10 spi 100010 crypto-alg aes-gcm-256 crypto-key 7878496e6c6868574a4866524a4a416b6c537a4562514c4d684369714c4f6d44 esp
exec ipsec sa add 100010 spi 200010 crypto-alg aes-gcm-256 crypto-key 7878496e6c6868574a4866524a4a416b6c537a4562514c4d684369714c4f6d44 esp
exec ipsec tunnel protect ipip10 sa-out 10 sa-in 100010 add
exec set interface ip address loop0 100.0.11.1/32
exec create ipip tunnel src 100.0.11.1 dst 200.0.0.102 p2p
exec ipsec sa add 11 spi 100011 crypto-alg aes-gcm-256 crypto-key 744c57596a59657271727a654c504c724c5a766e454f674d6f42754771744265 esp
exec ipsec sa add 100011 spi 200011 crypto-alg aes-gcm-256 crypto-key 744c57596a59657271727a654c504c724c5a766e454f674d6f42754771744265 esp
exec ipsec tunnel protect ipip11 sa-out 11 sa-in 100011 add
exec set interface ip address loop0 100.0.12.1/32
exec create ipip tunnel src 100.0.12.1 dst 200.0.0.102 p2p
exec ipsec sa add 12 spi 100012 crypto-alg aes-gcm-256 crypto-key 6754467773756654716663566b7350537573524e6b785a4b77624a56694f6270 esp
exec ipsec sa add 100012 spi 200012 crypto-alg aes-gcm-256 crypto-key 6754467773756654716663566b7350537573524e6b785a4b77624a56694f6270 esp
exec ipsec tunnel protect ipip12 sa-out 12 sa-in 100012 add
exec set interface ip address loop0 100.0.13.1/32
exec create ipip tunnel src 100.0.13.1 dst 200.0.0.102 p2p
exec ipsec sa add 13 spi 100013 crypto-alg aes-gcm-256 crypto-key 4156735776716e65434763584c6d70616668704f5970756f6645464f7669684e esp
exec ipsec sa add 100013 spi 200013 crypto-alg aes-gcm-256 crypto-key 4156735776716e65434763584c6d70616668704f5970756f6645464f7669684e esp
exec ipsec tunnel protect ipip13 sa-out 13 sa-in 100013 add
exec set interface ip address loop0 100.0.14.1/32
exec create ipip tunnel src 100.0.14.1 dst 200.0.0.102 p2p
exec ipsec sa add 14 spi 100014 crypto-alg aes-gcm-256 crypto-key 6d6a6f5576454255554669744c53597757587a4a63624c6564644765704d4e6a esp
exec ipsec sa add 100014 spi 200014 crypto-alg aes-gcm-256 crypto-key 6d6a6f5576454255554669744c53597757587a4a63624c6564644765704d4e6a esp
exec ipsec tunnel protect ipip14 sa-out 14 sa-in 100014 add
exec set interface ip address loop0 100.0.15.1/32
exec create ipip tunnel src 100.0.15.1 dst 200.0.0.102 p2p
exec ipsec sa add 15 spi 100015 crypto-alg aes-gcm-256 crypto-key 61625766545169566f6e4e636d426d6456776371434f467179484c6147586159 esp
exec ipsec sa add 100015 spi 200015 crypto-alg aes-gcm-256 crypto-key 61625766545169566f6e4e636d426d6456776371434f467179484c6147586159 esp
exec ipsec tunnel protect ipip15 sa-out 15 sa-in 100015 add
exec set interface ip address loop0 100.0.16.1/32
exec create ipip tunnel src 100.0.16.1 dst 200.0.0.102 p2p
exec ipsec sa add 16 spi 100016 crypto-alg aes-gcm-256 crypto-key 67746258635169684d7645446e5a776446435656534f5773636249786b6c6d7a esp
exec ipsec sa add 100016 spi 200016 crypto-alg aes-gcm-256 crypto-key 67746258635169684d7645446e5a776446435656534f5773636249786b6c6d7a esp
exec ipsec tunnel protect ipip16 sa-out 16 sa-in 100016 add
exec set interface ip address loop0 100.0.17.1/32
exec create ipip tunnel src 100.0.17.1 dst 200.0.0.102 p2p
exec ipsec sa add 17 spi 100017 crypto-alg aes-gcm-256 crypto-key 7a474e5972436f4e6d5168455a6c4943707557414a74436868656a4b436a4f6c esp
exec ipsec sa add 100017 spi 200017 crypto-alg aes-gcm-256 crypto-key 7a474e5972436f4e6d5168455a6c4943707557414a74436868656a4b436a4f6c esp
exec ipsec tunnel protect ipip17 sa-out 17 sa-in 100017 add
exec set interface ip address loop0 100.0.18.1/32
exec create ipip tunnel src 100.0.18.1 dst 200.0.0.102 p2p
exec ipsec sa add 18 spi 100018 crypto-alg aes-gcm-256 crypto-key 5a414a4d4f4d48524a445544754b6b6d754463654975517a506769564e57676c esp
exec ipsec sa add 100018 spi 200018 crypto-alg aes-gcm-256 crypto-key 5a414a4d4f4d48524a445544754b6b6d754463654975517a506769564e57676c esp
exec ipsec tunnel protect ipip18 sa-out 18 sa-in 100018 add
exec set interface ip address loop0 100.0.19.1/32
exec create ipip tunnel src 100.0.19.1 dst 200.0.0.102 p2p
exec ipsec sa add 19 spi 100019 crypto-alg aes-gcm-256 crypto-key 50714356786c646e68775443744c6d666670736547525059445956616c727552 esp
exec ipsec sa add 100019 spi 200019 crypto-alg aes-gcm-256 crypto-key 50714356786c646e68775443744c6d666670736547525059445956616c727552 esp
exec ipsec tunnel protect ipip19 sa-out 19 sa-in 100019 add
exec set interface ip address loop0 100.0.20.1/32
exec create ipip tunnel src 100.0.20.1 dst 200.0.0.102 p2p
exec ipsec sa add 20 spi 100020 crypto-alg aes-gcm-256 crypto-key 4477794c554844436c53775a6969626e7362727a70646559767658754a617274 esp
exec ipsec sa add 100020 spi 200020 crypto-alg aes-gcm-256 crypto-key 4477794c554844436c53775a6969626e7362727a70646559767658754a617274 esp
exec ipsec tunnel protect ipip20 sa-out 20 sa-in 100020 add
exec set interface ip address loop0 100.0.21.1/32
exec create ipip tunnel src 100.0.21.1 dst 200.0.0.102 p2p
exec ipsec sa add 21 spi 100021 crypto-alg aes-gcm-256 crypto-key 44494168626e776d72736a4a68695166637263647257504571714e436551787a esp
exec ipsec sa add 100021 spi 200021 crypto-alg aes-gcm-256 crypto-key 44494168626e776d72736a4a68695166637263647257504571714e436551787a esp
exec ipsec tunnel protect ipip21 sa-out 21 sa-in 100021 add
exec set interface ip address loop0 100.0.22.1/32
exec create ipip tunnel src 100.0.22.1 dst 200.0.0.102 p2p
exec ipsec sa add 22 spi 100022 crypto-alg aes-gcm-256 crypto-key 69494f784d675661577642504749544863476a6b5a6475425665724e416f504d esp
exec ipsec sa add 100022 spi 200022 crypto-alg aes-gcm-256 crypto-key 69494f784d675661577642504749544863476a6b5a6475425665724e416f504d esp
exec ipsec tunnel protect ipip22 sa-out 22 sa-in 100022 add
exec set interface ip address loop0 100.0.23.1/32
exec create ipip tunnel src 100.0.23.1 dst 200.0.0.102 p2p
exec ipsec sa add 23 spi 100023 crypto-alg aes-gcm-256 crypto-key 5255664d4f5546737056724a50486c414b4b4153524c48777958437a6466504b esp
exec ipsec sa add 100023 spi 200023 crypto-alg aes-gcm-256 crypto-key 5255664d4f5546737056724a50486c414b4b4153524c48777958437a6466504b esp
exec ipsec tunnel protect ipip23 sa-out 23 sa-in 100023 add
exec set interface ip address loop0 100.0.24.1/32
exec create ipip tunnel src 100.0.24.1 dst 200.0.0.102 p2p
exec ipsec sa add 24 spi 100024 crypto-alg aes-gcm-256 crypto-key 514862764d754549517a47516f614e687759564e4c69724f4647784859575063 esp
exec ipsec sa add 100024 spi 200024 crypto-alg aes-gcm-256 crypto-key 514862764d754549517a47516f614e687759564e4c69724f4647784859575063 esp
exec ipsec tunnel protect ipip24 sa-out 24 sa-in 100024 add
exec set interface ip address loop0 100.0.25.1/32
exec create ipip tunnel src 100.0.25.1 dst 200.0.0.102 p2p
exec ipsec sa add 25 spi 100025 crypto-alg aes-gcm-256 crypto-key 4a6d51546855776c4d72596d4363485a54716b506949544b6c47755875464862 esp
exec ipsec sa add 100025 spi 200025 crypto-alg aes-gcm-256 crypto-key 4a6d51546855776c4d72596d4363485a54716b506949544b6c47755875464862 esp
exec ipsec tunnel protect ipip25 sa-out 25 sa-in 100025 add
exec set interface ip address loop0 100.0.26.1/32
exec create ipip tunnel src 100.0.26.1 dst 200.0.0.102 p2p
exec ipsec sa add 26 spi 100026 crypto-alg aes-gcm-256 crypto-key 646a4a4f4f4b5463467947524243555474645641755a54556977556c53504e4d esp
exec ipsec sa add 100026 spi 200026 crypto-alg aes-gcm-256 crypto-key 646a4a4f4f4b5463467947524243555474645641755a54556977556c53504e4d esp
exec ipsec tunnel protect ipip26 sa-out 26 sa-in 100026 add
exec set interface ip address loop0 100.0.27.1/32
exec create ipip tunnel src 100.0.27.1 dst 200.0.0.102 p2p
exec ipsec sa add 27 spi 100027 crypto-alg aes-gcm-256 crypto-key 64764b6a457a626e6b4f6141765a74534d56424d64636c577279796b4f707756 esp
exec ipsec sa add 100027 spi 200027 crypto-alg aes-gcm-256 crypto-key 64764b6a457a626e6b4f6141765a74534d56424d64636c577279796b4f707756 esp
exec ipsec tunnel protect ipip27 sa-out 27 sa-in 100027 add
exec set interface ip address loop0 100.0.28.1/32
exec create ipip tunnel src 100.0.28.1 dst 200.0.0.102 p2p
exec ipsec sa add 28 spi 100028 crypto-alg aes-gcm-256 crypto-key 64767a764879524e496a764a466a4d5566626f735947596472536d48434e6f56 esp
exec ipsec sa add 100028 spi 200028 crypto-alg aes-gcm-256 crypto-key 64767a764879524e496a764a466a4d5566626f735947596472536d48434e6f56 esp
exec ipsec tunnel protect ipip28 sa-out 28 sa-in 100028 add
exec set interface ip address loop0 100.0.29.1/32
exec create ipip tunnel src 100.0.29.1 dst 200.0.0.102 p2p
exec ipsec sa add 29 spi 100029 crypto-alg aes-gcm-256 crypto-key 6d754f4c6375546c697472536e4c7279585862514e7748664775694843776553 esp
exec ipsec sa add 100029 spi 200029 crypto-alg aes-gcm-256 crypto-key 6d754f4c6375546c697472536e4c7279585862514e7748664775694843776553 esp
exec ipsec tunnel protect ipip29 sa-out 29 sa-in 100029 add
exec set interface ip address loop0 100.0.30.1/32
exec create ipip tunnel src 100.0.30.1 dst 200.0.0.102 p2p
exec ipsec sa add 30 spi 100030 crypto-alg aes-gcm-256 crypto-key 4f71506c557452454274434d6266486c78647957564f74797778624c4471586b esp
exec ipsec sa add 100030 spi 200030 crypto-alg aes-gcm-256 crypto-key 4f71506c557452454274434d6266486c78647957564f74797778624c4471586b esp
exec ipsec tunnel protect ipip30 sa-out 30 sa-in 100030 add
exec set interface ip address loop0 100.0.31.1/32
exec create ipip tunnel src 100.0.31.1 dst 200.0.0.102 p2p
exec ipsec sa add 31 spi 100031 crypto-alg aes-gcm-256 crypto-key 674d7a5a694571504d764d45655157644e616c71495572494b73745a73694578 esp
exec ipsec sa add 100031 spi 200031 crypto-alg aes-gcm-256 crypto-key 674d7a5a694571504d764d45655157644e616c71495572494b73745a73694578 esp
exec ipsec tunnel protect ipip31 sa-out 31 sa-in 100031 add
exec set interface ip address loop0 100.0.32.1/32
exec create ipip tunnel src 100.0.32.1 dst 200.0.0.102 p2p
exec ipsec sa add 32 spi 100032 crypto-alg aes-gcm-256 crypto-key 584e676b6e534252764774654871775378635747657376795a456752746d7a6d esp
exec ipsec sa add 100032 spi 200032 crypto-alg aes-gcm-256 crypto-key 584e676b6e534252764774654871775378635747657376795a456752746d7a6d esp
exec ipsec tunnel protect ipip32 sa-out 32 sa-in 100032 add
exec set interface ip address loop0 100.0.33.1/32
exec create ipip tunnel src 100.0.33.1 dst 200.0.0.102 p2p
exec ipsec sa add 33 spi 100033 crypto-alg aes-gcm-256 crypto-key 706b7869517558436d46746b4c5a6d43426d6c4e514a4b5a524666446f4a6167 esp
exec ipsec sa add 100033 spi 200033 crypto-alg aes-gcm-256 crypto-key 706b7869517558436d46746b4c5a6d43426d6c4e514a4b5a524666446f4a6167 esp
exec ipsec tunnel protect ipip33 sa-out 33 sa-in 100033 add
exec set interface ip address loop0 100.0.34.1/32
exec create ipip tunnel src 100.0.34.1 dst 200.0.0.102 p2p
exec ipsec sa add 34 spi 100034 crypto-alg aes-gcm-256 crypto-key 614d674265584a6c6c5455464c6a6543487053496a7156576779625a49784666 esp
exec ipsec sa add 100034 spi 200034 crypto-alg aes-gcm-256 crypto-key 614d674265584a6c6c5455464c6a6543487053496a7156576779625a49784666 esp
exec ipsec tunnel protect ipip34 sa-out 34 sa-in 100034 add
exec set interface ip address loop0 100.0.35.1/32
exec create ipip tunnel src 100.0.35.1 dst 200.0.0.102 p2p
exec ipsec sa add 35 spi 100035 crypto-alg aes-gcm-256 crypto-key 666f615255476d706b54594569577a484b58646757727443494961646a4f7472 esp
exec ipsec sa add 100035 spi 200035 crypto-alg aes-gcm-256 crypto-key 666f615255476d706b54594569577a484b58646757727443494961646a4f7472 esp
exec ipsec tunnel protect ipip35 sa-out 35 sa-in 100035 add
exec set interface ip address loop0 100.0.36.1/32
exec create ipip tunnel src 100.0.36.1 dst 200.0.0.102 p2p
exec ipsec sa add 36 spi 100036 crypto-alg aes-gcm-256 crypto-key 417170477a526856705a766d416f546d4166556c734671635a4f616e696c4865 esp
exec ipsec sa add 100036 spi 200036 crypto-alg aes-gcm-256 crypto-key 417170477a526856705a766d416f546d4166556c734671635a4f616e696c4865 esp
exec ipsec tunnel protect ipip36 sa-out 36 sa-in 100036 add
exec set interface ip address loop0 100.0.37.1/32
exec create ipip tunnel src 100.0.37.1 dst 200.0.0.102 p2p
exec ipsec sa add 37 spi 100037 crypto-alg aes-gcm-256 crypto-key 4c4c634b737a66677451484371486b6376774245555677416262555056445163 esp
exec ipsec sa add 100037 spi 200037 crypto-alg aes-gcm-256 crypto-key 4c4c634b737a66677451484371486b6376774245555677416262555056445163 esp
exec ipsec tunnel protect ipip37 sa-out 37 sa-in 100037 add
exec set interface ip address loop0 100.0.38.1/32
exec create ipip tunnel src 100.0.38.1 dst 200.0.0.102 p2p
exec ipsec sa add 38 spi 100038 crypto-alg aes-gcm-256 crypto-key 44646370425a794f67634875776a4a4e7764475244734262555953764778454f esp
exec ipsec sa add 100038 spi 200038 crypto-alg aes-gcm-256 crypto-key 44646370425a794f67634875776a4a4e7764475244734262555953764778454f esp
exec ipsec tunnel protect ipip38 sa-out 38 sa-in 100038 add
exec set interface ip address loop0 100.0.39.1/32
exec create ipip tunnel src 100.0.39.1 dst 200.0.0.102 p2p
exec ipsec sa add 39 spi 100039 crypto-alg aes-gcm-256 crypto-key 4877557a7364614e4a645a4979714670794568634e6e7941465379546e524576 esp
exec ipsec sa add 100039 spi 200039 crypto-alg aes-gcm-256 crypto-key 4877557a7364614e4a645a4979714670794568634e6e7941465379546e524576 esp
exec ipsec tunnel protect ipip39 sa-out 39 sa-in 100039 add
exec set interface unnumbered ipip0 use TenGigabitEthernet8/0/0
exec set interface state ipip0 up
exec ip route add 20.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use TenGigabitEthernet8/0/0
exec set interface state ipip1 up
exec ip route add 20.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use TenGigabitEthernet8/0/0
exec set interface state ipip2 up
exec ip route add 20.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use TenGigabitEthernet8/0/0
exec set interface state ipip3 up
exec ip route add 20.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use TenGigabitEthernet8/0/0
exec set interface state ipip4 up
exec ip route add 20.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use TenGigabitEthernet8/0/0
exec set interface state ipip5 up
exec ip route add 20.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use TenGigabitEthernet8/0/0
exec set interface state ipip6 up
exec ip route add 20.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use TenGigabitEthernet8/0/0
exec set interface state ipip7 up
exec ip route add 20.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use TenGigabitEthernet8/0/0
exec set interface state ipip8 up
exec ip route add 20.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use TenGigabitEthernet8/0/0
exec set interface state ipip9 up
exec ip route add 20.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use TenGigabitEthernet8/0/0
exec set interface state ipip10 up
exec ip route add 20.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use TenGigabitEthernet8/0/0
exec set interface state ipip11 up
exec ip route add 20.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use TenGigabitEthernet8/0/0
exec set interface state ipip12 up
exec ip route add 20.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use TenGigabitEthernet8/0/0
exec set interface state ipip13 up
exec ip route add 20.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use TenGigabitEthernet8/0/0
exec set interface state ipip14 up
exec ip route add 20.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use TenGigabitEthernet8/0/0
exec set interface state ipip15 up
exec ip route add 20.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use TenGigabitEthernet8/0/0
exec set interface state ipip16 up
exec ip route add 20.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use TenGigabitEthernet8/0/0
exec set interface state ipip17 up
exec ip route add 20.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use TenGigabitEthernet8/0/0
exec set interface state ipip18 up
exec ip route add 20.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use TenGigabitEthernet8/0/0
exec set interface state ipip19 up
exec ip route add 20.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use TenGigabitEthernet8/0/0
exec set interface state ipip20 up
exec ip route add 20.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use TenGigabitEthernet8/0/0
exec set interface state ipip21 up
exec ip route add 20.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use TenGigabitEthernet8/0/0
exec set interface state ipip22 up
exec ip route add 20.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use TenGigabitEthernet8/0/0
exec set interface state ipip23 up
exec ip route add 20.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use TenGigabitEthernet8/0/0
exec set interface state ipip24 up
exec ip route add 20.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use TenGigabitEthernet8/0/0
exec set interface state ipip25 up
exec ip route add 20.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use TenGigabitEthernet8/0/0
exec set interface state ipip26 up
exec ip route add 20.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use TenGigabitEthernet8/0/0
exec set interface state ipip27 up
exec ip route add 20.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use TenGigabitEthernet8/0/0
exec set interface state ipip28 up
exec ip route add 20.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use TenGigabitEthernet8/0/0
exec set interface state ipip29 up
exec ip route add 20.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use TenGigabitEthernet8/0/0
exec set interface state ipip30 up
exec ip route add 20.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use TenGigabitEthernet8/0/0
exec set interface state ipip31 up
exec ip route add 20.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use TenGigabitEthernet8/0/0
exec set interface state ipip32 up
exec ip route add 20.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use TenGigabitEthernet8/0/0
exec set interface state ipip33 up
exec ip route add 20.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use TenGigabitEthernet8/0/0
exec set interface state ipip34 up
exec ip route add 20.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use TenGigabitEthernet8/0/0
exec set interface state ipip35 up
exec ip route add 20.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use TenGigabitEthernet8/0/0
exec set interface state ipip36 up
exec ip route add 20.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use TenGigabitEthernet8/0/0
exec set interface state ipip37 up
exec ip route add 20.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use TenGigabitEthernet8/0/0
exec set interface state ipip38 up
exec ip route add 20.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use TenGigabitEthernet8/0/0
exec set interface state ipip39 up
exec ip route add 20.0.0.39/32 via ipip39
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec set interface ip address TenGigabitEthernet8/0/0 200.0.0.102/24.0
exec create ipip tunnel src 200.0.0.102 dst 100.0.0.1 p2p
exec ipsec sa add 100000 spi 200000 crypto-alg aes-gcm-256 crypto-key 7a65796f554a45507674586a737951505744486d554d456973754269434a4e63 esp
exec ipsec sa add 0 spi 100000 crypto-alg aes-gcm-256 crypto-key 7a65796f554a45507674586a737951505744486d554d456973754269434a4e63 esp
exec ipsec tunnel protect ipip0 sa-out 100000 sa-in 0 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.1.1 p2p
exec ipsec sa add 100001 spi 200001 crypto-alg aes-gcm-256 crypto-key 4f6644784e6d66414a674643794c574f68734c4c574b745652687259444a7048 esp
exec ipsec sa add 1 spi 100001 crypto-alg aes-gcm-256 crypto-key 4f6644784e6d66414a674643794c574f68734c4c574b745652687259444a7048 esp
exec ipsec tunnel protect ipip1 sa-out 100001 sa-in 1 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.2.1 p2p
exec ipsec sa add 100002 spi 200002 crypto-alg aes-gcm-256 crypto-key 664f775748634d50694279796d696d61416356666356494a735947445443455a esp
exec ipsec sa add 2 spi 100002 crypto-alg aes-gcm-256 crypto-key 664f775748634d50694279796d696d61416356666356494a735947445443455a esp
exec ipsec tunnel protect ipip2 sa-out 100002 sa-in 2 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.3.1 p2p
exec ipsec sa add 100003 spi 200003 crypto-alg aes-gcm-256 crypto-key 6741704b7668756c637171514f586144566a426d65464d624253557061585041 esp
exec ipsec sa add 3 spi 100003 crypto-alg aes-gcm-256 crypto-key 6741704b7668756c637171514f586144566a426d65464d624253557061585041 esp
exec ipsec tunnel protect ipip3 sa-out 100003 sa-in 3 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.4.1 p2p
exec ipsec sa add 100004 spi 200004 crypto-alg aes-gcm-256 crypto-key 4b68625252446f785658736e45715048657a78744b49694a6d6853535a516761 esp
exec ipsec sa add 4 spi 100004 crypto-alg aes-gcm-256 crypto-key 4b68625252446f785658736e45715048657a78744b49694a6d6853535a516761 esp
exec ipsec tunnel protect ipip4 sa-out 100004 sa-in 4 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.5.1 p2p
exec ipsec sa add 100005 spi 200005 crypto-alg aes-gcm-256 crypto-key 6e7656725762534b784d696f71487362534452524156597042597a775744737a esp
exec ipsec sa add 5 spi 100005 crypto-alg aes-gcm-256 crypto-key 6e7656725762534b784d696f71487362534452524156597042597a775744737a esp
exec ipsec tunnel protect ipip5 sa-out 100005 sa-in 5 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.6.1 p2p
exec ipsec sa add 100006 spi 200006 crypto-alg aes-gcm-256 crypto-key 4567584946724f6f4d4a494768464b72735346566b69724267737950426c5264 esp
exec ipsec sa add 6 spi 100006 crypto-alg aes-gcm-256 crypto-key 4567584946724f6f4d4a494768464b72735346566b69724267737950426c5264 esp
exec ipsec tunnel protect ipip6 sa-out 100006 sa-in 6 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.7.1 p2p
exec ipsec sa add 100007 spi 200007 crypto-alg aes-gcm-256 crypto-key 6a6c76416e666b5077524d4d73596444736e716178637a78454669555868616b esp
exec ipsec sa add 7 spi 100007 crypto-alg aes-gcm-256 crypto-key 6a6c76416e666b5077524d4d73596444736e716178637a78454669555868616b esp
exec ipsec tunnel protect ipip7 sa-out 100007 sa-in 7 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.8.1 p2p
exec ipsec sa add 100008 spi 200008 crypto-alg aes-gcm-256 crypto-key 715073544772576d64734c746b63706e634472765779775551685a667849554d esp
exec ipsec sa add 8 spi 100008 crypto-alg aes-gcm-256 crypto-key 715073544772576d64734c746b63706e634472765779775551685a667849554d esp
exec ipsec tunnel protect ipip8 sa-out 100008 sa-in 8 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.9.1 p2p
exec ipsec sa add 100009 spi 200009 crypto-alg aes-gcm-256 crypto-key 566548626d4277676a43494c6c6d616d63426e44514d5346726855786b777372 esp
exec ipsec sa add 9 spi 100009 crypto-alg aes-gcm-256 crypto-key 566548626d4277676a43494c6c6d616d63426e44514d5346726855786b777372 esp
exec ipsec tunnel protect ipip9 sa-out 100009 sa-in 9 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.10.1 p2p
exec ipsec sa add 100010 spi 200010 crypto-alg aes-gcm-256 crypto-key 7878496e6c6868574a4866524a4a416b6c537a4562514c4d684369714c4f6d44 esp
exec ipsec sa add 10 spi 100010 crypto-alg aes-gcm-256 crypto-key 7878496e6c6868574a4866524a4a416b6c537a4562514c4d684369714c4f6d44 esp
exec ipsec tunnel protect ipip10 sa-out 100010 sa-in 10 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.11.1 p2p
exec ipsec sa add 100011 spi 200011 crypto-alg aes-gcm-256 crypto-key 744c57596a59657271727a654c504c724c5a766e454f674d6f42754771744265 esp
exec ipsec sa add 11 spi 100011 crypto-alg aes-gcm-256 crypto-key 744c57596a59657271727a654c504c724c5a766e454f674d6f42754771744265 esp
exec ipsec tunnel protect ipip11 sa-out 100011 sa-in 11 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.12.1 p2p
exec ipsec sa add 100012 spi 200012 crypto-alg aes-gcm-256 crypto-key 6754467773756654716663566b7350537573524e6b785a4b77624a56694f6270 esp
exec ipsec sa add 12 spi 100012 crypto-alg aes-gcm-256 crypto-key 6754467773756654716663566b7350537573524e6b785a4b77624a56694f6270 esp
exec ipsec tunnel protect ipip12 sa-out 100012 sa-in 12 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.13.1 p2p
exec ipsec sa add 100013 spi 200013 crypto-alg aes-gcm-256 crypto-key 4156735776716e65434763584c6d70616668704f5970756f6645464f7669684e esp
exec ipsec sa add 13 spi 100013 crypto-alg aes-gcm-256 crypto-key 4156735776716e65434763584c6d70616668704f5970756f6645464f7669684e esp
exec ipsec tunnel protect ipip13 sa-out 100013 sa-in 13 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.14.1 p2p
exec ipsec sa add 100014 spi 200014 crypto-alg aes-gcm-256 crypto-key 6d6a6f5576454255554669744c53597757587a4a63624c6564644765704d4e6a esp
exec ipsec sa add 14 spi 100014 crypto-alg aes-gcm-256 crypto-key 6d6a6f5576454255554669744c53597757587a4a63624c6564644765704d4e6a esp
exec ipsec tunnel protect ipip14 sa-out 100014 sa-in 14 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.15.1 p2p
exec ipsec sa add 100015 spi 200015 crypto-alg aes-gcm-256 crypto-key 61625766545169566f6e4e636d426d6456776371434f467179484c6147586159 esp
exec ipsec sa add 15 spi 100015 crypto-alg aes-gcm-256 crypto-key 61625766545169566f6e4e636d426d6456776371434f467179484c6147586159 esp
exec ipsec tunnel protect ipip15 sa-out 100015 sa-in 15 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.16.1 p2p
exec ipsec sa add 100016 spi 200016 crypto-alg aes-gcm-256 crypto-key 67746258635169684d7645446e5a776446435656534f5773636249786b6c6d7a esp
exec ipsec sa add 16 spi 100016 crypto-alg aes-gcm-256 crypto-key 67746258635169684d7645446e5a776446435656534f5773636249786b6c6d7a esp
exec ipsec tunnel protect ipip16 sa-out 100016 sa-in 16 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.17.1 p2p
exec ipsec sa add 100017 spi 200017 crypto-alg aes-gcm-256 crypto-key 7a474e5972436f4e6d5168455a6c4943707557414a74436868656a4b436a4f6c esp
exec ipsec sa add 17 spi 100017 crypto-alg aes-gcm-256 crypto-key 7a474e5972436f4e6d5168455a6c4943707557414a74436868656a4b436a4f6c esp
exec ipsec tunnel protect ipip17 sa-out 100017 sa-in 17 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.18.1 p2p
exec ipsec sa add 100018 spi 200018 crypto-alg aes-gcm-256 crypto-key 5a414a4d4f4d48524a445544754b6b6d754463654975517a506769564e57676c esp
exec ipsec sa add 18 spi 100018 crypto-alg aes-gcm-256 crypto-key 5a414a4d4f4d48524a445544754b6b6d754463654975517a506769564e57676c esp
exec ipsec tunnel protect ipip18 sa-out 100018 sa-in 18 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.19.1 p2p
exec ipsec sa add 100019 spi 200019 crypto-alg aes-gcm-256 crypto-key 50714356786c646e68775443744c6d666670736547525059445956616c727552 esp
exec ipsec sa add 19 spi 100019 crypto-alg aes-gcm-256 crypto-key 50714356786c646e68775443744c6d666670736547525059445956616c727552 esp
exec ipsec tunnel protect ipip19 sa-out 100019 sa-in 19 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.20.1 p2p
exec ipsec sa add 100020 spi 200020 crypto-alg aes-gcm-256 crypto-key 4477794c554844436c53775a6969626e7362727a70646559767658754a617274 esp
exec ipsec sa add 20 spi 100020 crypto-alg aes-gcm-256 crypto-key 4477794c554844436c53775a6969626e7362727a70646559767658754a617274 esp
exec ipsec tunnel protect ipip20 sa-out 100020 sa-in 20 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.21.1 p2p
exec ipsec sa add 100021 spi 200021 crypto-alg aes-gcm-256 crypto-key 44494168626e776d72736a4a68695166637263647257504571714e436551787a esp
exec ipsec sa add 21 spi 100021 crypto-alg aes-gcm-256 crypto-key 44494168626e776d72736a4a68695166637263647257504571714e436551787a esp
exec ipsec tunnel protect ipip21 sa-out 100021 sa-in 21 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.22.1 p2p
exec ipsec sa add 100022 spi 200022 crypto-alg aes-gcm-256 crypto-key 69494f784d675661577642504749544863476a6b5a6475425665724e416f504d esp
exec ipsec sa add 22 spi 100022 crypto-alg aes-gcm-256 crypto-key 69494f784d675661577642504749544863476a6b5a6475425665724e416f504d esp
exec ipsec tunnel protect ipip22 sa-out 100022 sa-in 22 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.23.1 p2p
exec ipsec sa add 100023 spi 200023 crypto-alg aes-gcm-256 crypto-key 5255664d4f5546737056724a50486c414b4b4153524c48777958437a6466504b esp
exec ipsec sa add 23 spi 100023 crypto-alg aes-gcm-256 crypto-key 5255664d4f5546737056724a50486c414b4b4153524c48777958437a6466504b esp
exec ipsec tunnel protect ipip23 sa-out 100023 sa-in 23 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.24.1 p2p
exec ipsec sa add 100024 spi 200024 crypto-alg aes-gcm-256 crypto-key 514862764d754549517a47516f614e687759564e4c69724f4647784859575063 esp
exec ipsec sa add 24 spi 100024 crypto-alg aes-gcm-256 crypto-key 514862764d754549517a47516f614e687759564e4c69724f4647784859575063 esp
exec ipsec tunnel protect ipip24 sa-out 100024 sa-in 24 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.25.1 p2p
exec ipsec sa add 100025 spi 200025 crypto-alg aes-gcm-256 crypto-key 4a6d51546855776c4d72596d4363485a54716b506949544b6c47755875464862 esp
exec ipsec sa add 25 spi 100025 crypto-alg aes-gcm-256 crypto-key 4a6d51546855776c4d72596d4363485a54716b506949544b6c47755875464862 esp
exec ipsec tunnel protect ipip25 sa-out 100025 sa-in 25 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.26.1 p2p
exec ipsec sa add 100026 spi 200026 crypto-alg aes-gcm-256 crypto-key 646a4a4f4f4b5463467947524243555474645641755a54556977556c53504e4d esp
exec ipsec sa add 26 spi 100026 crypto-alg aes-gcm-256 crypto-key 646a4a4f4f4b5463467947524243555474645641755a54556977556c53504e4d esp
exec ipsec tunnel protect ipip26 sa-out 100026 sa-in 26 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.27.1 p2p
exec ipsec sa add 100027 spi 200027 crypto-alg aes-gcm-256 crypto-key 64764b6a457a626e6b4f6141765a74534d56424d64636c577279796b4f707756 esp
exec ipsec sa add 27 spi 100027 crypto-alg aes-gcm-256 crypto-key 64764b6a457a626e6b4f6141765a74534d56424d64636c577279796b4f707756 esp
exec ipsec tunnel protect ipip27 sa-out 100027 sa-in 27 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.28.1 p2p
exec ipsec sa add 100028 spi 200028 crypto-alg aes-gcm-256 crypto-key 64767a764879524e496a764a466a4d5566626f735947596472536d48434e6f56 esp
exec ipsec sa add 28 spi 100028 crypto-alg aes-gcm-256 crypto-key 64767a764879524e496a764a466a4d5566626f735947596472536d48434e6f56 esp
exec ipsec tunnel protect ipip28 sa-out 100028 sa-in 28 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.29.1 p2p
exec ipsec sa add 100029 spi 200029 crypto-alg aes-gcm-256 crypto-key 6d754f4c6375546c697472536e4c7279585862514e7748664775694843776553 esp
exec ipsec sa add 29 spi 100029 crypto-alg aes-gcm-256 crypto-key 6d754f4c6375546c697472536e4c7279585862514e7748664775694843776553 esp
exec ipsec tunnel protect ipip29 sa-out 100029 sa-in 29 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.30.1 p2p
exec ipsec sa add 100030 spi 200030 crypto-alg aes-gcm-256 crypto-key 4f71506c557452454274434d6266486c78647957564f74797778624c4471586b esp
exec ipsec sa add 30 spi 100030 crypto-alg aes-gcm-256 crypto-key 4f71506c557452454274434d6266486c78647957564f74797778624c4471586b esp
exec ipsec tunnel protect ipip30 sa-out 100030 sa-in 30 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.31.1 p2p
exec ipsec sa add 100031 spi 200031 crypto-alg aes-gcm-256 crypto-key 674d7a5a694571504d764d45655157644e616c71495572494b73745a73694578 esp
exec ipsec sa add 31 spi 100031 crypto-alg aes-gcm-256 crypto-key 674d7a5a694571504d764d45655157644e616c71495572494b73745a73694578 esp
exec ipsec tunnel protect ipip31 sa-out 100031 sa-in 31 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.32.1 p2p
exec ipsec sa add 100032 spi 200032 crypto-alg aes-gcm-256 crypto-key 584e676b6e534252764774654871775378635747657376795a456752746d7a6d esp
exec ipsec sa add 32 spi 100032 crypto-alg aes-gcm-256 crypto-key 584e676b6e534252764774654871775378635747657376795a456752746d7a6d esp
exec ipsec tunnel protect ipip32 sa-out 100032 sa-in 32 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.33.1 p2p
exec ipsec sa add 100033 spi 200033 crypto-alg aes-gcm-256 crypto-key 706b7869517558436d46746b4c5a6d43426d6c4e514a4b5a524666446f4a6167 esp
exec ipsec sa add 33 spi 100033 crypto-alg aes-gcm-256 crypto-key 706b7869517558436d46746b4c5a6d43426d6c4e514a4b5a524666446f4a6167 esp
exec ipsec tunnel protect ipip33 sa-out 100033 sa-in 33 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.34.1 p2p
exec ipsec sa add 100034 spi 200034 crypto-alg aes-gcm-256 crypto-key 614d674265584a6c6c5455464c6a6543487053496a7156576779625a49784666 esp
exec ipsec sa add 34 spi 100034 crypto-alg aes-gcm-256 crypto-key 614d674265584a6c6c5455464c6a6543487053496a7156576779625a49784666 esp
exec ipsec tunnel protect ipip34 sa-out 100034 sa-in 34 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.35.1 p2p
exec ipsec sa add 100035 spi 200035 crypto-alg aes-gcm-256 crypto-key 666f615255476d706b54594569577a484b58646757727443494961646a4f7472 esp
exec ipsec sa add 35 spi 100035 crypto-alg aes-gcm-256 crypto-key 666f615255476d706b54594569577a484b58646757727443494961646a4f7472 esp
exec ipsec tunnel protect ipip35 sa-out 100035 sa-in 35 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.36.1 p2p
exec ipsec sa add 100036 spi 200036 crypto-alg aes-gcm-256 crypto-key 417170477a526856705a766d416f546d4166556c734671635a4f616e696c4865 esp
exec ipsec sa add 36 spi 100036 crypto-alg aes-gcm-256 crypto-key 417170477a526856705a766d416f546d4166556c734671635a4f616e696c4865 esp
exec ipsec tunnel protect ipip36 sa-out 100036 sa-in 36 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.37.1 p2p
exec ipsec sa add 100037 spi 200037 crypto-alg aes-gcm-256 crypto-key 4c4c634b737a66677451484371486b6376774245555677416262555056445163 esp
exec ipsec sa add 37 spi 100037 crypto-alg aes-gcm-256 crypto-key 4c4c634b737a66677451484371486b6376774245555677416262555056445163 esp
exec ipsec tunnel protect ipip37 sa-out 100037 sa-in 37 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.38.1 p2p
exec ipsec sa add 100038 spi 200038 crypto-alg aes-gcm-256 crypto-key 44646370425a794f67634875776a4a4e7764475244734262555953764778454f esp
exec ipsec sa add 38 spi 100038 crypto-alg aes-gcm-256 crypto-key 44646370425a794f67634875776a4a4e7764475244734262555953764778454f esp
exec ipsec tunnel protect ipip38 sa-out 100038 sa-in 38 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.39.1 p2p
exec ipsec sa add 100039 spi 200039 crypto-alg aes-gcm-256 crypto-key 4877557a7364614e4a645a4979714670794568634e6e7941465379546e524576 esp
exec ipsec sa add 39 spi 100039 crypto-alg aes-gcm-256 crypto-key 4877557a7364614e4a645a4979714670794568634e6e7941465379546e524576 esp
exec ipsec tunnel protect ipip39 sa-out 100039 sa-in 39 add
exec ip route add 100.0.0.1/8 via 200.0.0.101 TenGigabitEthernet8/0/0
exec set interface unnumbered ipip0 use TenGigabitEthernet8/0/0
exec set interface state ipip0 up
exec ip route add 10.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use TenGigabitEthernet8/0/0
exec set interface state ipip1 up
exec ip route add 10.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use TenGigabitEthernet8/0/0
exec set interface state ipip2 up
exec ip route add 10.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use TenGigabitEthernet8/0/0
exec set interface state ipip3 up
exec ip route add 10.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use TenGigabitEthernet8/0/0
exec set interface state ipip4 up
exec ip route add 10.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use TenGigabitEthernet8/0/0
exec set interface state ipip5 up
exec ip route add 10.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use TenGigabitEthernet8/0/0
exec set interface state ipip6 up
exec ip route add 10.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use TenGigabitEthernet8/0/0
exec set interface state ipip7 up
exec ip route add 10.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use TenGigabitEthernet8/0/0
exec set interface state ipip8 up
exec ip route add 10.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use TenGigabitEthernet8/0/0
exec set interface state ipip9 up
exec ip route add 10.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use TenGigabitEthernet8/0/0
exec set interface state ipip10 up
exec ip route add 10.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use TenGigabitEthernet8/0/0
exec set interface state ipip11 up
exec ip route add 10.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use TenGigabitEthernet8/0/0
exec set interface state ipip12 up
exec ip route add 10.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use TenGigabitEthernet8/0/0
exec set interface state ipip13 up
exec ip route add 10.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use TenGigabitEthernet8/0/0
exec set interface state ipip14 up
exec ip route add 10.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use TenGigabitEthernet8/0/0
exec set interface state ipip15 up
exec ip route add 10.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use TenGigabitEthernet8/0/0
exec set interface state ipip16 up
exec ip route add 10.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use TenGigabitEthernet8/0/0
exec set interface state ipip17 up
exec ip route add 10.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use TenGigabitEthernet8/0/0
exec set interface state ipip18 up
exec ip route add 10.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use TenGigabitEthernet8/0/0
exec set interface state ipip19 up
exec ip route add 10.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use TenGigabitEthernet8/0/0
exec set interface state ipip20 up
exec ip route add 10.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use TenGigabitEthernet8/0/0
exec set interface state ipip21 up
exec ip route add 10.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use TenGigabitEthernet8/0/0
exec set interface state ipip22 up
exec ip route add 10.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use TenGigabitEthernet8/0/0
exec set interface state ipip23 up
exec ip route add 10.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use TenGigabitEthernet8/0/0
exec set interface state ipip24 up
exec ip route add 10.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use TenGigabitEthernet8/0/0
exec set interface state ipip25 up
exec ip route add 10.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use TenGigabitEthernet8/0/0
exec set interface state ipip26 up
exec ip route add 10.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use TenGigabitEthernet8/0/0
exec set interface state ipip27 up
exec ip route add 10.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use TenGigabitEthernet8/0/0
exec set interface state ipip28 up
exec ip route add 10.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use TenGigabitEthernet8/0/0
exec set interface state ipip29 up
exec ip route add 10.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use TenGigabitEthernet8/0/0
exec set interface state ipip30 up
exec ip route add 10.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use TenGigabitEthernet8/0/0
exec set interface state ipip31 up
exec ip route add 10.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use TenGigabitEthernet8/0/0
exec set interface state ipip32 up
exec ip route add 10.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use TenGigabitEthernet8/0/0
exec set interface state ipip33 up
exec ip route add 10.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use TenGigabitEthernet8/0/0
exec set interface state ipip34 up
exec ip route add 10.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use TenGigabitEthernet8/0/0
exec set interface state ipip35 up
exec ip route add 10.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use TenGigabitEthernet8/0/0
exec set interface state ipip36 up
exec ip route add 10.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use TenGigabitEthernet8/0/0
exec set interface state ipip37 up
exec ip route add 10.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use TenGigabitEthernet8/0/0
exec set interface state ipip38 up
exec ip route add 10.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use TenGigabitEthernet8/0/0
exec set interface state ipip39 up
exec ip route add 10.0.0.39/32 via ipip39

 1518b-1t1c-ethip4ipsec40tnlsw- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec create loopback interface
exec set interface state loop0 up
exec set interface ip address TenGigabitEthernet8/0/0 200.0.0.101/24
exec set ip neighbor TenGigabitEthernet8/0/0 200.0.0.102 ac:1f:6b:57:57:fe static
exec set interface ip address loop0 100.0.0.1/32
exec create ipip tunnel src 100.0.0.1 dst 200.0.0.102 p2p
exec ipsec sa add 0 spi 100000 crypto-alg aes-gcm-256 crypto-key 754c51786568644c44426a5448504a6e6875654f694145706e58724b71564b4b esp
exec ipsec sa add 100000 spi 200000 crypto-alg aes-gcm-256 crypto-key 754c51786568644c44426a5448504a6e6875654f694145706e58724b71564b4b esp
exec ipsec tunnel protect ipip0 sa-out 0 sa-in 100000 add
exec set interface ip address loop0 100.0.1.1/32
exec create ipip tunnel src 100.0.1.1 dst 200.0.0.102 p2p
exec ipsec sa add 1 spi 100001 crypto-alg aes-gcm-256 crypto-key 657366626f617170507a6e754d48784c794c5076686775634b595074476e6e58 esp
exec ipsec sa add 100001 spi 200001 crypto-alg aes-gcm-256 crypto-key 657366626f617170507a6e754d48784c794c5076686775634b595074476e6e58 esp
exec ipsec tunnel protect ipip1 sa-out 1 sa-in 100001 add
exec set interface ip address loop0 100.0.2.1/32
exec create ipip tunnel src 100.0.2.1 dst 200.0.0.102 p2p
exec ipsec sa add 2 spi 100002 crypto-alg aes-gcm-256 crypto-key 6a7a5378594e57734a624d53576f506c4273516d54634c41544461466a524257 esp
exec ipsec sa add 100002 spi 200002 crypto-alg aes-gcm-256 crypto-key 6a7a5378594e57734a624d53576f506c4273516d54634c41544461466a524257 esp
exec ipsec tunnel protect ipip2 sa-out 2 sa-in 100002 add
exec set interface ip address loop0 100.0.3.1/32
exec create ipip tunnel src 100.0.3.1 dst 200.0.0.102 p2p
exec ipsec sa add 3 spi 100003 crypto-alg aes-gcm-256 crypto-key 5246504f72766b6f556d4f5a7a49644b704b7669636968766153785053437176 esp
exec ipsec sa add 100003 spi 200003 crypto-alg aes-gcm-256 crypto-key 5246504f72766b6f556d4f5a7a49644b704b7669636968766153785053437176 esp
exec ipsec tunnel protect ipip3 sa-out 3 sa-in 100003 add
exec set interface ip address loop0 100.0.4.1/32
exec create ipip tunnel src 100.0.4.1 dst 200.0.0.102 p2p
exec ipsec sa add 4 spi 100004 crypto-alg aes-gcm-256 crypto-key 4f61706c77426a5876416b6b6b686e79736f51444d6a42664f48675447476868 esp
exec ipsec sa add 100004 spi 200004 crypto-alg aes-gcm-256 crypto-key 4f61706c77426a5876416b6b6b686e79736f51444d6a42664f48675447476868 esp
exec ipsec tunnel protect ipip4 sa-out 4 sa-in 100004 add
exec set interface ip address loop0 100.0.5.1/32
exec create ipip tunnel src 100.0.5.1 dst 200.0.0.102 p2p
exec ipsec sa add 5 spi 100005 crypto-alg aes-gcm-256 crypto-key 7369444156645265505545445a696f76644376636e705766644a5068456d7158 esp
exec ipsec sa add 100005 spi 200005 crypto-alg aes-gcm-256 crypto-key 7369444156645265505545445a696f76644376636e705766644a5068456d7158 esp
exec ipsec tunnel protect ipip5 sa-out 5 sa-in 100005 add
exec set interface ip address loop0 100.0.6.1/32
exec create ipip tunnel src 100.0.6.1 dst 200.0.0.102 p2p
exec ipsec sa add 6 spi 100006 crypto-alg aes-gcm-256 crypto-key 58625759796243696c48556f714e6a487551474b675545534c56696743635856 esp
exec ipsec sa add 100006 spi 200006 crypto-alg aes-gcm-256 crypto-key 58625759796243696c48556f714e6a487551474b675545534c56696743635856 esp
exec ipsec tunnel protect ipip6 sa-out 6 sa-in 100006 add
exec set interface ip address loop0 100.0.7.1/32
exec create ipip tunnel src 100.0.7.1 dst 200.0.0.102 p2p
exec ipsec sa add 7 spi 100007 crypto-alg aes-gcm-256 crypto-key 4877586f5a72637a675952596b6e716e55445576614e416a7359526a584b7876 esp
exec ipsec sa add 100007 spi 200007 crypto-alg aes-gcm-256 crypto-key 4877586f5a72637a675952596b6e716e55445576614e416a7359526a584b7876 esp
exec ipsec tunnel protect ipip7 sa-out 7 sa-in 100007 add
exec set interface ip address loop0 100.0.8.1/32
exec create ipip tunnel src 100.0.8.1 dst 200.0.0.102 p2p
exec ipsec sa add 8 spi 100008 crypto-alg aes-gcm-256 crypto-key 6f6546757477584f746b6e4c6e554968544a664e4d7348467141696678484b4d esp
exec ipsec sa add 100008 spi 200008 crypto-alg aes-gcm-256 crypto-key 6f6546757477584f746b6e4c6e554968544a664e4d7348467141696678484b4d esp
exec ipsec tunnel protect ipip8 sa-out 8 sa-in 100008 add
exec set interface ip address loop0 100.0.9.1/32
exec create ipip tunnel src 100.0.9.1 dst 200.0.0.102 p2p
exec ipsec sa add 9 spi 100009 crypto-alg aes-gcm-256 crypto-key 4f734a4c69526d6b5a6d46554c4a4c5041524773514d77654d64477473444468 esp
exec ipsec sa add 100009 spi 200009 crypto-alg aes-gcm-256 crypto-key 4f734a4c69526d6b5a6d46554c4a4c5041524773514d77654d64477473444468 esp
exec ipsec tunnel protect ipip9 sa-out 9 sa-in 100009 add
exec set interface ip address loop0 100.0.10.1/32
exec create ipip tunnel src 100.0.10.1 dst 200.0.0.102 p2p
exec ipsec sa add 10 spi 100010 crypto-alg aes-gcm-256 crypto-key 43696b6b525571465476766f63544f725175504c4e784b4d7851636c5563426d esp
exec ipsec sa add 100010 spi 200010 crypto-alg aes-gcm-256 crypto-key 43696b6b525571465476766f63544f725175504c4e784b4d7851636c5563426d esp
exec ipsec tunnel protect ipip10 sa-out 10 sa-in 100010 add
exec set interface ip address loop0 100.0.11.1/32
exec create ipip tunnel src 100.0.11.1 dst 200.0.0.102 p2p
exec ipsec sa add 11 spi 100011 crypto-alg aes-gcm-256 crypto-key 7843546d45786f456a536d6773596e6c4a7a564f4a57745566757a5756564876 esp
exec ipsec sa add 100011 spi 200011 crypto-alg aes-gcm-256 crypto-key 7843546d45786f456a536d6773596e6c4a7a564f4a57745566757a5756564876 esp
exec ipsec tunnel protect ipip11 sa-out 11 sa-in 100011 add
exec set interface ip address loop0 100.0.12.1/32
exec create ipip tunnel src 100.0.12.1 dst 200.0.0.102 p2p
exec ipsec sa add 12 spi 100012 crypto-alg aes-gcm-256 crypto-key 56594444736769746c7a41724c574d6150555659726c4d654b7a756376636c70 esp
exec ipsec sa add 100012 spi 200012 crypto-alg aes-gcm-256 crypto-key 56594444736769746c7a41724c574d6150555659726c4d654b7a756376636c70 esp
exec ipsec tunnel protect ipip12 sa-out 12 sa-in 100012 add
exec set interface ip address loop0 100.0.13.1/32
exec create ipip tunnel src 100.0.13.1 dst 200.0.0.102 p2p
exec ipsec sa add 13 spi 100013 crypto-alg aes-gcm-256 crypto-key 6c77435446686b6b504949776e6a78694c59554a664f5552676775487278424c esp
exec ipsec sa add 100013 spi 200013 crypto-alg aes-gcm-256 crypto-key 6c77435446686b6b504949776e6a78694c59554a664f5552676775487278424c esp
exec ipsec tunnel protect ipip13 sa-out 13 sa-in 100013 add
exec set interface ip address loop0 100.0.14.1/32
exec create ipip tunnel src 100.0.14.1 dst 200.0.0.102 p2p
exec ipsec sa add 14 spi 100014 crypto-alg aes-gcm-256 crypto-key 556d6c597956494e667545754564664c4d726f484447747a7047767466756c41 esp
exec ipsec sa add 100014 spi 200014 crypto-alg aes-gcm-256 crypto-key 556d6c597956494e667545754564664c4d726f484447747a7047767466756c41 esp
exec ipsec tunnel protect ipip14 sa-out 14 sa-in 100014 add
exec set interface ip address loop0 100.0.15.1/32
exec create ipip tunnel src 100.0.15.1 dst 200.0.0.102 p2p
exec ipsec sa add 15 spi 100015 crypto-alg aes-gcm-256 crypto-key 654173684a746e42544775597658444b6b6471785645514d75784a6e76784c73 esp
exec ipsec sa add 100015 spi 200015 crypto-alg aes-gcm-256 crypto-key 654173684a746e42544775597658444b6b6471785645514d75784a6e76784c73 esp
exec ipsec tunnel protect ipip15 sa-out 15 sa-in 100015 add
exec set interface ip address loop0 100.0.16.1/32
exec create ipip tunnel src 100.0.16.1 dst 200.0.0.102 p2p
exec ipsec sa add 16 spi 100016 crypto-alg aes-gcm-256 crypto-key 6c7774466b65725650456450745450416468594366576a49415041524a516759 esp
exec ipsec sa add 100016 spi 200016 crypto-alg aes-gcm-256 crypto-key 6c7774466b65725650456450745450416468594366576a49415041524a516759 esp
exec ipsec tunnel protect ipip16 sa-out 16 sa-in 100016 add
exec set interface ip address loop0 100.0.17.1/32
exec create ipip tunnel src 100.0.17.1 dst 200.0.0.102 p2p
exec ipsec sa add 17 spi 100017 crypto-alg aes-gcm-256 crypto-key 697869526644594f4568686b614f4b736f58784966774447477175784a7a7079 esp
exec ipsec sa add 100017 spi 200017 crypto-alg aes-gcm-256 crypto-key 697869526644594f4568686b614f4b736f58784966774447477175784a7a7079 esp
exec ipsec tunnel protect ipip17 sa-out 17 sa-in 100017 add
exec set interface ip address loop0 100.0.18.1/32
exec create ipip tunnel src 100.0.18.1 dst 200.0.0.102 p2p
exec ipsec sa add 18 spi 100018 crypto-alg aes-gcm-256 crypto-key 7765507556676b64536a7a5552554178754f5775734272664756586a47484f6e esp
exec ipsec sa add 100018 spi 200018 crypto-alg aes-gcm-256 crypto-key 7765507556676b64536a7a5552554178754f5775734272664756586a47484f6e esp
exec ipsec tunnel protect ipip18 sa-out 18 sa-in 100018 add
exec set interface ip address loop0 100.0.19.1/32
exec create ipip tunnel src 100.0.19.1 dst 200.0.0.102 p2p
exec ipsec sa add 19 spi 100019 crypto-alg aes-gcm-256 crypto-key 6d4c45486f666b4f61527a4e6a504773707149555156446e556e424a674c6a6e esp
exec ipsec sa add 100019 spi 200019 crypto-alg aes-gcm-256 crypto-key 6d4c45486f666b4f61527a4e6a504773707149555156446e556e424a674c6a6e esp
exec ipsec tunnel protect ipip19 sa-out 19 sa-in 100019 add
exec set interface ip address loop0 100.0.20.1/32
exec create ipip tunnel src 100.0.20.1 dst 200.0.0.102 p2p
exec ipsec sa add 20 spi 100020 crypto-alg aes-gcm-256 crypto-key 4546696b5645435675735670595a704f78426542515573746f77435055755865 esp
exec ipsec sa add 100020 spi 200020 crypto-alg aes-gcm-256 crypto-key 4546696b5645435675735670595a704f78426542515573746f77435055755865 esp
exec ipsec tunnel protect ipip20 sa-out 20 sa-in 100020 add
exec set interface ip address loop0 100.0.21.1/32
exec create ipip tunnel src 100.0.21.1 dst 200.0.0.102 p2p
exec ipsec sa add 21 spi 100021 crypto-alg aes-gcm-256 crypto-key 444c5a454d6c4170734b5058495347696e66755a6e51636669735246646f774a esp
exec ipsec sa add 100021 spi 200021 crypto-alg aes-gcm-256 crypto-key 444c5a454d6c4170734b5058495347696e66755a6e51636669735246646f774a esp
exec ipsec tunnel protect ipip21 sa-out 21 sa-in 100021 add
exec set interface ip address loop0 100.0.22.1/32
exec create ipip tunnel src 100.0.22.1 dst 200.0.0.102 p2p
exec ipsec sa add 22 spi 100022 crypto-alg aes-gcm-256 crypto-key 7a42564d6858525054414b6c6b4a6f4b51575673547278664f766a4767454971 esp
exec ipsec sa add 100022 spi 200022 crypto-alg aes-gcm-256 crypto-key 7a42564d6858525054414b6c6b4a6f4b51575673547278664f766a4767454971 esp
exec ipsec tunnel protect ipip22 sa-out 22 sa-in 100022 add
exec set interface ip address loop0 100.0.23.1/32
exec create ipip tunnel src 100.0.23.1 dst 200.0.0.102 p2p
exec ipsec sa add 23 spi 100023 crypto-alg aes-gcm-256 crypto-key 5a546644444564797157754d556c705474416b47445874566f53585a6e6c4951 esp
exec ipsec sa add 100023 spi 200023 crypto-alg aes-gcm-256 crypto-key 5a546644444564797157754d556c705474416b47445874566f53585a6e6c4951 esp
exec ipsec tunnel protect ipip23 sa-out 23 sa-in 100023 add
exec set interface ip address loop0 100.0.24.1/32
exec create ipip tunnel src 100.0.24.1 dst 200.0.0.102 p2p
exec ipsec sa add 24 spi 100024 crypto-alg aes-gcm-256 crypto-key 707a73774d656855655941586a6b4653536471796656586f576945714f765562 esp
exec ipsec sa add 100024 spi 200024 crypto-alg aes-gcm-256 crypto-key 707a73774d656855655941586a6b4653536471796656586f576945714f765562 esp
exec ipsec tunnel protect ipip24 sa-out 24 sa-in 100024 add
exec set interface ip address loop0 100.0.25.1/32
exec create ipip tunnel src 100.0.25.1 dst 200.0.0.102 p2p
exec ipsec sa add 25 spi 100025 crypto-alg aes-gcm-256 crypto-key 567268634f4f554e586e6a4a7061676679656d79446762656d745557684a6445 esp
exec ipsec sa add 100025 spi 200025 crypto-alg aes-gcm-256 crypto-key 567268634f4f554e586e6a4a7061676679656d79446762656d745557684a6445 esp
exec ipsec tunnel protect ipip25 sa-out 25 sa-in 100025 add
exec set interface ip address loop0 100.0.26.1/32
exec create ipip tunnel src 100.0.26.1 dst 200.0.0.102 p2p
exec ipsec sa add 26 spi 100026 crypto-alg aes-gcm-256 crypto-key 426b494841565670676861467464506246546a6e4b417153777652684a694371 esp
exec ipsec sa add 100026 spi 200026 crypto-alg aes-gcm-256 crypto-key 426b494841565670676861467464506246546a6e4b417153777652684a694371 esp
exec ipsec tunnel protect ipip26 sa-out 26 sa-in 100026 add
exec set interface ip address loop0 100.0.27.1/32
exec create ipip tunnel src 100.0.27.1 dst 200.0.0.102 p2p
exec ipsec sa add 27 spi 100027 crypto-alg aes-gcm-256 crypto-key 496e6c4f4f6170415242506e6972554d6a726e417a686d644f62486871485661 esp
exec ipsec sa add 100027 spi 200027 crypto-alg aes-gcm-256 crypto-key 496e6c4f4f6170415242506e6972554d6a726e417a686d644f62486871485661 esp
exec ipsec tunnel protect ipip27 sa-out 27 sa-in 100027 add
exec set interface ip address loop0 100.0.28.1/32
exec create ipip tunnel src 100.0.28.1 dst 200.0.0.102 p2p
exec ipsec sa add 28 spi 100028 crypto-alg aes-gcm-256 crypto-key 77774661784b51674d5946496b58794b586a456a65744f47626e544155434879 esp
exec ipsec sa add 100028 spi 200028 crypto-alg aes-gcm-256 crypto-key 77774661784b51674d5946496b58794b586a456a65744f47626e544155434879 esp
exec ipsec tunnel protect ipip28 sa-out 28 sa-in 100028 add
exec set interface ip address loop0 100.0.29.1/32
exec create ipip tunnel src 100.0.29.1 dst 200.0.0.102 p2p
exec ipsec sa add 29 spi 100029 crypto-alg aes-gcm-256 crypto-key 5462674f65584474706f79587962545a70737465456f4d775865477a72587442 esp
exec ipsec sa add 100029 spi 200029 crypto-alg aes-gcm-256 crypto-key 5462674f65584474706f79587962545a70737465456f4d775865477a72587442 esp
exec ipsec tunnel protect ipip29 sa-out 29 sa-in 100029 add
exec set interface ip address loop0 100.0.30.1/32
exec create ipip tunnel src 100.0.30.1 dst 200.0.0.102 p2p
exec ipsec sa add 30 spi 100030 crypto-alg aes-gcm-256 crypto-key 484671616157634974505a62674f744f44684d536d444c447648436c4c796f51 esp
exec ipsec sa add 100030 spi 200030 crypto-alg aes-gcm-256 crypto-key 484671616157634974505a62674f744f44684d536d444c447648436c4c796f51 esp
exec ipsec tunnel protect ipip30 sa-out 30 sa-in 100030 add
exec set interface ip address loop0 100.0.31.1/32
exec create ipip tunnel src 100.0.31.1 dst 200.0.0.102 p2p
exec ipsec sa add 31 spi 100031 crypto-alg aes-gcm-256 crypto-key 544f5a565a59574d4269636962556f467641634f6c624475767566527a596370 esp
exec ipsec sa add 100031 spi 200031 crypto-alg aes-gcm-256 crypto-key 544f5a565a59574d4269636962556f467641634f6c624475767566527a596370 esp
exec ipsec tunnel protect ipip31 sa-out 31 sa-in 100031 add
exec set interface ip address loop0 100.0.32.1/32
exec create ipip tunnel src 100.0.32.1 dst 200.0.0.102 p2p
exec ipsec sa add 32 spi 100032 crypto-alg aes-gcm-256 crypto-key 55506853645664494f794e56585171567472564c467957547a4d524b49547671 esp
exec ipsec sa add 100032 spi 200032 crypto-alg aes-gcm-256 crypto-key 55506853645664494f794e56585171567472564c467957547a4d524b49547671 esp
exec ipsec tunnel protect ipip32 sa-out 32 sa-in 100032 add
exec set interface ip address loop0 100.0.33.1/32
exec create ipip tunnel src 100.0.33.1 dst 200.0.0.102 p2p
exec ipsec sa add 33 spi 100033 crypto-alg aes-gcm-256 crypto-key 4c6166486f777a4141434147764e58745943485a41474879466b6e4c71746579 esp
exec ipsec sa add 100033 spi 200033 crypto-alg aes-gcm-256 crypto-key 4c6166486f777a4141434147764e58745943485a41474879466b6e4c71746579 esp
exec ipsec tunnel protect ipip33 sa-out 33 sa-in 100033 add
exec set interface ip address loop0 100.0.34.1/32
exec create ipip tunnel src 100.0.34.1 dst 200.0.0.102 p2p
exec ipsec sa add 34 spi 100034 crypto-alg aes-gcm-256 crypto-key 69446a4347705a70544b48575246494d4e4e684c746363666f696b737465785a esp
exec ipsec sa add 100034 spi 200034 crypto-alg aes-gcm-256 crypto-key 69446a4347705a70544b48575246494d4e4e684c746363666f696b737465785a esp
exec ipsec tunnel protect ipip34 sa-out 34 sa-in 100034 add
exec set interface ip address loop0 100.0.35.1/32
exec create ipip tunnel src 100.0.35.1 dst 200.0.0.102 p2p
exec ipsec sa add 35 spi 100035 crypto-alg aes-gcm-256 crypto-key 656c55765064576c437a725a69666f6a776c5276756b5a49664862694f6b6855 esp
exec ipsec sa add 100035 spi 200035 crypto-alg aes-gcm-256 crypto-key 656c55765064576c437a725a69666f6a776c5276756b5a49664862694f6b6855 esp
exec ipsec tunnel protect ipip35 sa-out 35 sa-in 100035 add
exec set interface ip address loop0 100.0.36.1/32
exec create ipip tunnel src 100.0.36.1 dst 200.0.0.102 p2p
exec ipsec sa add 36 spi 100036 crypto-alg aes-gcm-256 crypto-key 42506e45514c46646745416e5243676a70624a6854634d4758775746574a7543 esp
exec ipsec sa add 100036 spi 200036 crypto-alg aes-gcm-256 crypto-key 42506e45514c46646745416e5243676a70624a6854634d4758775746574a7543 esp
exec ipsec tunnel protect ipip36 sa-out 36 sa-in 100036 add
exec set interface ip address loop0 100.0.37.1/32
exec create ipip tunnel src 100.0.37.1 dst 200.0.0.102 p2p
exec ipsec sa add 37 spi 100037 crypto-alg aes-gcm-256 crypto-key 4f4c5a52624b6a4d424c6171464a4e635158574b477149714977616277594a65 esp
exec ipsec sa add 100037 spi 200037 crypto-alg aes-gcm-256 crypto-key 4f4c5a52624b6a4d424c6171464a4e635158574b477149714977616277594a65 esp
exec ipsec tunnel protect ipip37 sa-out 37 sa-in 100037 add
exec set interface ip address loop0 100.0.38.1/32
exec create ipip tunnel src 100.0.38.1 dst 200.0.0.102 p2p
exec ipsec sa add 38 spi 100038 crypto-alg aes-gcm-256 crypto-key 6449766c44764a7451504d41734276544f506a5763476b72476459496a536550 esp
exec ipsec sa add 100038 spi 200038 crypto-alg aes-gcm-256 crypto-key 6449766c44764a7451504d41734276544f506a5763476b72476459496a536550 esp
exec ipsec tunnel protect ipip38 sa-out 38 sa-in 100038 add
exec set interface ip address loop0 100.0.39.1/32
exec create ipip tunnel src 100.0.39.1 dst 200.0.0.102 p2p
exec ipsec sa add 39 spi 100039 crypto-alg aes-gcm-256 crypto-key 504247544969486f577870454c4848576c6a6859656e6d4c6f6a455044465449 esp
exec ipsec sa add 100039 spi 200039 crypto-alg aes-gcm-256 crypto-key 504247544969486f577870454c4848576c6a6859656e6d4c6f6a455044465449 esp
exec ipsec tunnel protect ipip39 sa-out 39 sa-in 100039 add
exec set interface unnumbered ipip0 use TenGigabitEthernet8/0/0
exec set interface state ipip0 up
exec ip route add 20.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use TenGigabitEthernet8/0/0
exec set interface state ipip1 up
exec ip route add 20.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use TenGigabitEthernet8/0/0
exec set interface state ipip2 up
exec ip route add 20.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use TenGigabitEthernet8/0/0
exec set interface state ipip3 up
exec ip route add 20.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use TenGigabitEthernet8/0/0
exec set interface state ipip4 up
exec ip route add 20.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use TenGigabitEthernet8/0/0
exec set interface state ipip5 up
exec ip route add 20.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use TenGigabitEthernet8/0/0
exec set interface state ipip6 up
exec ip route add 20.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use TenGigabitEthernet8/0/0
exec set interface state ipip7 up
exec ip route add 20.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use TenGigabitEthernet8/0/0
exec set interface state ipip8 up
exec ip route add 20.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use TenGigabitEthernet8/0/0
exec set interface state ipip9 up
exec ip route add 20.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use TenGigabitEthernet8/0/0
exec set interface state ipip10 up
exec ip route add 20.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use TenGigabitEthernet8/0/0
exec set interface state ipip11 up
exec ip route add 20.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use TenGigabitEthernet8/0/0
exec set interface state ipip12 up
exec ip route add 20.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use TenGigabitEthernet8/0/0
exec set interface state ipip13 up
exec ip route add 20.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use TenGigabitEthernet8/0/0
exec set interface state ipip14 up
exec ip route add 20.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use TenGigabitEthernet8/0/0
exec set interface state ipip15 up
exec ip route add 20.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use TenGigabitEthernet8/0/0
exec set interface state ipip16 up
exec ip route add 20.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use TenGigabitEthernet8/0/0
exec set interface state ipip17 up
exec ip route add 20.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use TenGigabitEthernet8/0/0
exec set interface state ipip18 up
exec ip route add 20.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use TenGigabitEthernet8/0/0
exec set interface state ipip19 up
exec ip route add 20.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use TenGigabitEthernet8/0/0
exec set interface state ipip20 up
exec ip route add 20.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use TenGigabitEthernet8/0/0
exec set interface state ipip21 up
exec ip route add 20.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use TenGigabitEthernet8/0/0
exec set interface state ipip22 up
exec ip route add 20.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use TenGigabitEthernet8/0/0
exec set interface state ipip23 up
exec ip route add 20.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use TenGigabitEthernet8/0/0
exec set interface state ipip24 up
exec ip route add 20.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use TenGigabitEthernet8/0/0
exec set interface state ipip25 up
exec ip route add 20.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use TenGigabitEthernet8/0/0
exec set interface state ipip26 up
exec ip route add 20.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use TenGigabitEthernet8/0/0
exec set interface state ipip27 up
exec ip route add 20.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use TenGigabitEthernet8/0/0
exec set interface state ipip28 up
exec ip route add 20.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use TenGigabitEthernet8/0/0
exec set interface state ipip29 up
exec ip route add 20.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use TenGigabitEthernet8/0/0
exec set interface state ipip30 up
exec ip route add 20.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use TenGigabitEthernet8/0/0
exec set interface state ipip31 up
exec ip route add 20.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use TenGigabitEthernet8/0/0
exec set interface state ipip32 up
exec ip route add 20.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use TenGigabitEthernet8/0/0
exec set interface state ipip33 up
exec ip route add 20.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use TenGigabitEthernet8/0/0
exec set interface state ipip34 up
exec ip route add 20.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use TenGigabitEthernet8/0/0
exec set interface state ipip35 up
exec ip route add 20.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use TenGigabitEthernet8/0/0
exec set interface state ipip36 up
exec ip route add 20.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use TenGigabitEthernet8/0/0
exec set interface state ipip37 up
exec ip route add 20.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use TenGigabitEthernet8/0/0
exec set interface state ipip38 up
exec ip route add 20.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use TenGigabitEthernet8/0/0
exec set interface state ipip39 up
exec ip route add 20.0.0.39/32 via ipip39
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec set interface ip address TenGigabitEthernet8/0/0 200.0.0.102/24.0
exec create ipip tunnel src 200.0.0.102 dst 100.0.0.1 p2p
exec ipsec sa add 100000 spi 200000 crypto-alg aes-gcm-256 crypto-key 754c51786568644c44426a5448504a6e6875654f694145706e58724b71564b4b esp
exec ipsec sa add 0 spi 100000 crypto-alg aes-gcm-256 crypto-key 754c51786568644c44426a5448504a6e6875654f694145706e58724b71564b4b esp
exec ipsec tunnel protect ipip0 sa-out 100000 sa-in 0 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.1.1 p2p
exec ipsec sa add 100001 spi 200001 crypto-alg aes-gcm-256 crypto-key 657366626f617170507a6e754d48784c794c5076686775634b595074476e6e58 esp
exec ipsec sa add 1 spi 100001 crypto-alg aes-gcm-256 crypto-key 657366626f617170507a6e754d48784c794c5076686775634b595074476e6e58 esp
exec ipsec tunnel protect ipip1 sa-out 100001 sa-in 1 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.2.1 p2p
exec ipsec sa add 100002 spi 200002 crypto-alg aes-gcm-256 crypto-key 6a7a5378594e57734a624d53576f506c4273516d54634c41544461466a524257 esp
exec ipsec sa add 2 spi 100002 crypto-alg aes-gcm-256 crypto-key 6a7a5378594e57734a624d53576f506c4273516d54634c41544461466a524257 esp
exec ipsec tunnel protect ipip2 sa-out 100002 sa-in 2 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.3.1 p2p
exec ipsec sa add 100003 spi 200003 crypto-alg aes-gcm-256 crypto-key 5246504f72766b6f556d4f5a7a49644b704b7669636968766153785053437176 esp
exec ipsec sa add 3 spi 100003 crypto-alg aes-gcm-256 crypto-key 5246504f72766b6f556d4f5a7a49644b704b7669636968766153785053437176 esp
exec ipsec tunnel protect ipip3 sa-out 100003 sa-in 3 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.4.1 p2p
exec ipsec sa add 100004 spi 200004 crypto-alg aes-gcm-256 crypto-key 4f61706c77426a5876416b6b6b686e79736f51444d6a42664f48675447476868 esp
exec ipsec sa add 4 spi 100004 crypto-alg aes-gcm-256 crypto-key 4f61706c77426a5876416b6b6b686e79736f51444d6a42664f48675447476868 esp
exec ipsec tunnel protect ipip4 sa-out 100004 sa-in 4 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.5.1 p2p
exec ipsec sa add 100005 spi 200005 crypto-alg aes-gcm-256 crypto-key 7369444156645265505545445a696f76644376636e705766644a5068456d7158 esp
exec ipsec sa add 5 spi 100005 crypto-alg aes-gcm-256 crypto-key 7369444156645265505545445a696f76644376636e705766644a5068456d7158 esp
exec ipsec tunnel protect ipip5 sa-out 100005 sa-in 5 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.6.1 p2p
exec ipsec sa add 100006 spi 200006 crypto-alg aes-gcm-256 crypto-key 58625759796243696c48556f714e6a487551474b675545534c56696743635856 esp
exec ipsec sa add 6 spi 100006 crypto-alg aes-gcm-256 crypto-key 58625759796243696c48556f714e6a487551474b675545534c56696743635856 esp
exec ipsec tunnel protect ipip6 sa-out 100006 sa-in 6 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.7.1 p2p
exec ipsec sa add 100007 spi 200007 crypto-alg aes-gcm-256 crypto-key 4877586f5a72637a675952596b6e716e55445576614e416a7359526a584b7876 esp
exec ipsec sa add 7 spi 100007 crypto-alg aes-gcm-256 crypto-key 4877586f5a72637a675952596b6e716e55445576614e416a7359526a584b7876 esp
exec ipsec tunnel protect ipip7 sa-out 100007 sa-in 7 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.8.1 p2p
exec ipsec sa add 100008 spi 200008 crypto-alg aes-gcm-256 crypto-key 6f6546757477584f746b6e4c6e554968544a664e4d7348467141696678484b4d esp
exec ipsec sa add 8 spi 100008 crypto-alg aes-gcm-256 crypto-key 6f6546757477584f746b6e4c6e554968544a664e4d7348467141696678484b4d esp
exec ipsec tunnel protect ipip8 sa-out 100008 sa-in 8 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.9.1 p2p
exec ipsec sa add 100009 spi 200009 crypto-alg aes-gcm-256 crypto-key 4f734a4c69526d6b5a6d46554c4a4c5041524773514d77654d64477473444468 esp
exec ipsec sa add 9 spi 100009 crypto-alg aes-gcm-256 crypto-key 4f734a4c69526d6b5a6d46554c4a4c5041524773514d77654d64477473444468 esp
exec ipsec tunnel protect ipip9 sa-out 100009 sa-in 9 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.10.1 p2p
exec ipsec sa add 100010 spi 200010 crypto-alg aes-gcm-256 crypto-key 43696b6b525571465476766f63544f725175504c4e784b4d7851636c5563426d esp
exec ipsec sa add 10 spi 100010 crypto-alg aes-gcm-256 crypto-key 43696b6b525571465476766f63544f725175504c4e784b4d7851636c5563426d esp
exec ipsec tunnel protect ipip10 sa-out 100010 sa-in 10 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.11.1 p2p
exec ipsec sa add 100011 spi 200011 crypto-alg aes-gcm-256 crypto-key 7843546d45786f456a536d6773596e6c4a7a564f4a57745566757a5756564876 esp
exec ipsec sa add 11 spi 100011 crypto-alg aes-gcm-256 crypto-key 7843546d45786f456a536d6773596e6c4a7a564f4a57745566757a5756564876 esp
exec ipsec tunnel protect ipip11 sa-out 100011 sa-in 11 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.12.1 p2p
exec ipsec sa add 100012 spi 200012 crypto-alg aes-gcm-256 crypto-key 56594444736769746c7a41724c574d6150555659726c4d654b7a756376636c70 esp
exec ipsec sa add 12 spi 100012 crypto-alg aes-gcm-256 crypto-key 56594444736769746c7a41724c574d6150555659726c4d654b7a756376636c70 esp
exec ipsec tunnel protect ipip12 sa-out 100012 sa-in 12 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.13.1 p2p
exec ipsec sa add 100013 spi 200013 crypto-alg aes-gcm-256 crypto-key 6c77435446686b6b504949776e6a78694c59554a664f5552676775487278424c esp
exec ipsec sa add 13 spi 100013 crypto-alg aes-gcm-256 crypto-key 6c77435446686b6b504949776e6a78694c59554a664f5552676775487278424c esp
exec ipsec tunnel protect ipip13 sa-out 100013 sa-in 13 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.14.1 p2p
exec ipsec sa add 100014 spi 200014 crypto-alg aes-gcm-256 crypto-key 556d6c597956494e667545754564664c4d726f484447747a7047767466756c41 esp
exec ipsec sa add 14 spi 100014 crypto-alg aes-gcm-256 crypto-key 556d6c597956494e667545754564664c4d726f484447747a7047767466756c41 esp
exec ipsec tunnel protect ipip14 sa-out 100014 sa-in 14 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.15.1 p2p
exec ipsec sa add 100015 spi 200015 crypto-alg aes-gcm-256 crypto-key 654173684a746e42544775597658444b6b6471785645514d75784a6e76784c73 esp
exec ipsec sa add 15 spi 100015 crypto-alg aes-gcm-256 crypto-key 654173684a746e42544775597658444b6b6471785645514d75784a6e76784c73 esp
exec ipsec tunnel protect ipip15 sa-out 100015 sa-in 15 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.16.1 p2p
exec ipsec sa add 100016 spi 200016 crypto-alg aes-gcm-256 crypto-key 6c7774466b65725650456450745450416468594366576a49415041524a516759 esp
exec ipsec sa add 16 spi 100016 crypto-alg aes-gcm-256 crypto-key 6c7774466b65725650456450745450416468594366576a49415041524a516759 esp
exec ipsec tunnel protect ipip16 sa-out 100016 sa-in 16 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.17.1 p2p
exec ipsec sa add 100017 spi 200017 crypto-alg aes-gcm-256 crypto-key 697869526644594f4568686b614f4b736f58784966774447477175784a7a7079 esp
exec ipsec sa add 17 spi 100017 crypto-alg aes-gcm-256 crypto-key 697869526644594f4568686b614f4b736f58784966774447477175784a7a7079 esp
exec ipsec tunnel protect ipip17 sa-out 100017 sa-in 17 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.18.1 p2p
exec ipsec sa add 100018 spi 200018 crypto-alg aes-gcm-256 crypto-key 7765507556676b64536a7a5552554178754f5775734272664756586a47484f6e esp
exec ipsec sa add 18 spi 100018 crypto-alg aes-gcm-256 crypto-key 7765507556676b64536a7a5552554178754f5775734272664756586a47484f6e esp
exec ipsec tunnel protect ipip18 sa-out 100018 sa-in 18 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.19.1 p2p
exec ipsec sa add 100019 spi 200019 crypto-alg aes-gcm-256 crypto-key 6d4c45486f666b4f61527a4e6a504773707149555156446e556e424a674c6a6e esp
exec ipsec sa add 19 spi 100019 crypto-alg aes-gcm-256 crypto-key 6d4c45486f666b4f61527a4e6a504773707149555156446e556e424a674c6a6e esp
exec ipsec tunnel protect ipip19 sa-out 100019 sa-in 19 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.20.1 p2p
exec ipsec sa add 100020 spi 200020 crypto-alg aes-gcm-256 crypto-key 4546696b5645435675735670595a704f78426542515573746f77435055755865 esp
exec ipsec sa add 20 spi 100020 crypto-alg aes-gcm-256 crypto-key 4546696b5645435675735670595a704f78426542515573746f77435055755865 esp
exec ipsec tunnel protect ipip20 sa-out 100020 sa-in 20 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.21.1 p2p
exec ipsec sa add 100021 spi 200021 crypto-alg aes-gcm-256 crypto-key 444c5a454d6c4170734b5058495347696e66755a6e51636669735246646f774a esp
exec ipsec sa add 21 spi 100021 crypto-alg aes-gcm-256 crypto-key 444c5a454d6c4170734b5058495347696e66755a6e51636669735246646f774a esp
exec ipsec tunnel protect ipip21 sa-out 100021 sa-in 21 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.22.1 p2p
exec ipsec sa add 100022 spi 200022 crypto-alg aes-gcm-256 crypto-key 7a42564d6858525054414b6c6b4a6f4b51575673547278664f766a4767454971 esp
exec ipsec sa add 22 spi 100022 crypto-alg aes-gcm-256 crypto-key 7a42564d6858525054414b6c6b4a6f4b51575673547278664f766a4767454971 esp
exec ipsec tunnel protect ipip22 sa-out 100022 sa-in 22 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.23.1 p2p
exec ipsec sa add 100023 spi 200023 crypto-alg aes-gcm-256 crypto-key 5a546644444564797157754d556c705474416b47445874566f53585a6e6c4951 esp
exec ipsec sa add 23 spi 100023 crypto-alg aes-gcm-256 crypto-key 5a546644444564797157754d556c705474416b47445874566f53585a6e6c4951 esp
exec ipsec tunnel protect ipip23 sa-out 100023 sa-in 23 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.24.1 p2p
exec ipsec sa add 100024 spi 200024 crypto-alg aes-gcm-256 crypto-key 707a73774d656855655941586a6b4653536471796656586f576945714f765562 esp
exec ipsec sa add 24 spi 100024 crypto-alg aes-gcm-256 crypto-key 707a73774d656855655941586a6b4653536471796656586f576945714f765562 esp
exec ipsec tunnel protect ipip24 sa-out 100024 sa-in 24 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.25.1 p2p
exec ipsec sa add 100025 spi 200025 crypto-alg aes-gcm-256 crypto-key 567268634f4f554e586e6a4a7061676679656d79446762656d745557684a6445 esp
exec ipsec sa add 25 spi 100025 crypto-alg aes-gcm-256 crypto-key 567268634f4f554e586e6a4a7061676679656d79446762656d745557684a6445 esp
exec ipsec tunnel protect ipip25 sa-out 100025 sa-in 25 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.26.1 p2p
exec ipsec sa add 100026 spi 200026 crypto-alg aes-gcm-256 crypto-key 426b494841565670676861467464506246546a6e4b417153777652684a694371 esp
exec ipsec sa add 26 spi 100026 crypto-alg aes-gcm-256 crypto-key 426b494841565670676861467464506246546a6e4b417153777652684a694371 esp
exec ipsec tunnel protect ipip26 sa-out 100026 sa-in 26 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.27.1 p2p
exec ipsec sa add 100027 spi 200027 crypto-alg aes-gcm-256 crypto-key 496e6c4f4f6170415242506e6972554d6a726e417a686d644f62486871485661 esp
exec ipsec sa add 27 spi 100027 crypto-alg aes-gcm-256 crypto-key 496e6c4f4f6170415242506e6972554d6a726e417a686d644f62486871485661 esp
exec ipsec tunnel protect ipip27 sa-out 100027 sa-in 27 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.28.1 p2p
exec ipsec sa add 100028 spi 200028 crypto-alg aes-gcm-256 crypto-key 77774661784b51674d5946496b58794b586a456a65744f47626e544155434879 esp
exec ipsec sa add 28 spi 100028 crypto-alg aes-gcm-256 crypto-key 77774661784b51674d5946496b58794b586a456a65744f47626e544155434879 esp
exec ipsec tunnel protect ipip28 sa-out 100028 sa-in 28 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.29.1 p2p
exec ipsec sa add 100029 spi 200029 crypto-alg aes-gcm-256 crypto-key 5462674f65584474706f79587962545a70737465456f4d775865477a72587442 esp
exec ipsec sa add 29 spi 100029 crypto-alg aes-gcm-256 crypto-key 5462674f65584474706f79587962545a70737465456f4d775865477a72587442 esp
exec ipsec tunnel protect ipip29 sa-out 100029 sa-in 29 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.30.1 p2p
exec ipsec sa add 100030 spi 200030 crypto-alg aes-gcm-256 crypto-key 484671616157634974505a62674f744f44684d536d444c447648436c4c796f51 esp
exec ipsec sa add 30 spi 100030 crypto-alg aes-gcm-256 crypto-key 484671616157634974505a62674f744f44684d536d444c447648436c4c796f51 esp
exec ipsec tunnel protect ipip30 sa-out 100030 sa-in 30 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.31.1 p2p
exec ipsec sa add 100031 spi 200031 crypto-alg aes-gcm-256 crypto-key 544f5a565a59574d4269636962556f467641634f6c624475767566527a596370 esp
exec ipsec sa add 31 spi 100031 crypto-alg aes-gcm-256 crypto-key 544f5a565a59574d4269636962556f467641634f6c624475767566527a596370 esp
exec ipsec tunnel protect ipip31 sa-out 100031 sa-in 31 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.32.1 p2p
exec ipsec sa add 100032 spi 200032 crypto-alg aes-gcm-256 crypto-key 55506853645664494f794e56585171567472564c467957547a4d524b49547671 esp
exec ipsec sa add 32 spi 100032 crypto-alg aes-gcm-256 crypto-key 55506853645664494f794e56585171567472564c467957547a4d524b49547671 esp
exec ipsec tunnel protect ipip32 sa-out 100032 sa-in 32 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.33.1 p2p
exec ipsec sa add 100033 spi 200033 crypto-alg aes-gcm-256 crypto-key 4c6166486f777a4141434147764e58745943485a41474879466b6e4c71746579 esp
exec ipsec sa add 33 spi 100033 crypto-alg aes-gcm-256 crypto-key 4c6166486f777a4141434147764e58745943485a41474879466b6e4c71746579 esp
exec ipsec tunnel protect ipip33 sa-out 100033 sa-in 33 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.34.1 p2p
exec ipsec sa add 100034 spi 200034 crypto-alg aes-gcm-256 crypto-key 69446a4347705a70544b48575246494d4e4e684c746363666f696b737465785a esp
exec ipsec sa add 34 spi 100034 crypto-alg aes-gcm-256 crypto-key 69446a4347705a70544b48575246494d4e4e684c746363666f696b737465785a esp
exec ipsec tunnel protect ipip34 sa-out 100034 sa-in 34 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.35.1 p2p
exec ipsec sa add 100035 spi 200035 crypto-alg aes-gcm-256 crypto-key 656c55765064576c437a725a69666f6a776c5276756b5a49664862694f6b6855 esp
exec ipsec sa add 35 spi 100035 crypto-alg aes-gcm-256 crypto-key 656c55765064576c437a725a69666f6a776c5276756b5a49664862694f6b6855 esp
exec ipsec tunnel protect ipip35 sa-out 100035 sa-in 35 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.36.1 p2p
exec ipsec sa add 100036 spi 200036 crypto-alg aes-gcm-256 crypto-key 42506e45514c46646745416e5243676a70624a6854634d4758775746574a7543 esp
exec ipsec sa add 36 spi 100036 crypto-alg aes-gcm-256 crypto-key 42506e45514c46646745416e5243676a70624a6854634d4758775746574a7543 esp
exec ipsec tunnel protect ipip36 sa-out 100036 sa-in 36 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.37.1 p2p
exec ipsec sa add 100037 spi 200037 crypto-alg aes-gcm-256 crypto-key 4f4c5a52624b6a4d424c6171464a4e635158574b477149714977616277594a65 esp
exec ipsec sa add 37 spi 100037 crypto-alg aes-gcm-256 crypto-key 4f4c5a52624b6a4d424c6171464a4e635158574b477149714977616277594a65 esp
exec ipsec tunnel protect ipip37 sa-out 100037 sa-in 37 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.38.1 p2p
exec ipsec sa add 100038 spi 200038 crypto-alg aes-gcm-256 crypto-key 6449766c44764a7451504d41734276544f506a5763476b72476459496a536550 esp
exec ipsec sa add 38 spi 100038 crypto-alg aes-gcm-256 crypto-key 6449766c44764a7451504d41734276544f506a5763476b72476459496a536550 esp
exec ipsec tunnel protect ipip38 sa-out 100038 sa-in 38 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.39.1 p2p
exec ipsec sa add 100039 spi 200039 crypto-alg aes-gcm-256 crypto-key 504247544969486f577870454c4848576c6a6859656e6d4c6f6a455044465449 esp
exec ipsec sa add 39 spi 100039 crypto-alg aes-gcm-256 crypto-key 504247544969486f577870454c4848576c6a6859656e6d4c6f6a455044465449 esp
exec ipsec tunnel protect ipip39 sa-out 100039 sa-in 39 add
exec ip route add 100.0.0.1/8 via 200.0.0.101 TenGigabitEthernet8/0/0
exec set interface unnumbered ipip0 use TenGigabitEthernet8/0/0
exec set interface state ipip0 up
exec ip route add 10.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use TenGigabitEthernet8/0/0
exec set interface state ipip1 up
exec ip route add 10.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use TenGigabitEthernet8/0/0
exec set interface state ipip2 up
exec ip route add 10.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use TenGigabitEthernet8/0/0
exec set interface state ipip3 up
exec ip route add 10.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use TenGigabitEthernet8/0/0
exec set interface state ipip4 up
exec ip route add 10.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use TenGigabitEthernet8/0/0
exec set interface state ipip5 up
exec ip route add 10.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use TenGigabitEthernet8/0/0
exec set interface state ipip6 up
exec ip route add 10.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use TenGigabitEthernet8/0/0
exec set interface state ipip7 up
exec ip route add 10.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use TenGigabitEthernet8/0/0
exec set interface state ipip8 up
exec ip route add 10.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use TenGigabitEthernet8/0/0
exec set interface state ipip9 up
exec ip route add 10.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use TenGigabitEthernet8/0/0
exec set interface state ipip10 up
exec ip route add 10.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use TenGigabitEthernet8/0/0
exec set interface state ipip11 up
exec ip route add 10.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use TenGigabitEthernet8/0/0
exec set interface state ipip12 up
exec ip route add 10.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use TenGigabitEthernet8/0/0
exec set interface state ipip13 up
exec ip route add 10.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use TenGigabitEthernet8/0/0
exec set interface state ipip14 up
exec ip route add 10.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use TenGigabitEthernet8/0/0
exec set interface state ipip15 up
exec ip route add 10.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use TenGigabitEthernet8/0/0
exec set interface state ipip16 up
exec ip route add 10.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use TenGigabitEthernet8/0/0
exec set interface state ipip17 up
exec ip route add 10.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use TenGigabitEthernet8/0/0
exec set interface state ipip18 up
exec ip route add 10.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use TenGigabitEthernet8/0/0
exec set interface state ipip19 up
exec ip route add 10.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use TenGigabitEthernet8/0/0
exec set interface state ipip20 up
exec ip route add 10.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use TenGigabitEthernet8/0/0
exec set interface state ipip21 up
exec ip route add 10.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use TenGigabitEthernet8/0/0
exec set interface state ipip22 up
exec ip route add 10.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use TenGigabitEthernet8/0/0
exec set interface state ipip23 up
exec ip route add 10.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use TenGigabitEthernet8/0/0
exec set interface state ipip24 up
exec ip route add 10.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use TenGigabitEthernet8/0/0
exec set interface state ipip25 up
exec ip route add 10.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use TenGigabitEthernet8/0/0
exec set interface state ipip26 up
exec ip route add 10.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use TenGigabitEthernet8/0/0
exec set interface state ipip27 up
exec ip route add 10.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use TenGigabitEthernet8/0/0
exec set interface state ipip28 up
exec ip route add 10.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use TenGigabitEthernet8/0/0
exec set interface state ipip29 up
exec ip route add 10.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use TenGigabitEthernet8/0/0
exec set interface state ipip30 up
exec ip route add 10.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use TenGigabitEthernet8/0/0
exec set interface state ipip31 up
exec ip route add 10.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use TenGigabitEthernet8/0/0
exec set interface state ipip32 up
exec ip route add 10.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use TenGigabitEthernet8/0/0
exec set interface state ipip33 up
exec ip route add 10.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use TenGigabitEthernet8/0/0
exec set interface state ipip34 up
exec ip route add 10.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use TenGigabitEthernet8/0/0
exec set interface state ipip35 up
exec ip route add 10.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use TenGigabitEthernet8/0/0
exec set interface state ipip36 up
exec ip route add 10.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use TenGigabitEthernet8/0/0
exec set interface state ipip37 up
exec ip route add 10.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use TenGigabitEthernet8/0/0
exec set interface state ipip38 up
exec ip route add 10.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use TenGigabitEthernet8/0/0
exec set interface state ipip39 up
exec ip route add 10.0.0.39/32 via ipip39

 1518b-2t2c-ethip4ipsec40tnlsw- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec create loopback interface
exec set interface state loop0 up
exec set interface ip address TenGigabitEthernet8/0/0 200.0.0.101/24
exec set ip neighbor TenGigabitEthernet8/0/0 200.0.0.102 ac:1f:6b:57:57:fe static
exec set interface ip address loop0 100.0.0.1/32
exec create ipip tunnel src 100.0.0.1 dst 200.0.0.102 p2p
exec ipsec sa add 0 spi 100000 crypto-alg aes-gcm-256 crypto-key 5179707055757155664c444c5054487173636759584955674b7361675376534f esp
exec ipsec sa add 100000 spi 200000 crypto-alg aes-gcm-256 crypto-key 5179707055757155664c444c5054487173636759584955674b7361675376534f esp
exec ipsec tunnel protect ipip0 sa-out 0 sa-in 100000 add
exec set interface ip address loop0 100.0.1.1/32
exec create ipip tunnel src 100.0.1.1 dst 200.0.0.102 p2p
exec ipsec sa add 1 spi 100001 crypto-alg aes-gcm-256 crypto-key 6e7342796d68565858765a704979766450505262495545447a4d4c654a485a47 esp
exec ipsec sa add 100001 spi 200001 crypto-alg aes-gcm-256 crypto-key 6e7342796d68565858765a704979766450505262495545447a4d4c654a485a47 esp
exec ipsec tunnel protect ipip1 sa-out 1 sa-in 100001 add
exec set interface ip address loop0 100.0.2.1/32
exec create ipip tunnel src 100.0.2.1 dst 200.0.0.102 p2p
exec ipsec sa add 2 spi 100002 crypto-alg aes-gcm-256 crypto-key 6f4b706545577a55664554487659496a554e71534b634a566d65686a6b446676 esp
exec ipsec sa add 100002 spi 200002 crypto-alg aes-gcm-256 crypto-key 6f4b706545577a55664554487659496a554e71534b634a566d65686a6b446676 esp
exec ipsec tunnel protect ipip2 sa-out 2 sa-in 100002 add
exec set interface ip address loop0 100.0.3.1/32
exec create ipip tunnel src 100.0.3.1 dst 200.0.0.102 p2p
exec ipsec sa add 3 spi 100003 crypto-alg aes-gcm-256 crypto-key 786663526763466a684d796f57746d756c476a64546d4653554a58706e685652 esp
exec ipsec sa add 100003 spi 200003 crypto-alg aes-gcm-256 crypto-key 786663526763466a684d796f57746d756c476a64546d4653554a58706e685652 esp
exec ipsec tunnel protect ipip3 sa-out 3 sa-in 100003 add
exec set interface ip address loop0 100.0.4.1/32
exec create ipip tunnel src 100.0.4.1 dst 200.0.0.102 p2p
exec ipsec sa add 4 spi 100004 crypto-alg aes-gcm-256 crypto-key 736c4b656d62484676505a725a534c4868536f4f6c4d6c70566972694e4e674d esp
exec ipsec sa add 100004 spi 200004 crypto-alg aes-gcm-256 crypto-key 736c4b656d62484676505a725a534c4868536f4f6c4d6c70566972694e4e674d esp
exec ipsec tunnel protect ipip4 sa-out 4 sa-in 100004 add
exec set interface ip address loop0 100.0.5.1/32
exec create ipip tunnel src 100.0.5.1 dst 200.0.0.102 p2p
exec ipsec sa add 5 spi 100005 crypto-alg aes-gcm-256 crypto-key 6f46774a504d6244584c6d4a5a6b415475726f49686b54796d76467777464d46 esp
exec ipsec sa add 100005 spi 200005 crypto-alg aes-gcm-256 crypto-key 6f46774a504d6244584c6d4a5a6b415475726f49686b54796d76467777464d46 esp
exec ipsec tunnel protect ipip5 sa-out 5 sa-in 100005 add
exec set interface ip address loop0 100.0.6.1/32
exec create ipip tunnel src 100.0.6.1 dst 200.0.0.102 p2p
exec ipsec sa add 6 spi 100006 crypto-alg aes-gcm-256 crypto-key 4755564a5169597779464564744969487452627a45526a726166796e58535253 esp
exec ipsec sa add 100006 spi 200006 crypto-alg aes-gcm-256 crypto-key 4755564a5169597779464564744969487452627a45526a726166796e58535253 esp
exec ipsec tunnel protect ipip6 sa-out 6 sa-in 100006 add
exec set interface ip address loop0 100.0.7.1/32
exec create ipip tunnel src 100.0.7.1 dst 200.0.0.102 p2p
exec ipsec sa add 7 spi 100007 crypto-alg aes-gcm-256 crypto-key 55595352526f686f506b66697576744879464c47726f4d415a664d5769706752 esp
exec ipsec sa add 100007 spi 200007 crypto-alg aes-gcm-256 crypto-key 55595352526f686f506b66697576744879464c47726f4d415a664d5769706752 esp
exec ipsec tunnel protect ipip7 sa-out 7 sa-in 100007 add
exec set interface ip address loop0 100.0.8.1/32
exec create ipip tunnel src 100.0.8.1 dst 200.0.0.102 p2p
exec ipsec sa add 8 spi 100008 crypto-alg aes-gcm-256 crypto-key 596a726d675965466245565a634744696765437745455875757a534258684744 esp
exec ipsec sa add 100008 spi 200008 crypto-alg aes-gcm-256 crypto-key 596a726d675965466245565a634744696765437745455875757a534258684744 esp
exec ipsec tunnel protect ipip8 sa-out 8 sa-in 100008 add
exec set interface ip address loop0 100.0.9.1/32
exec create ipip tunnel src 100.0.9.1 dst 200.0.0.102 p2p
exec ipsec sa add 9 spi 100009 crypto-alg aes-gcm-256 crypto-key 5a555275476f6a745249564f4146425a794b4e61464e504d7067656478426f5a esp
exec ipsec sa add 100009 spi 200009 crypto-alg aes-gcm-256 crypto-key 5a555275476f6a745249564f4146425a794b4e61464e504d7067656478426f5a esp
exec ipsec tunnel protect ipip9 sa-out 9 sa-in 100009 add
exec set interface ip address loop0 100.0.10.1/32
exec create ipip tunnel src 100.0.10.1 dst 200.0.0.102 p2p
exec ipsec sa add 10 spi 100010 crypto-alg aes-gcm-256 crypto-key 6750597756457877744a49467050746e694e6172584859435a4853687a67574e esp
exec ipsec sa add 100010 spi 200010 crypto-alg aes-gcm-256 crypto-key 6750597756457877744a49467050746e694e6172584859435a4853687a67574e esp
exec ipsec tunnel protect ipip10 sa-out 10 sa-in 100010 add
exec set interface ip address loop0 100.0.11.1/32
exec create ipip tunnel src 100.0.11.1 dst 200.0.0.102 p2p
exec ipsec sa add 11 spi 100011 crypto-alg aes-gcm-256 crypto-key 44446649474b79564c686d52506c496d72434d614563746159654e486b614849 esp
exec ipsec sa add 100011 spi 200011 crypto-alg aes-gcm-256 crypto-key 44446649474b79564c686d52506c496d72434d614563746159654e486b614849 esp
exec ipsec tunnel protect ipip11 sa-out 11 sa-in 100011 add
exec set interface ip address loop0 100.0.12.1/32
exec create ipip tunnel src 100.0.12.1 dst 200.0.0.102 p2p
exec ipsec sa add 12 spi 100012 crypto-alg aes-gcm-256 crypto-key 575358634671774f7842587355466e614f7766554b42715755525167496e7476 esp
exec ipsec sa add 100012 spi 200012 crypto-alg aes-gcm-256 crypto-key 575358634671774f7842587355466e614f7766554b42715755525167496e7476 esp
exec ipsec tunnel protect ipip12 sa-out 12 sa-in 100012 add
exec set interface ip address loop0 100.0.13.1/32
exec create ipip tunnel src 100.0.13.1 dst 200.0.0.102 p2p
exec ipsec sa add 13 spi 100013 crypto-alg aes-gcm-256 crypto-key 674d75574655624b51497654706a686a5a4f58516567475158666f5266687564 esp
exec ipsec sa add 100013 spi 200013 crypto-alg aes-gcm-256 crypto-key 674d75574655624b51497654706a686a5a4f58516567475158666f5266687564 esp
exec ipsec tunnel protect ipip13 sa-out 13 sa-in 100013 add
exec set interface ip address loop0 100.0.14.1/32
exec create ipip tunnel src 100.0.14.1 dst 200.0.0.102 p2p
exec ipsec sa add 14 spi 100014 crypto-alg aes-gcm-256 crypto-key 7676414f42484a78474c6c574d505a5375674b414d574c495061416769496a78 esp
exec ipsec sa add 100014 spi 200014 crypto-alg aes-gcm-256 crypto-key 7676414f42484a78474c6c574d505a5375674b414d574c495061416769496a78 esp
exec ipsec tunnel protect ipip14 sa-out 14 sa-in 100014 add
exec set interface ip address loop0 100.0.15.1/32
exec create ipip tunnel src 100.0.15.1 dst 200.0.0.102 p2p
exec ipsec sa add 15 spi 100015 crypto-alg aes-gcm-256 crypto-key 557a774b4c6c4751544e456a4c586651714270544e616e677274684d7a49426f esp
exec ipsec sa add 100015 spi 200015 crypto-alg aes-gcm-256 crypto-key 557a774b4c6c4751544e456a4c586651714270544e616e677274684d7a49426f esp
exec ipsec tunnel protect ipip15 sa-out 15 sa-in 100015 add
exec set interface ip address loop0 100.0.16.1/32
exec create ipip tunnel src 100.0.16.1 dst 200.0.0.102 p2p
exec ipsec sa add 16 spi 100016 crypto-alg aes-gcm-256 crypto-key 6752476541794e4646616748786367796b78524d75544845796d54617a4e564e esp
exec ipsec sa add 100016 spi 200016 crypto-alg aes-gcm-256 crypto-key 6752476541794e4646616748786367796b78524d75544845796d54617a4e564e esp
exec ipsec tunnel protect ipip16 sa-out 16 sa-in 100016 add
exec set interface ip address loop0 100.0.17.1/32
exec create ipip tunnel src 100.0.17.1 dst 200.0.0.102 p2p
exec ipsec sa add 17 spi 100017 crypto-alg aes-gcm-256 crypto-key 704c6c454341635251577447746f4b45764c5148464e68446978566f644c6a6c esp
exec ipsec sa add 100017 spi 200017 crypto-alg aes-gcm-256 crypto-key 704c6c454341635251577447746f4b45764c5148464e68446978566f644c6a6c esp
exec ipsec tunnel protect ipip17 sa-out 17 sa-in 100017 add
exec set interface ip address loop0 100.0.18.1/32
exec create ipip tunnel src 100.0.18.1 dst 200.0.0.102 p2p
exec ipsec sa add 18 spi 100018 crypto-alg aes-gcm-256 crypto-key 78756665525251444849696371686a784f58514a4159416e516d63446b595142 esp
exec ipsec sa add 100018 spi 200018 crypto-alg aes-gcm-256 crypto-key 78756665525251444849696371686a784f58514a4159416e516d63446b595142 esp
exec ipsec tunnel protect ipip18 sa-out 18 sa-in 100018 add
exec set interface ip address loop0 100.0.19.1/32
exec create ipip tunnel src 100.0.19.1 dst 200.0.0.102 p2p
exec ipsec sa add 19 spi 100019 crypto-alg aes-gcm-256 crypto-key 6b5759774475434d47444a54726c4b6f4567596d55497367754f476c6b704245 esp
exec ipsec sa add 100019 spi 200019 crypto-alg aes-gcm-256 crypto-key 6b5759774475434d47444a54726c4b6f4567596d55497367754f476c6b704245 esp
exec ipsec tunnel protect ipip19 sa-out 19 sa-in 100019 add
exec set interface ip address loop0 100.0.20.1/32
exec create ipip tunnel src 100.0.20.1 dst 200.0.0.102 p2p
exec ipsec sa add 20 spi 100020 crypto-alg aes-gcm-256 crypto-key 595a6b736c56744f79737549486d68436476467757635146704455727451576e esp
exec ipsec sa add 100020 spi 200020 crypto-alg aes-gcm-256 crypto-key 595a6b736c56744f79737549486d68436476467757635146704455727451576e esp
exec ipsec tunnel protect ipip20 sa-out 20 sa-in 100020 add
exec set interface ip address loop0 100.0.21.1/32
exec create ipip tunnel src 100.0.21.1 dst 200.0.0.102 p2p
exec ipsec sa add 21 spi 100021 crypto-alg aes-gcm-256 crypto-key 4e57656779704552684a4358574f79624a6c7249644950556d7973524662566e esp
exec ipsec sa add 100021 spi 200021 crypto-alg aes-gcm-256 crypto-key 4e57656779704552684a4358574f79624a6c7249644950556d7973524662566e esp
exec ipsec tunnel protect ipip21 sa-out 21 sa-in 100021 add
exec set interface ip address loop0 100.0.22.1/32
exec create ipip tunnel src 100.0.22.1 dst 200.0.0.102 p2p
exec ipsec sa add 22 spi 100022 crypto-alg aes-gcm-256 crypto-key 4a4e6550514f504470474e58525a6d4f7774494b61674853626c4e7870435545 esp
exec ipsec sa add 100022 spi 200022 crypto-alg aes-gcm-256 crypto-key 4a4e6550514f504470474e58525a6d4f7774494b61674853626c4e7870435545 esp
exec ipsec tunnel protect ipip22 sa-out 22 sa-in 100022 add
exec set interface ip address loop0 100.0.23.1/32
exec create ipip tunnel src 100.0.23.1 dst 200.0.0.102 p2p
exec ipsec sa add 23 spi 100023 crypto-alg aes-gcm-256 crypto-key 53764f62624d70497874766d62694a58677a727249556d617a5376456b616b61 esp
exec ipsec sa add 100023 spi 200023 crypto-alg aes-gcm-256 crypto-key 53764f62624d70497874766d62694a58677a727249556d617a5376456b616b61 esp
exec ipsec tunnel protect ipip23 sa-out 23 sa-in 100023 add
exec set interface ip address loop0 100.0.24.1/32
exec create ipip tunnel src 100.0.24.1 dst 200.0.0.102 p2p
exec ipsec sa add 24 spi 100024 crypto-alg aes-gcm-256 crypto-key 516b67636e72584b5778644d72446b6346636577695765487869574563447057 esp
exec ipsec sa add 100024 spi 200024 crypto-alg aes-gcm-256 crypto-key 516b67636e72584b5778644d72446b6346636577695765487869574563447057 esp
exec ipsec tunnel protect ipip24 sa-out 24 sa-in 100024 add
exec set interface ip address loop0 100.0.25.1/32
exec create ipip tunnel src 100.0.25.1 dst 200.0.0.102 p2p
exec ipsec sa add 25 spi 100025 crypto-alg aes-gcm-256 crypto-key 4942617a706f7a774f6c677545586a714a4947477752664f654551414c596e7a esp
exec ipsec sa add 100025 spi 200025 crypto-alg aes-gcm-256 crypto-key 4942617a706f7a774f6c677545586a714a4947477752664f654551414c596e7a esp
exec ipsec tunnel protect ipip25 sa-out 25 sa-in 100025 add
exec set interface ip address loop0 100.0.26.1/32
exec create ipip tunnel src 100.0.26.1 dst 200.0.0.102 p2p
exec ipsec sa add 26 spi 100026 crypto-alg aes-gcm-256 crypto-key 48526a57715978634e466d69546c56424d4a70516870516859736f4769544e47 esp
exec ipsec sa add 100026 spi 200026 crypto-alg aes-gcm-256 crypto-key 48526a57715978634e466d69546c56424d4a70516870516859736f4769544e47 esp
exec ipsec tunnel protect ipip26 sa-out 26 sa-in 100026 add
exec set interface ip address loop0 100.0.27.1/32
exec create ipip tunnel src 100.0.27.1 dst 200.0.0.102 p2p
exec ipsec sa add 27 spi 100027 crypto-alg aes-gcm-256 crypto-key 6b4f414d7045584c65726d7347436d717a6d5474716843614d684a6279667454 esp
exec ipsec sa add 100027 spi 200027 crypto-alg aes-gcm-256 crypto-key 6b4f414d7045584c65726d7347436d717a6d5474716843614d684a6279667454 esp
exec ipsec tunnel protect ipip27 sa-out 27 sa-in 100027 add
exec set interface ip address loop0 100.0.28.1/32
exec create ipip tunnel src 100.0.28.1 dst 200.0.0.102 p2p
exec ipsec sa add 28 spi 100028 crypto-alg aes-gcm-256 crypto-key 776a726a7948474f4846734468587346754843614a735a546349794a6c686a4f esp
exec ipsec sa add 100028 spi 200028 crypto-alg aes-gcm-256 crypto-key 776a726a7948474f4846734468587346754843614a735a546349794a6c686a4f esp
exec ipsec tunnel protect ipip28 sa-out 28 sa-in 100028 add
exec set interface ip address loop0 100.0.29.1/32
exec create ipip tunnel src 100.0.29.1 dst 200.0.0.102 p2p
exec ipsec sa add 29 spi 100029 crypto-alg aes-gcm-256 crypto-key 5372436254614c4d52555149555a72726551474c4e7646714666724c78755969 esp
exec ipsec sa add 100029 spi 200029 crypto-alg aes-gcm-256 crypto-key 5372436254614c4d52555149555a72726551474c4e7646714666724c78755969 esp
exec ipsec tunnel protect ipip29 sa-out 29 sa-in 100029 add
exec set interface ip address loop0 100.0.30.1/32
exec create ipip tunnel src 100.0.30.1 dst 200.0.0.102 p2p
exec ipsec sa add 30 spi 100030 crypto-alg aes-gcm-256 crypto-key 7657716479675952446146674277704857417a4d4956484f6d6f6a4f4e514854 esp
exec ipsec sa add 100030 spi 200030 crypto-alg aes-gcm-256 crypto-key 7657716479675952446146674277704857417a4d4956484f6d6f6a4f4e514854 esp
exec ipsec tunnel protect ipip30 sa-out 30 sa-in 100030 add
exec set interface ip address loop0 100.0.31.1/32
exec create ipip tunnel src 100.0.31.1 dst 200.0.0.102 p2p
exec ipsec sa add 31 spi 100031 crypto-alg aes-gcm-256 crypto-key 41696e6e7a7744414f63664c636c676f576d5169646f46557747476661457547 esp
exec ipsec sa add 100031 spi 200031 crypto-alg aes-gcm-256 crypto-key 41696e6e7a7744414f63664c636c676f576d5169646f46557747476661457547 esp
exec ipsec tunnel protect ipip31 sa-out 31 sa-in 100031 add
exec set interface ip address loop0 100.0.32.1/32
exec create ipip tunnel src 100.0.32.1 dst 200.0.0.102 p2p
exec ipsec sa add 32 spi 100032 crypto-alg aes-gcm-256 crypto-key 75656761677555634e69624f43667a507a6948594a79524f5a50426773534172 esp
exec ipsec sa add 100032 spi 200032 crypto-alg aes-gcm-256 crypto-key 75656761677555634e69624f43667a507a6948594a79524f5a50426773534172 esp
exec ipsec tunnel protect ipip32 sa-out 32 sa-in 100032 add
exec set interface ip address loop0 100.0.33.1/32
exec create ipip tunnel src 100.0.33.1 dst 200.0.0.102 p2p
exec ipsec sa add 33 spi 100033 crypto-alg aes-gcm-256 crypto-key 5a42514947674c75764d43755a586f57544d627143447642576c4c7a58464864 esp
exec ipsec sa add 100033 spi 200033 crypto-alg aes-gcm-256 crypto-key 5a42514947674c75764d43755a586f57544d627143447642576c4c7a58464864 esp
exec ipsec tunnel protect ipip33 sa-out 33 sa-in 100033 add
exec set interface ip address loop0 100.0.34.1/32
exec create ipip tunnel src 100.0.34.1 dst 200.0.0.102 p2p
exec ipsec sa add 34 spi 100034 crypto-alg aes-gcm-256 crypto-key 6f694e466c49507641786e6c6d574741476977546a54734e67594a476a6a4e5a esp
exec ipsec sa add 100034 spi 200034 crypto-alg aes-gcm-256 crypto-key 6f694e466c49507641786e6c6d574741476977546a54734e67594a476a6a4e5a esp
exec ipsec tunnel protect ipip34 sa-out 34 sa-in 100034 add
exec set interface ip address loop0 100.0.35.1/32
exec create ipip tunnel src 100.0.35.1 dst 200.0.0.102 p2p
exec ipsec sa add 35 spi 100035 crypto-alg aes-gcm-256 crypto-key 61754a7a43726a6f4463557878736a68556f4478486b754a7a69507168665457 esp
exec ipsec sa add 100035 spi 200035 crypto-alg aes-gcm-256 crypto-key 61754a7a43726a6f4463557878736a68556f4478486b754a7a69507168665457 esp
exec ipsec tunnel protect ipip35 sa-out 35 sa-in 100035 add
exec set interface ip address loop0 100.0.36.1/32
exec create ipip tunnel src 100.0.36.1 dst 200.0.0.102 p2p
exec ipsec sa add 36 spi 100036 crypto-alg aes-gcm-256 crypto-key 726a786d6843696e78707464486e4b64754b496a63674378526d525448507250 esp
exec ipsec sa add 100036 spi 200036 crypto-alg aes-gcm-256 crypto-key 726a786d6843696e78707464486e4b64754b496a63674378526d525448507250 esp
exec ipsec tunnel protect ipip36 sa-out 36 sa-in 100036 add
exec set interface ip address loop0 100.0.37.1/32
exec create ipip tunnel src 100.0.37.1 dst 200.0.0.102 p2p
exec ipsec sa add 37 spi 100037 crypto-alg aes-gcm-256 crypto-key 75565662777366777a516c4b43704869736f4b79626a775653635953674c4e61 esp
exec ipsec sa add 100037 spi 200037 crypto-alg aes-gcm-256 crypto-key 75565662777366777a516c4b43704869736f4b79626a775653635953674c4e61 esp
exec ipsec tunnel protect ipip37 sa-out 37 sa-in 100037 add
exec set interface ip address loop0 100.0.38.1/32
exec create ipip tunnel src 100.0.38.1 dst 200.0.0.102 p2p
exec ipsec sa add 38 spi 100038 crypto-alg aes-gcm-256 crypto-key 50766f4955444c68695079594c7641546261476b524845676d57585572575863 esp
exec ipsec sa add 100038 spi 200038 crypto-alg aes-gcm-256 crypto-key 50766f4955444c68695079594c7641546261476b524845676d57585572575863 esp
exec ipsec tunnel protect ipip38 sa-out 38 sa-in 100038 add
exec set interface ip address loop0 100.0.39.1/32
exec create ipip tunnel src 100.0.39.1 dst 200.0.0.102 p2p
exec ipsec sa add 39 spi 100039 crypto-alg aes-gcm-256 crypto-key 7173465259634b43787373564c766374437274615854635049734c76714c456b esp
exec ipsec sa add 100039 spi 200039 crypto-alg aes-gcm-256 crypto-key 7173465259634b43787373564c766374437274615854635049734c76714c456b esp
exec ipsec tunnel protect ipip39 sa-out 39 sa-in 100039 add
exec set interface unnumbered ipip0 use TenGigabitEthernet8/0/0
exec set interface state ipip0 up
exec ip route add 20.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use TenGigabitEthernet8/0/0
exec set interface state ipip1 up
exec ip route add 20.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use TenGigabitEthernet8/0/0
exec set interface state ipip2 up
exec ip route add 20.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use TenGigabitEthernet8/0/0
exec set interface state ipip3 up
exec ip route add 20.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use TenGigabitEthernet8/0/0
exec set interface state ipip4 up
exec ip route add 20.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use TenGigabitEthernet8/0/0
exec set interface state ipip5 up
exec ip route add 20.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use TenGigabitEthernet8/0/0
exec set interface state ipip6 up
exec ip route add 20.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use TenGigabitEthernet8/0/0
exec set interface state ipip7 up
exec ip route add 20.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use TenGigabitEthernet8/0/0
exec set interface state ipip8 up
exec ip route add 20.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use TenGigabitEthernet8/0/0
exec set interface state ipip9 up
exec ip route add 20.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use TenGigabitEthernet8/0/0
exec set interface state ipip10 up
exec ip route add 20.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use TenGigabitEthernet8/0/0
exec set interface state ipip11 up
exec ip route add 20.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use TenGigabitEthernet8/0/0
exec set interface state ipip12 up
exec ip route add 20.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use TenGigabitEthernet8/0/0
exec set interface state ipip13 up
exec ip route add 20.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use TenGigabitEthernet8/0/0
exec set interface state ipip14 up
exec ip route add 20.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use TenGigabitEthernet8/0/0
exec set interface state ipip15 up
exec ip route add 20.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use TenGigabitEthernet8/0/0
exec set interface state ipip16 up
exec ip route add 20.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use TenGigabitEthernet8/0/0
exec set interface state ipip17 up
exec ip route add 20.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use TenGigabitEthernet8/0/0
exec set interface state ipip18 up
exec ip route add 20.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use TenGigabitEthernet8/0/0
exec set interface state ipip19 up
exec ip route add 20.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use TenGigabitEthernet8/0/0
exec set interface state ipip20 up
exec ip route add 20.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use TenGigabitEthernet8/0/0
exec set interface state ipip21 up
exec ip route add 20.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use TenGigabitEthernet8/0/0
exec set interface state ipip22 up
exec ip route add 20.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use TenGigabitEthernet8/0/0
exec set interface state ipip23 up
exec ip route add 20.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use TenGigabitEthernet8/0/0
exec set interface state ipip24 up
exec ip route add 20.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use TenGigabitEthernet8/0/0
exec set interface state ipip25 up
exec ip route add 20.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use TenGigabitEthernet8/0/0
exec set interface state ipip26 up
exec ip route add 20.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use TenGigabitEthernet8/0/0
exec set interface state ipip27 up
exec ip route add 20.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use TenGigabitEthernet8/0/0
exec set interface state ipip28 up
exec ip route add 20.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use TenGigabitEthernet8/0/0
exec set interface state ipip29 up
exec ip route add 20.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use TenGigabitEthernet8/0/0
exec set interface state ipip30 up
exec ip route add 20.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use TenGigabitEthernet8/0/0
exec set interface state ipip31 up
exec ip route add 20.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use TenGigabitEthernet8/0/0
exec set interface state ipip32 up
exec ip route add 20.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use TenGigabitEthernet8/0/0
exec set interface state ipip33 up
exec ip route add 20.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use TenGigabitEthernet8/0/0
exec set interface state ipip34 up
exec ip route add 20.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use TenGigabitEthernet8/0/0
exec set interface state ipip35 up
exec ip route add 20.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use TenGigabitEthernet8/0/0
exec set interface state ipip36 up
exec ip route add 20.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use TenGigabitEthernet8/0/0
exec set interface state ipip37 up
exec ip route add 20.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use TenGigabitEthernet8/0/0
exec set interface state ipip38 up
exec ip route add 20.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use TenGigabitEthernet8/0/0
exec set interface state ipip39 up
exec ip route add 20.0.0.39/32 via ipip39
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec set interface ip address TenGigabitEthernet8/0/0 200.0.0.102/24.0
exec create ipip tunnel src 200.0.0.102 dst 100.0.0.1 p2p
exec ipsec sa add 100000 spi 200000 crypto-alg aes-gcm-256 crypto-key 5179707055757155664c444c5054487173636759584955674b7361675376534f esp
exec ipsec sa add 0 spi 100000 crypto-alg aes-gcm-256 crypto-key 5179707055757155664c444c5054487173636759584955674b7361675376534f esp
exec ipsec tunnel protect ipip0 sa-out 100000 sa-in 0 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.1.1 p2p
exec ipsec sa add 100001 spi 200001 crypto-alg aes-gcm-256 crypto-key 6e7342796d68565858765a704979766450505262495545447a4d4c654a485a47 esp
exec ipsec sa add 1 spi 100001 crypto-alg aes-gcm-256 crypto-key 6e7342796d68565858765a704979766450505262495545447a4d4c654a485a47 esp
exec ipsec tunnel protect ipip1 sa-out 100001 sa-in 1 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.2.1 p2p
exec ipsec sa add 100002 spi 200002 crypto-alg aes-gcm-256 crypto-key 6f4b706545577a55664554487659496a554e71534b634a566d65686a6b446676 esp
exec ipsec sa add 2 spi 100002 crypto-alg aes-gcm-256 crypto-key 6f4b706545577a55664554487659496a554e71534b634a566d65686a6b446676 esp
exec ipsec tunnel protect ipip2 sa-out 100002 sa-in 2 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.3.1 p2p
exec ipsec sa add 100003 spi 200003 crypto-alg aes-gcm-256 crypto-key 786663526763466a684d796f57746d756c476a64546d4653554a58706e685652 esp
exec ipsec sa add 3 spi 100003 crypto-alg aes-gcm-256 crypto-key 786663526763466a684d796f57746d756c476a64546d4653554a58706e685652 esp
exec ipsec tunnel protect ipip3 sa-out 100003 sa-in 3 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.4.1 p2p
exec ipsec sa add 100004 spi 200004 crypto-alg aes-gcm-256 crypto-key 736c4b656d62484676505a725a534c4868536f4f6c4d6c70566972694e4e674d esp
exec ipsec sa add 4 spi 100004 crypto-alg aes-gcm-256 crypto-key 736c4b656d62484676505a725a534c4868536f4f6c4d6c70566972694e4e674d esp
exec ipsec tunnel protect ipip4 sa-out 100004 sa-in 4 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.5.1 p2p
exec ipsec sa add 100005 spi 200005 crypto-alg aes-gcm-256 crypto-key 6f46774a504d6244584c6d4a5a6b415475726f49686b54796d76467777464d46 esp
exec ipsec sa add 5 spi 100005 crypto-alg aes-gcm-256 crypto-key 6f46774a504d6244584c6d4a5a6b415475726f49686b54796d76467777464d46 esp
exec ipsec tunnel protect ipip5 sa-out 100005 sa-in 5 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.6.1 p2p
exec ipsec sa add 100006 spi 200006 crypto-alg aes-gcm-256 crypto-key 4755564a5169597779464564744969487452627a45526a726166796e58535253 esp
exec ipsec sa add 6 spi 100006 crypto-alg aes-gcm-256 crypto-key 4755564a5169597779464564744969487452627a45526a726166796e58535253 esp
exec ipsec tunnel protect ipip6 sa-out 100006 sa-in 6 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.7.1 p2p
exec ipsec sa add 100007 spi 200007 crypto-alg aes-gcm-256 crypto-key 55595352526f686f506b66697576744879464c47726f4d415a664d5769706752 esp
exec ipsec sa add 7 spi 100007 crypto-alg aes-gcm-256 crypto-key 55595352526f686f506b66697576744879464c47726f4d415a664d5769706752 esp
exec ipsec tunnel protect ipip7 sa-out 100007 sa-in 7 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.8.1 p2p
exec ipsec sa add 100008 spi 200008 crypto-alg aes-gcm-256 crypto-key 596a726d675965466245565a634744696765437745455875757a534258684744 esp
exec ipsec sa add 8 spi 100008 crypto-alg aes-gcm-256 crypto-key 596a726d675965466245565a634744696765437745455875757a534258684744 esp
exec ipsec tunnel protect ipip8 sa-out 100008 sa-in 8 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.9.1 p2p
exec ipsec sa add 100009 spi 200009 crypto-alg aes-gcm-256 crypto-key 5a555275476f6a745249564f4146425a794b4e61464e504d7067656478426f5a esp
exec ipsec sa add 9 spi 100009 crypto-alg aes-gcm-256 crypto-key 5a555275476f6a745249564f4146425a794b4e61464e504d7067656478426f5a esp
exec ipsec tunnel protect ipip9 sa-out 100009 sa-in 9 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.10.1 p2p
exec ipsec sa add 100010 spi 200010 crypto-alg aes-gcm-256 crypto-key 6750597756457877744a49467050746e694e6172584859435a4853687a67574e esp
exec ipsec sa add 10 spi 100010 crypto-alg aes-gcm-256 crypto-key 6750597756457877744a49467050746e694e6172584859435a4853687a67574e esp
exec ipsec tunnel protect ipip10 sa-out 100010 sa-in 10 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.11.1 p2p
exec ipsec sa add 100011 spi 200011 crypto-alg aes-gcm-256 crypto-key 44446649474b79564c686d52506c496d72434d614563746159654e486b614849 esp
exec ipsec sa add 11 spi 100011 crypto-alg aes-gcm-256 crypto-key 44446649474b79564c686d52506c496d72434d614563746159654e486b614849 esp
exec ipsec tunnel protect ipip11 sa-out 100011 sa-in 11 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.12.1 p2p
exec ipsec sa add 100012 spi 200012 crypto-alg aes-gcm-256 crypto-key 575358634671774f7842587355466e614f7766554b42715755525167496e7476 esp
exec ipsec sa add 12 spi 100012 crypto-alg aes-gcm-256 crypto-key 575358634671774f7842587355466e614f7766554b42715755525167496e7476 esp
exec ipsec tunnel protect ipip12 sa-out 100012 sa-in 12 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.13.1 p2p
exec ipsec sa add 100013 spi 200013 crypto-alg aes-gcm-256 crypto-key 674d75574655624b51497654706a686a5a4f58516567475158666f5266687564 esp
exec ipsec sa add 13 spi 100013 crypto-alg aes-gcm-256 crypto-key 674d75574655624b51497654706a686a5a4f58516567475158666f5266687564 esp
exec ipsec tunnel protect ipip13 sa-out 100013 sa-in 13 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.14.1 p2p
exec ipsec sa add 100014 spi 200014 crypto-alg aes-gcm-256 crypto-key 7676414f42484a78474c6c574d505a5375674b414d574c495061416769496a78 esp
exec ipsec sa add 14 spi 100014 crypto-alg aes-gcm-256 crypto-key 7676414f42484a78474c6c574d505a5375674b414d574c495061416769496a78 esp
exec ipsec tunnel protect ipip14 sa-out 100014 sa-in 14 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.15.1 p2p
exec ipsec sa add 100015 spi 200015 crypto-alg aes-gcm-256 crypto-key 557a774b4c6c4751544e456a4c586651714270544e616e677274684d7a49426f esp
exec ipsec sa add 15 spi 100015 crypto-alg aes-gcm-256 crypto-key 557a774b4c6c4751544e456a4c586651714270544e616e677274684d7a49426f esp
exec ipsec tunnel protect ipip15 sa-out 100015 sa-in 15 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.16.1 p2p
exec ipsec sa add 100016 spi 200016 crypto-alg aes-gcm-256 crypto-key 6752476541794e4646616748786367796b78524d75544845796d54617a4e564e esp
exec ipsec sa add 16 spi 100016 crypto-alg aes-gcm-256 crypto-key 6752476541794e4646616748786367796b78524d75544845796d54617a4e564e esp
exec ipsec tunnel protect ipip16 sa-out 100016 sa-in 16 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.17.1 p2p
exec ipsec sa add 100017 spi 200017 crypto-alg aes-gcm-256 crypto-key 704c6c454341635251577447746f4b45764c5148464e68446978566f644c6a6c esp
exec ipsec sa add 17 spi 100017 crypto-alg aes-gcm-256 crypto-key 704c6c454341635251577447746f4b45764c5148464e68446978566f644c6a6c esp
exec ipsec tunnel protect ipip17 sa-out 100017 sa-in 17 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.18.1 p2p
exec ipsec sa add 100018 spi 200018 crypto-alg aes-gcm-256 crypto-key 78756665525251444849696371686a784f58514a4159416e516d63446b595142 esp
exec ipsec sa add 18 spi 100018 crypto-alg aes-gcm-256 crypto-key 78756665525251444849696371686a784f58514a4159416e516d63446b595142 esp
exec ipsec tunnel protect ipip18 sa-out 100018 sa-in 18 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.19.1 p2p
exec ipsec sa add 100019 spi 200019 crypto-alg aes-gcm-256 crypto-key 6b5759774475434d47444a54726c4b6f4567596d55497367754f476c6b704245 esp
exec ipsec sa add 19 spi 100019 crypto-alg aes-gcm-256 crypto-key 6b5759774475434d47444a54726c4b6f4567596d55497367754f476c6b704245 esp
exec ipsec tunnel protect ipip19 sa-out 100019 sa-in 19 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.20.1 p2p
exec ipsec sa add 100020 spi 200020 crypto-alg aes-gcm-256 crypto-key 595a6b736c56744f79737549486d68436476467757635146704455727451576e esp
exec ipsec sa add 20 spi 100020 crypto-alg aes-gcm-256 crypto-key 595a6b736c56744f79737549486d68436476467757635146704455727451576e esp
exec ipsec tunnel protect ipip20 sa-out 100020 sa-in 20 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.21.1 p2p
exec ipsec sa add 100021 spi 200021 crypto-alg aes-gcm-256 crypto-key 4e57656779704552684a4358574f79624a6c7249644950556d7973524662566e esp
exec ipsec sa add 21 spi 100021 crypto-alg aes-gcm-256 crypto-key 4e57656779704552684a4358574f79624a6c7249644950556d7973524662566e esp
exec ipsec tunnel protect ipip21 sa-out 100021 sa-in 21 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.22.1 p2p
exec ipsec sa add 100022 spi 200022 crypto-alg aes-gcm-256 crypto-key 4a4e6550514f504470474e58525a6d4f7774494b61674853626c4e7870435545 esp
exec ipsec sa add 22 spi 100022 crypto-alg aes-gcm-256 crypto-key 4a4e6550514f504470474e58525a6d4f7774494b61674853626c4e7870435545 esp
exec ipsec tunnel protect ipip22 sa-out 100022 sa-in 22 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.23.1 p2p
exec ipsec sa add 100023 spi 200023 crypto-alg aes-gcm-256 crypto-key 53764f62624d70497874766d62694a58677a727249556d617a5376456b616b61 esp
exec ipsec sa add 23 spi 100023 crypto-alg aes-gcm-256 crypto-key 53764f62624d70497874766d62694a58677a727249556d617a5376456b616b61 esp
exec ipsec tunnel protect ipip23 sa-out 100023 sa-in 23 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.24.1 p2p
exec ipsec sa add 100024 spi 200024 crypto-alg aes-gcm-256 crypto-key 516b67636e72584b5778644d72446b6346636577695765487869574563447057 esp
exec ipsec sa add 24 spi 100024 crypto-alg aes-gcm-256 crypto-key 516b67636e72584b5778644d72446b6346636577695765487869574563447057 esp
exec ipsec tunnel protect ipip24 sa-out 100024 sa-in 24 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.25.1 p2p
exec ipsec sa add 100025 spi 200025 crypto-alg aes-gcm-256 crypto-key 4942617a706f7a774f6c677545586a714a4947477752664f654551414c596e7a esp
exec ipsec sa add 25 spi 100025 crypto-alg aes-gcm-256 crypto-key 4942617a706f7a774f6c677545586a714a4947477752664f654551414c596e7a esp
exec ipsec tunnel protect ipip25 sa-out 100025 sa-in 25 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.26.1 p2p
exec ipsec sa add 100026 spi 200026 crypto-alg aes-gcm-256 crypto-key 48526a57715978634e466d69546c56424d4a70516870516859736f4769544e47 esp
exec ipsec sa add 26 spi 100026 crypto-alg aes-gcm-256 crypto-key 48526a57715978634e466d69546c56424d4a70516870516859736f4769544e47 esp
exec ipsec tunnel protect ipip26 sa-out 100026 sa-in 26 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.27.1 p2p
exec ipsec sa add 100027 spi 200027 crypto-alg aes-gcm-256 crypto-key 6b4f414d7045584c65726d7347436d717a6d5474716843614d684a6279667454 esp
exec ipsec sa add 27 spi 100027 crypto-alg aes-gcm-256 crypto-key 6b4f414d7045584c65726d7347436d717a6d5474716843614d684a6279667454 esp
exec ipsec tunnel protect ipip27 sa-out 100027 sa-in 27 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.28.1 p2p
exec ipsec sa add 100028 spi 200028 crypto-alg aes-gcm-256 crypto-key 776a726a7948474f4846734468587346754843614a735a546349794a6c686a4f esp
exec ipsec sa add 28 spi 100028 crypto-alg aes-gcm-256 crypto-key 776a726a7948474f4846734468587346754843614a735a546349794a6c686a4f esp
exec ipsec tunnel protect ipip28 sa-out 100028 sa-in 28 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.29.1 p2p
exec ipsec sa add 100029 spi 200029 crypto-alg aes-gcm-256 crypto-key 5372436254614c4d52555149555a72726551474c4e7646714666724c78755969 esp
exec ipsec sa add 29 spi 100029 crypto-alg aes-gcm-256 crypto-key 5372436254614c4d52555149555a72726551474c4e7646714666724c78755969 esp
exec ipsec tunnel protect ipip29 sa-out 100029 sa-in 29 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.30.1 p2p
exec ipsec sa add 100030 spi 200030 crypto-alg aes-gcm-256 crypto-key 7657716479675952446146674277704857417a4d4956484f6d6f6a4f4e514854 esp
exec ipsec sa add 30 spi 100030 crypto-alg aes-gcm-256 crypto-key 7657716479675952446146674277704857417a4d4956484f6d6f6a4f4e514854 esp
exec ipsec tunnel protect ipip30 sa-out 100030 sa-in 30 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.31.1 p2p
exec ipsec sa add 100031 spi 200031 crypto-alg aes-gcm-256 crypto-key 41696e6e7a7744414f63664c636c676f576d5169646f46557747476661457547 esp
exec ipsec sa add 31 spi 100031 crypto-alg aes-gcm-256 crypto-key 41696e6e7a7744414f63664c636c676f576d5169646f46557747476661457547 esp
exec ipsec tunnel protect ipip31 sa-out 100031 sa-in 31 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.32.1 p2p
exec ipsec sa add 100032 spi 200032 crypto-alg aes-gcm-256 crypto-key 75656761677555634e69624f43667a507a6948594a79524f5a50426773534172 esp
exec ipsec sa add 32 spi 100032 crypto-alg aes-gcm-256 crypto-key 75656761677555634e69624f43667a507a6948594a79524f5a50426773534172 esp
exec ipsec tunnel protect ipip32 sa-out 100032 sa-in 32 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.33.1 p2p
exec ipsec sa add 100033 spi 200033 crypto-alg aes-gcm-256 crypto-key 5a42514947674c75764d43755a586f57544d627143447642576c4c7a58464864 esp
exec ipsec sa add 33 spi 100033 crypto-alg aes-gcm-256 crypto-key 5a42514947674c75764d43755a586f57544d627143447642576c4c7a58464864 esp
exec ipsec tunnel protect ipip33 sa-out 100033 sa-in 33 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.34.1 p2p
exec ipsec sa add 100034 spi 200034 crypto-alg aes-gcm-256 crypto-key 6f694e466c49507641786e6c6d574741476977546a54734e67594a476a6a4e5a esp
exec ipsec sa add 34 spi 100034 crypto-alg aes-gcm-256 crypto-key 6f694e466c49507641786e6c6d574741476977546a54734e67594a476a6a4e5a esp
exec ipsec tunnel protect ipip34 sa-out 100034 sa-in 34 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.35.1 p2p
exec ipsec sa add 100035 spi 200035 crypto-alg aes-gcm-256 crypto-key 61754a7a43726a6f4463557878736a68556f4478486b754a7a69507168665457 esp
exec ipsec sa add 35 spi 100035 crypto-alg aes-gcm-256 crypto-key 61754a7a43726a6f4463557878736a68556f4478486b754a7a69507168665457 esp
exec ipsec tunnel protect ipip35 sa-out 100035 sa-in 35 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.36.1 p2p
exec ipsec sa add 100036 spi 200036 crypto-alg aes-gcm-256 crypto-key 726a786d6843696e78707464486e4b64754b496a63674378526d525448507250 esp
exec ipsec sa add 36 spi 100036 crypto-alg aes-gcm-256 crypto-key 726a786d6843696e78707464486e4b64754b496a63674378526d525448507250 esp
exec ipsec tunnel protect ipip36 sa-out 100036 sa-in 36 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.37.1 p2p
exec ipsec sa add 100037 spi 200037 crypto-alg aes-gcm-256 crypto-key 75565662777366777a516c4b43704869736f4b79626a775653635953674c4e61 esp
exec ipsec sa add 37 spi 100037 crypto-alg aes-gcm-256 crypto-key 75565662777366777a516c4b43704869736f4b79626a775653635953674c4e61 esp
exec ipsec tunnel protect ipip37 sa-out 100037 sa-in 37 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.38.1 p2p
exec ipsec sa add 100038 spi 200038 crypto-alg aes-gcm-256 crypto-key 50766f4955444c68695079594c7641546261476b524845676d57585572575863 esp
exec ipsec sa add 38 spi 100038 crypto-alg aes-gcm-256 crypto-key 50766f4955444c68695079594c7641546261476b524845676d57585572575863 esp
exec ipsec tunnel protect ipip38 sa-out 100038 sa-in 38 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.39.1 p2p
exec ipsec sa add 100039 spi 200039 crypto-alg aes-gcm-256 crypto-key 7173465259634b43787373564c766374437274615854635049734c76714c456b esp
exec ipsec sa add 39 spi 100039 crypto-alg aes-gcm-256 crypto-key 7173465259634b43787373564c766374437274615854635049734c76714c456b esp
exec ipsec tunnel protect ipip39 sa-out 100039 sa-in 39 add
exec ip route add 100.0.0.1/8 via 200.0.0.101 TenGigabitEthernet8/0/0
exec set interface unnumbered ipip0 use TenGigabitEthernet8/0/0
exec set interface state ipip0 up
exec ip route add 10.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use TenGigabitEthernet8/0/0
exec set interface state ipip1 up
exec ip route add 10.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use TenGigabitEthernet8/0/0
exec set interface state ipip2 up
exec ip route add 10.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use TenGigabitEthernet8/0/0
exec set interface state ipip3 up
exec ip route add 10.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use TenGigabitEthernet8/0/0
exec set interface state ipip4 up
exec ip route add 10.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use TenGigabitEthernet8/0/0
exec set interface state ipip5 up
exec ip route add 10.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use TenGigabitEthernet8/0/0
exec set interface state ipip6 up
exec ip route add 10.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use TenGigabitEthernet8/0/0
exec set interface state ipip7 up
exec ip route add 10.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use TenGigabitEthernet8/0/0
exec set interface state ipip8 up
exec ip route add 10.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use TenGigabitEthernet8/0/0
exec set interface state ipip9 up
exec ip route add 10.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use TenGigabitEthernet8/0/0
exec set interface state ipip10 up
exec ip route add 10.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use TenGigabitEthernet8/0/0
exec set interface state ipip11 up
exec ip route add 10.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use TenGigabitEthernet8/0/0
exec set interface state ipip12 up
exec ip route add 10.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use TenGigabitEthernet8/0/0
exec set interface state ipip13 up
exec ip route add 10.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use TenGigabitEthernet8/0/0
exec set interface state ipip14 up
exec ip route add 10.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use TenGigabitEthernet8/0/0
exec set interface state ipip15 up
exec ip route add 10.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use TenGigabitEthernet8/0/0
exec set interface state ipip16 up
exec ip route add 10.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use TenGigabitEthernet8/0/0
exec set interface state ipip17 up
exec ip route add 10.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use TenGigabitEthernet8/0/0
exec set interface state ipip18 up
exec ip route add 10.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use TenGigabitEthernet8/0/0
exec set interface state ipip19 up
exec ip route add 10.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use TenGigabitEthernet8/0/0
exec set interface state ipip20 up
exec ip route add 10.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use TenGigabitEthernet8/0/0
exec set interface state ipip21 up
exec ip route add 10.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use TenGigabitEthernet8/0/0
exec set interface state ipip22 up
exec ip route add 10.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use TenGigabitEthernet8/0/0
exec set interface state ipip23 up
exec ip route add 10.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use TenGigabitEthernet8/0/0
exec set interface state ipip24 up
exec ip route add 10.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use TenGigabitEthernet8/0/0
exec set interface state ipip25 up
exec ip route add 10.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use TenGigabitEthernet8/0/0
exec set interface state ipip26 up
exec ip route add 10.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use TenGigabitEthernet8/0/0
exec set interface state ipip27 up
exec ip route add 10.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use TenGigabitEthernet8/0/0
exec set interface state ipip28 up
exec ip route add 10.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use TenGigabitEthernet8/0/0
exec set interface state ipip29 up
exec ip route add 10.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use TenGigabitEthernet8/0/0
exec set interface state ipip30 up
exec ip route add 10.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use TenGigabitEthernet8/0/0
exec set interface state ipip31 up
exec ip route add 10.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use TenGigabitEthernet8/0/0
exec set interface state ipip32 up
exec ip route add 10.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use TenGigabitEthernet8/0/0
exec set interface state ipip33 up
exec ip route add 10.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use TenGigabitEthernet8/0/0
exec set interface state ipip34 up
exec ip route add 10.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use TenGigabitEthernet8/0/0
exec set interface state ipip35 up
exec ip route add 10.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use TenGigabitEthernet8/0/0
exec set interface state ipip36 up
exec ip route add 10.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use TenGigabitEthernet8/0/0
exec set interface state ipip37 up
exec ip route add 10.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use TenGigabitEthernet8/0/0
exec set interface state ipip38 up
exec ip route add 10.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use TenGigabitEthernet8/0/0
exec set interface state ipip39 up
exec ip route add 10.0.0.39/32 via ipip39

 imix-1t1c-ethip4ipsec40tnlsw- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec create loopback interface
exec set interface state loop0 up
exec set interface ip address TenGigabitEthernet8/0/0 200.0.0.101/24
exec set ip neighbor TenGigabitEthernet8/0/0 200.0.0.102 ac:1f:6b:57:57:fe static
exec set interface ip address loop0 100.0.0.1/32
exec create ipip tunnel src 100.0.0.1 dst 200.0.0.102 p2p
exec ipsec sa add 0 spi 100000 crypto-alg aes-gcm-256 crypto-key 67474751507568645a4271434d545249746d457663727a48726651716b626554 esp
exec ipsec sa add 100000 spi 200000 crypto-alg aes-gcm-256 crypto-key 67474751507568645a4271434d545249746d457663727a48726651716b626554 esp
exec ipsec tunnel protect ipip0 sa-out 0 sa-in 100000 add
exec set interface ip address loop0 100.0.1.1/32
exec create ipip tunnel src 100.0.1.1 dst 200.0.0.102 p2p
exec ipsec sa add 1 spi 100001 crypto-alg aes-gcm-256 crypto-key 4776476f6c7257457442726f75446c636c514d57644c506462496e7354664a6a esp
exec ipsec sa add 100001 spi 200001 crypto-alg aes-gcm-256 crypto-key 4776476f6c7257457442726f75446c636c514d57644c506462496e7354664a6a esp
exec ipsec tunnel protect ipip1 sa-out 1 sa-in 100001 add
exec set interface ip address loop0 100.0.2.1/32
exec create ipip tunnel src 100.0.2.1 dst 200.0.0.102 p2p
exec ipsec sa add 2 spi 100002 crypto-alg aes-gcm-256 crypto-key 67696a526b45534857474c4a6a4674764c46774f494b6e6b51706a5174656552 esp
exec ipsec sa add 100002 spi 200002 crypto-alg aes-gcm-256 crypto-key 67696a526b45534857474c4a6a4674764c46774f494b6e6b51706a5174656552 esp
exec ipsec tunnel protect ipip2 sa-out 2 sa-in 100002 add
exec set interface ip address loop0 100.0.3.1/32
exec create ipip tunnel src 100.0.3.1 dst 200.0.0.102 p2p
exec ipsec sa add 3 spi 100003 crypto-alg aes-gcm-256 crypto-key 445a567a6c4774444477784c61787147654963447a545076534b484c50494844 esp
exec ipsec sa add 100003 spi 200003 crypto-alg aes-gcm-256 crypto-key 445a567a6c4774444477784c61787147654963447a545076534b484c50494844 esp
exec ipsec tunnel protect ipip3 sa-out 3 sa-in 100003 add
exec set interface ip address loop0 100.0.4.1/32
exec create ipip tunnel src 100.0.4.1 dst 200.0.0.102 p2p
exec ipsec sa add 4 spi 100004 crypto-alg aes-gcm-256 crypto-key 724975477576486d746c577468745a56734f436168744766524b734b4847734d esp
exec ipsec sa add 100004 spi 200004 crypto-alg aes-gcm-256 crypto-key 724975477576486d746c577468745a56734f436168744766524b734b4847734d esp
exec ipsec tunnel protect ipip4 sa-out 4 sa-in 100004 add
exec set interface ip address loop0 100.0.5.1/32
exec create ipip tunnel src 100.0.5.1 dst 200.0.0.102 p2p
exec ipsec sa add 5 spi 100005 crypto-alg aes-gcm-256 crypto-key 5a4d7661576250567879496c47754a57636a54494866615a5643666a6c515444 esp
exec ipsec sa add 100005 spi 200005 crypto-alg aes-gcm-256 crypto-key 5a4d7661576250567879496c47754a57636a54494866615a5643666a6c515444 esp
exec ipsec tunnel protect ipip5 sa-out 5 sa-in 100005 add
exec set interface ip address loop0 100.0.6.1/32
exec create ipip tunnel src 100.0.6.1 dst 200.0.0.102 p2p
exec ipsec sa add 6 spi 100006 crypto-alg aes-gcm-256 crypto-key 6a4d4b454b475965464d747549456f496d72476a4d784d6745785a5376595659 esp
exec ipsec sa add 100006 spi 200006 crypto-alg aes-gcm-256 crypto-key 6a4d4b454b475965464d747549456f496d72476a4d784d6745785a5376595659 esp
exec ipsec tunnel protect ipip6 sa-out 6 sa-in 100006 add
exec set interface ip address loop0 100.0.7.1/32
exec create ipip tunnel src 100.0.7.1 dst 200.0.0.102 p2p
exec ipsec sa add 7 spi 100007 crypto-alg aes-gcm-256 crypto-key 61616e637576786b7850637358787350664b454c50426c50644a527774536671 esp
exec ipsec sa add 100007 spi 200007 crypto-alg aes-gcm-256 crypto-key 61616e637576786b7850637358787350664b454c50426c50644a527774536671 esp
exec ipsec tunnel protect ipip7 sa-out 7 sa-in 100007 add
exec set interface ip address loop0 100.0.8.1/32
exec create ipip tunnel src 100.0.8.1 dst 200.0.0.102 p2p
exec ipsec sa add 8 spi 100008 crypto-alg aes-gcm-256 crypto-key 695a5847704b6a7a69496d79426877696f75647a7771687871687771734c5950 esp
exec ipsec sa add 100008 spi 200008 crypto-alg aes-gcm-256 crypto-key 695a5847704b6a7a69496d79426877696f75647a7771687871687771734c5950 esp
exec ipsec tunnel protect ipip8 sa-out 8 sa-in 100008 add
exec set interface ip address loop0 100.0.9.1/32
exec create ipip tunnel src 100.0.9.1 dst 200.0.0.102 p2p
exec ipsec sa add 9 spi 100009 crypto-alg aes-gcm-256 crypto-key 7a6646676852676a7941746558464e6a4c497a46646556486a4f54414e474669 esp
exec ipsec sa add 100009 spi 200009 crypto-alg aes-gcm-256 crypto-key 7a6646676852676a7941746558464e6a4c497a46646556486a4f54414e474669 esp
exec ipsec tunnel protect ipip9 sa-out 9 sa-in 100009 add
exec set interface ip address loop0 100.0.10.1/32
exec create ipip tunnel src 100.0.10.1 dst 200.0.0.102 p2p
exec ipsec sa add 10 spi 100010 crypto-alg aes-gcm-256 crypto-key 78597465435343444a4d784a4b4f41446f6563666744695751456c6d74435658 esp
exec ipsec sa add 100010 spi 200010 crypto-alg aes-gcm-256 crypto-key 78597465435343444a4d784a4b4f41446f6563666744695751456c6d74435658 esp
exec ipsec tunnel protect ipip10 sa-out 10 sa-in 100010 add
exec set interface ip address loop0 100.0.11.1/32
exec create ipip tunnel src 100.0.11.1 dst 200.0.0.102 p2p
exec ipsec sa add 11 spi 100011 crypto-alg aes-gcm-256 crypto-key 50464354736c58596666525a4567655647447262666c59714a724a4965526b6e esp
exec ipsec sa add 100011 spi 200011 crypto-alg aes-gcm-256 crypto-key 50464354736c58596666525a4567655647447262666c59714a724a4965526b6e esp
exec ipsec tunnel protect ipip11 sa-out 11 sa-in 100011 add
exec set interface ip address loop0 100.0.12.1/32
exec create ipip tunnel src 100.0.12.1 dst 200.0.0.102 p2p
exec ipsec sa add 12 spi 100012 crypto-alg aes-gcm-256 crypto-key 4b5652616c6e6c664266454b6b4648565068555975737170795554466344626a esp
exec ipsec sa add 100012 spi 200012 crypto-alg aes-gcm-256 crypto-key 4b5652616c6e6c664266454b6b4648565068555975737170795554466344626a esp
exec ipsec tunnel protect ipip12 sa-out 12 sa-in 100012 add
exec set interface ip address loop0 100.0.13.1/32
exec create ipip tunnel src 100.0.13.1 dst 200.0.0.102 p2p
exec ipsec sa add 13 spi 100013 crypto-alg aes-gcm-256 crypto-key 59434644744b47454f697673505461785054765167457a726d496f796f7a4268 esp
exec ipsec sa add 100013 spi 200013 crypto-alg aes-gcm-256 crypto-key 59434644744b47454f697673505461785054765167457a726d496f796f7a4268 esp
exec ipsec tunnel protect ipip13 sa-out 13 sa-in 100013 add
exec set interface ip address loop0 100.0.14.1/32
exec create ipip tunnel src 100.0.14.1 dst 200.0.0.102 p2p
exec ipsec sa add 14 spi 100014 crypto-alg aes-gcm-256 crypto-key 415774596a645378484d495248684e69794970504850734f5a45494c676c7347 esp
exec ipsec sa add 100014 spi 200014 crypto-alg aes-gcm-256 crypto-key 415774596a645378484d495248684e69794970504850734f5a45494c676c7347 esp
exec ipsec tunnel protect ipip14 sa-out 14 sa-in 100014 add
exec set interface ip address loop0 100.0.15.1/32
exec create ipip tunnel src 100.0.15.1 dst 200.0.0.102 p2p
exec ipsec sa add 15 spi 100015 crypto-alg aes-gcm-256 crypto-key 4c58474c56446573595059706e7a57486e7153436e5041774f70454a48735856 esp
exec ipsec sa add 100015 spi 200015 crypto-alg aes-gcm-256 crypto-key 4c58474c56446573595059706e7a57486e7153436e5041774f70454a48735856 esp
exec ipsec tunnel protect ipip15 sa-out 15 sa-in 100015 add
exec set interface ip address loop0 100.0.16.1/32
exec create ipip tunnel src 100.0.16.1 dst 200.0.0.102 p2p
exec ipsec sa add 16 spi 100016 crypto-alg aes-gcm-256 crypto-key 4a55535768676c6d424b4f7771726c6b4a4854454a7044537a55704970735859 esp
exec ipsec sa add 100016 spi 200016 crypto-alg aes-gcm-256 crypto-key 4a55535768676c6d424b4f7771726c6b4a4854454a7044537a55704970735859 esp
exec ipsec tunnel protect ipip16 sa-out 16 sa-in 100016 add
exec set interface ip address loop0 100.0.17.1/32
exec create ipip tunnel src 100.0.17.1 dst 200.0.0.102 p2p
exec ipsec sa add 17 spi 100017 crypto-alg aes-gcm-256 crypto-key 70596d535374447861684572554d6f4c656279484d7263785961786d564d734a esp
exec ipsec sa add 100017 spi 200017 crypto-alg aes-gcm-256 crypto-key 70596d535374447861684572554d6f4c656279484d7263785961786d564d734a esp
exec ipsec tunnel protect ipip17 sa-out 17 sa-in 100017 add
exec set interface ip address loop0 100.0.18.1/32
exec create ipip tunnel src 100.0.18.1 dst 200.0.0.102 p2p
exec ipsec sa add 18 spi 100018 crypto-alg aes-gcm-256 crypto-key 6d676e527a526f536f625541534a4c726b417644666772527259624a4a45716b esp
exec ipsec sa add 100018 spi 200018 crypto-alg aes-gcm-256 crypto-key 6d676e527a526f536f625541534a4c726b417644666772527259624a4a45716b esp
exec ipsec tunnel protect ipip18 sa-out 18 sa-in 100018 add
exec set interface ip address loop0 100.0.19.1/32
exec create ipip tunnel src 100.0.19.1 dst 200.0.0.102 p2p
exec ipsec sa add 19 spi 100019 crypto-alg aes-gcm-256 crypto-key 6d6757436c53795a774c53636a6c53667952724170585442547a426574785a50 esp
exec ipsec sa add 100019 spi 200019 crypto-alg aes-gcm-256 crypto-key 6d6757436c53795a774c53636a6c53667952724170585442547a426574785a50 esp
exec ipsec tunnel protect ipip19 sa-out 19 sa-in 100019 add
exec set interface ip address loop0 100.0.20.1/32
exec create ipip tunnel src 100.0.20.1 dst 200.0.0.102 p2p
exec ipsec sa add 20 spi 100020 crypto-alg aes-gcm-256 crypto-key 5679475a446342576a647773506a4b4d52536f726a6c55534b774f485856736b esp
exec ipsec sa add 100020 spi 200020 crypto-alg aes-gcm-256 crypto-key 5679475a446342576a647773506a4b4d52536f726a6c55534b774f485856736b esp
exec ipsec tunnel protect ipip20 sa-out 20 sa-in 100020 add
exec set interface ip address loop0 100.0.21.1/32
exec create ipip tunnel src 100.0.21.1 dst 200.0.0.102 p2p
exec ipsec sa add 21 spi 100021 crypto-alg aes-gcm-256 crypto-key 4744794b6b51506563657454487772714f4e4c6e54414f6e5667484970496f77 esp
exec ipsec sa add 100021 spi 200021 crypto-alg aes-gcm-256 crypto-key 4744794b6b51506563657454487772714f4e4c6e54414f6e5667484970496f77 esp
exec ipsec tunnel protect ipip21 sa-out 21 sa-in 100021 add
exec set interface ip address loop0 100.0.22.1/32
exec create ipip tunnel src 100.0.22.1 dst 200.0.0.102 p2p
exec ipsec sa add 22 spi 100022 crypto-alg aes-gcm-256 crypto-key 6c52464447436776596d61564e4c546158417370556a555a754844595a617079 esp
exec ipsec sa add 100022 spi 200022 crypto-alg aes-gcm-256 crypto-key 6c52464447436776596d61564e4c546158417370556a555a754844595a617079 esp
exec ipsec tunnel protect ipip22 sa-out 22 sa-in 100022 add
exec set interface ip address loop0 100.0.23.1/32
exec create ipip tunnel src 100.0.23.1 dst 200.0.0.102 p2p
exec ipsec sa add 23 spi 100023 crypto-alg aes-gcm-256 crypto-key 786a486f5963514e4c61474e496f59434d4551517271594b41516a6c79496c4a esp
exec ipsec sa add 100023 spi 200023 crypto-alg aes-gcm-256 crypto-key 786a486f5963514e4c61474e496f59434d4551517271594b41516a6c79496c4a esp
exec ipsec tunnel protect ipip23 sa-out 23 sa-in 100023 add
exec set interface ip address loop0 100.0.24.1/32
exec create ipip tunnel src 100.0.24.1 dst 200.0.0.102 p2p
exec ipsec sa add 24 spi 100024 crypto-alg aes-gcm-256 crypto-key 64744d4c4f5468664f5072744b4f69456f5946524559544d46696c496a634a68 esp
exec ipsec sa add 100024 spi 200024 crypto-alg aes-gcm-256 crypto-key 64744d4c4f5468664f5072744b4f69456f5946524559544d46696c496a634a68 esp
exec ipsec tunnel protect ipip24 sa-out 24 sa-in 100024 add
exec set interface ip address loop0 100.0.25.1/32
exec create ipip tunnel src 100.0.25.1 dst 200.0.0.102 p2p
exec ipsec sa add 25 spi 100025 crypto-alg aes-gcm-256 crypto-key 556d6d47506c5372764868786758415753715a66426371567470494d78456d6d esp
exec ipsec sa add 100025 spi 200025 crypto-alg aes-gcm-256 crypto-key 556d6d47506c5372764868786758415753715a66426371567470494d78456d6d esp
exec ipsec tunnel protect ipip25 sa-out 25 sa-in 100025 add
exec set interface ip address loop0 100.0.26.1/32
exec create ipip tunnel src 100.0.26.1 dst 200.0.0.102 p2p
exec ipsec sa add 26 spi 100026 crypto-alg aes-gcm-256 crypto-key 505a6f755050646a6c61504b494b427476507a76566e7946475a6e4e4a714f62 esp
exec ipsec sa add 100026 spi 200026 crypto-alg aes-gcm-256 crypto-key 505a6f755050646a6c61504b494b427476507a76566e7946475a6e4e4a714f62 esp
exec ipsec tunnel protect ipip26 sa-out 26 sa-in 100026 add
exec set interface ip address loop0 100.0.27.1/32
exec create ipip tunnel src 100.0.27.1 dst 200.0.0.102 p2p
exec ipsec sa add 27 spi 100027 crypto-alg aes-gcm-256 crypto-key 45584a64556464666253684666766e486b65467777594b78566e50726c70705a esp
exec ipsec sa add 100027 spi 200027 crypto-alg aes-gcm-256 crypto-key 45584a64556464666253684666766e486b65467777594b78566e50726c70705a esp
exec ipsec tunnel protect ipip27 sa-out 27 sa-in 100027 add
exec set interface ip address loop0 100.0.28.1/32
exec create ipip tunnel src 100.0.28.1 dst 200.0.0.102 p2p
exec ipsec sa add 28 spi 100028 crypto-alg aes-gcm-256 crypto-key 62756f7944524e6d4a556765726f637749665a7142554671786f50764e494341 esp
exec ipsec sa add 100028 spi 200028 crypto-alg aes-gcm-256 crypto-key 62756f7944524e6d4a556765726f637749665a7142554671786f50764e494341 esp
exec ipsec tunnel protect ipip28 sa-out 28 sa-in 100028 add
exec set interface ip address loop0 100.0.29.1/32
exec create ipip tunnel src 100.0.29.1 dst 200.0.0.102 p2p
exec ipsec sa add 29 spi 100029 crypto-alg aes-gcm-256 crypto-key 61414d6b787659645264576c57666a6456584265537178577a45536a55475441 esp
exec ipsec sa add 100029 spi 200029 crypto-alg aes-gcm-256 crypto-key 61414d6b787659645264576c57666a6456584265537178577a45536a55475441 esp
exec ipsec tunnel protect ipip29 sa-out 29 sa-in 100029 add
exec set interface ip address loop0 100.0.30.1/32
exec create ipip tunnel src 100.0.30.1 dst 200.0.0.102 p2p
exec ipsec sa add 30 spi 100030 crypto-alg aes-gcm-256 crypto-key 706f5372747643734d586c4d517178636c564b6d4554484c6956767445705962 esp
exec ipsec sa add 100030 spi 200030 crypto-alg aes-gcm-256 crypto-key 706f5372747643734d586c4d517178636c564b6d4554484c6956767445705962 esp
exec ipsec tunnel protect ipip30 sa-out 30 sa-in 100030 add
exec set interface ip address loop0 100.0.31.1/32
exec create ipip tunnel src 100.0.31.1 dst 200.0.0.102 p2p
exec ipsec sa add 31 spi 100031 crypto-alg aes-gcm-256 crypto-key 724c596e635749427658714f49616f776356795942547242576d4e736b4e6869 esp
exec ipsec sa add 100031 spi 200031 crypto-alg aes-gcm-256 crypto-key 724c596e635749427658714f49616f776356795942547242576d4e736b4e6869 esp
exec ipsec tunnel protect ipip31 sa-out 31 sa-in 100031 add
exec set interface ip address loop0 100.0.32.1/32
exec create ipip tunnel src 100.0.32.1 dst 200.0.0.102 p2p
exec ipsec sa add 32 spi 100032 crypto-alg aes-gcm-256 crypto-key 4346594c77794c4958506f7873634166767a4a486c58624d6366776d6a464f74 esp
exec ipsec sa add 100032 spi 200032 crypto-alg aes-gcm-256 crypto-key 4346594c77794c4958506f7873634166767a4a486c58624d6366776d6a464f74 esp
exec ipsec tunnel protect ipip32 sa-out 32 sa-in 100032 add
exec set interface ip address loop0 100.0.33.1/32
exec create ipip tunnel src 100.0.33.1 dst 200.0.0.102 p2p
exec ipsec sa add 33 spi 100033 crypto-alg aes-gcm-256 crypto-key 764466704f6347454a6e65716a6d5a6851716b71736f5953587446535a654a4e esp
exec ipsec sa add 100033 spi 200033 crypto-alg aes-gcm-256 crypto-key 764466704f6347454a6e65716a6d5a6851716b71736f5953587446535a654a4e esp
exec ipsec tunnel protect ipip33 sa-out 33 sa-in 100033 add
exec set interface ip address loop0 100.0.34.1/32
exec create ipip tunnel src 100.0.34.1 dst 200.0.0.102 p2p
exec ipsec sa add 34 spi 100034 crypto-alg aes-gcm-256 crypto-key 495a77667275426d464c59554854686666516971527859674c6f706757647948 esp
exec ipsec sa add 100034 spi 200034 crypto-alg aes-gcm-256 crypto-key 495a77667275426d464c59554854686666516971527859674c6f706757647948 esp
exec ipsec tunnel protect ipip34 sa-out 34 sa-in 100034 add
exec set interface ip address loop0 100.0.35.1/32
exec create ipip tunnel src 100.0.35.1 dst 200.0.0.102 p2p
exec ipsec sa add 35 spi 100035 crypto-alg aes-gcm-256 crypto-key 434e44625359755579664c43636e526572626e70444759644859684d4a437450 esp
exec ipsec sa add 100035 spi 200035 crypto-alg aes-gcm-256 crypto-key 434e44625359755579664c43636e526572626e70444759644859684d4a437450 esp
exec ipsec tunnel protect ipip35 sa-out 35 sa-in 100035 add
exec set interface ip address loop0 100.0.36.1/32
exec create ipip tunnel src 100.0.36.1 dst 200.0.0.102 p2p
exec ipsec sa add 36 spi 100036 crypto-alg aes-gcm-256 crypto-key 494a446479765a6776414a51757a7062615a7150414f486575637a717a6b5946 esp
exec ipsec sa add 100036 spi 200036 crypto-alg aes-gcm-256 crypto-key 494a446479765a6776414a51757a7062615a7150414f486575637a717a6b5946 esp
exec ipsec tunnel protect ipip36 sa-out 36 sa-in 100036 add
exec set interface ip address loop0 100.0.37.1/32
exec create ipip tunnel src 100.0.37.1 dst 200.0.0.102 p2p
exec ipsec sa add 37 spi 100037 crypto-alg aes-gcm-256 crypto-key 6f76674958434e6a496a7144426a4e4b774867746b6a56674550616b72626151 esp
exec ipsec sa add 100037 spi 200037 crypto-alg aes-gcm-256 crypto-key 6f76674958434e6a496a7144426a4e4b774867746b6a56674550616b72626151 esp
exec ipsec tunnel protect ipip37 sa-out 37 sa-in 100037 add
exec set interface ip address loop0 100.0.38.1/32
exec create ipip tunnel src 100.0.38.1 dst 200.0.0.102 p2p
exec ipsec sa add 38 spi 100038 crypto-alg aes-gcm-256 crypto-key 42755152654c6765756d4b457769587157486956474e4d4559724f4c6a786847 esp
exec ipsec sa add 100038 spi 200038 crypto-alg aes-gcm-256 crypto-key 42755152654c6765756d4b457769587157486956474e4d4559724f4c6a786847 esp
exec ipsec tunnel protect ipip38 sa-out 38 sa-in 100038 add
exec set interface ip address loop0 100.0.39.1/32
exec create ipip tunnel src 100.0.39.1 dst 200.0.0.102 p2p
exec ipsec sa add 39 spi 100039 crypto-alg aes-gcm-256 crypto-key 4141566e5663424250594c6e58624a694347754e73595846665861647a6e6963 esp
exec ipsec sa add 100039 spi 200039 crypto-alg aes-gcm-256 crypto-key 4141566e5663424250594c6e58624a694347754e73595846665861647a6e6963 esp
exec ipsec tunnel protect ipip39 sa-out 39 sa-in 100039 add
exec set interface unnumbered ipip0 use TenGigabitEthernet8/0/0
exec set interface state ipip0 up
exec ip route add 20.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use TenGigabitEthernet8/0/0
exec set interface state ipip1 up
exec ip route add 20.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use TenGigabitEthernet8/0/0
exec set interface state ipip2 up
exec ip route add 20.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use TenGigabitEthernet8/0/0
exec set interface state ipip3 up
exec ip route add 20.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use TenGigabitEthernet8/0/0
exec set interface state ipip4 up
exec ip route add 20.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use TenGigabitEthernet8/0/0
exec set interface state ipip5 up
exec ip route add 20.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use TenGigabitEthernet8/0/0
exec set interface state ipip6 up
exec ip route add 20.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use TenGigabitEthernet8/0/0
exec set interface state ipip7 up
exec ip route add 20.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use TenGigabitEthernet8/0/0
exec set interface state ipip8 up
exec ip route add 20.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use TenGigabitEthernet8/0/0
exec set interface state ipip9 up
exec ip route add 20.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use TenGigabitEthernet8/0/0
exec set interface state ipip10 up
exec ip route add 20.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use TenGigabitEthernet8/0/0
exec set interface state ipip11 up
exec ip route add 20.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use TenGigabitEthernet8/0/0
exec set interface state ipip12 up
exec ip route add 20.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use TenGigabitEthernet8/0/0
exec set interface state ipip13 up
exec ip route add 20.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use TenGigabitEthernet8/0/0
exec set interface state ipip14 up
exec ip route add 20.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use TenGigabitEthernet8/0/0
exec set interface state ipip15 up
exec ip route add 20.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use TenGigabitEthernet8/0/0
exec set interface state ipip16 up
exec ip route add 20.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use TenGigabitEthernet8/0/0
exec set interface state ipip17 up
exec ip route add 20.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use TenGigabitEthernet8/0/0
exec set interface state ipip18 up
exec ip route add 20.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use TenGigabitEthernet8/0/0
exec set interface state ipip19 up
exec ip route add 20.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use TenGigabitEthernet8/0/0
exec set interface state ipip20 up
exec ip route add 20.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use TenGigabitEthernet8/0/0
exec set interface state ipip21 up
exec ip route add 20.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use TenGigabitEthernet8/0/0
exec set interface state ipip22 up
exec ip route add 20.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use TenGigabitEthernet8/0/0
exec set interface state ipip23 up
exec ip route add 20.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use TenGigabitEthernet8/0/0
exec set interface state ipip24 up
exec ip route add 20.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use TenGigabitEthernet8/0/0
exec set interface state ipip25 up
exec ip route add 20.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use TenGigabitEthernet8/0/0
exec set interface state ipip26 up
exec ip route add 20.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use TenGigabitEthernet8/0/0
exec set interface state ipip27 up
exec ip route add 20.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use TenGigabitEthernet8/0/0
exec set interface state ipip28 up
exec ip route add 20.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use TenGigabitEthernet8/0/0
exec set interface state ipip29 up
exec ip route add 20.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use TenGigabitEthernet8/0/0
exec set interface state ipip30 up
exec ip route add 20.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use TenGigabitEthernet8/0/0
exec set interface state ipip31 up
exec ip route add 20.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use TenGigabitEthernet8/0/0
exec set interface state ipip32 up
exec ip route add 20.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use TenGigabitEthernet8/0/0
exec set interface state ipip33 up
exec ip route add 20.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use TenGigabitEthernet8/0/0
exec set interface state ipip34 up
exec ip route add 20.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use TenGigabitEthernet8/0/0
exec set interface state ipip35 up
exec ip route add 20.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use TenGigabitEthernet8/0/0
exec set interface state ipip36 up
exec ip route add 20.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use TenGigabitEthernet8/0/0
exec set interface state ipip37 up
exec ip route add 20.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use TenGigabitEthernet8/0/0
exec set interface state ipip38 up
exec ip route add 20.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use TenGigabitEthernet8/0/0
exec set interface state ipip39 up
exec ip route add 20.0.0.39/32 via ipip39
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec set interface ip address TenGigabitEthernet8/0/0 200.0.0.102/24.0
exec create ipip tunnel src 200.0.0.102 dst 100.0.0.1 p2p
exec ipsec sa add 100000 spi 200000 crypto-alg aes-gcm-256 crypto-key 67474751507568645a4271434d545249746d457663727a48726651716b626554 esp
exec ipsec sa add 0 spi 100000 crypto-alg aes-gcm-256 crypto-key 67474751507568645a4271434d545249746d457663727a48726651716b626554 esp
exec ipsec tunnel protect ipip0 sa-out 100000 sa-in 0 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.1.1 p2p
exec ipsec sa add 100001 spi 200001 crypto-alg aes-gcm-256 crypto-key 4776476f6c7257457442726f75446c636c514d57644c506462496e7354664a6a esp
exec ipsec sa add 1 spi 100001 crypto-alg aes-gcm-256 crypto-key 4776476f6c7257457442726f75446c636c514d57644c506462496e7354664a6a esp
exec ipsec tunnel protect ipip1 sa-out 100001 sa-in 1 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.2.1 p2p
exec ipsec sa add 100002 spi 200002 crypto-alg aes-gcm-256 crypto-key 67696a526b45534857474c4a6a4674764c46774f494b6e6b51706a5174656552 esp
exec ipsec sa add 2 spi 100002 crypto-alg aes-gcm-256 crypto-key 67696a526b45534857474c4a6a4674764c46774f494b6e6b51706a5174656552 esp
exec ipsec tunnel protect ipip2 sa-out 100002 sa-in 2 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.3.1 p2p
exec ipsec sa add 100003 spi 200003 crypto-alg aes-gcm-256 crypto-key 445a567a6c4774444477784c61787147654963447a545076534b484c50494844 esp
exec ipsec sa add 3 spi 100003 crypto-alg aes-gcm-256 crypto-key 445a567a6c4774444477784c61787147654963447a545076534b484c50494844 esp
exec ipsec tunnel protect ipip3 sa-out 100003 sa-in 3 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.4.1 p2p
exec ipsec sa add 100004 spi 200004 crypto-alg aes-gcm-256 crypto-key 724975477576486d746c577468745a56734f436168744766524b734b4847734d esp
exec ipsec sa add 4 spi 100004 crypto-alg aes-gcm-256 crypto-key 724975477576486d746c577468745a56734f436168744766524b734b4847734d esp
exec ipsec tunnel protect ipip4 sa-out 100004 sa-in 4 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.5.1 p2p
exec ipsec sa add 100005 spi 200005 crypto-alg aes-gcm-256 crypto-key 5a4d7661576250567879496c47754a57636a54494866615a5643666a6c515444 esp
exec ipsec sa add 5 spi 100005 crypto-alg aes-gcm-256 crypto-key 5a4d7661576250567879496c47754a57636a54494866615a5643666a6c515444 esp
exec ipsec tunnel protect ipip5 sa-out 100005 sa-in 5 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.6.1 p2p
exec ipsec sa add 100006 spi 200006 crypto-alg aes-gcm-256 crypto-key 6a4d4b454b475965464d747549456f496d72476a4d784d6745785a5376595659 esp
exec ipsec sa add 6 spi 100006 crypto-alg aes-gcm-256 crypto-key 6a4d4b454b475965464d747549456f496d72476a4d784d6745785a5376595659 esp
exec ipsec tunnel protect ipip6 sa-out 100006 sa-in 6 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.7.1 p2p
exec ipsec sa add 100007 spi 200007 crypto-alg aes-gcm-256 crypto-key 61616e637576786b7850637358787350664b454c50426c50644a527774536671 esp
exec ipsec sa add 7 spi 100007 crypto-alg aes-gcm-256 crypto-key 61616e637576786b7850637358787350664b454c50426c50644a527774536671 esp
exec ipsec tunnel protect ipip7 sa-out 100007 sa-in 7 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.8.1 p2p
exec ipsec sa add 100008 spi 200008 crypto-alg aes-gcm-256 crypto-key 695a5847704b6a7a69496d79426877696f75647a7771687871687771734c5950 esp
exec ipsec sa add 8 spi 100008 crypto-alg aes-gcm-256 crypto-key 695a5847704b6a7a69496d79426877696f75647a7771687871687771734c5950 esp
exec ipsec tunnel protect ipip8 sa-out 100008 sa-in 8 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.9.1 p2p
exec ipsec sa add 100009 spi 200009 crypto-alg aes-gcm-256 crypto-key 7a6646676852676a7941746558464e6a4c497a46646556486a4f54414e474669 esp
exec ipsec sa add 9 spi 100009 crypto-alg aes-gcm-256 crypto-key 7a6646676852676a7941746558464e6a4c497a46646556486a4f54414e474669 esp
exec ipsec tunnel protect ipip9 sa-out 100009 sa-in 9 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.10.1 p2p
exec ipsec sa add 100010 spi 200010 crypto-alg aes-gcm-256 crypto-key 78597465435343444a4d784a4b4f41446f6563666744695751456c6d74435658 esp
exec ipsec sa add 10 spi 100010 crypto-alg aes-gcm-256 crypto-key 78597465435343444a4d784a4b4f41446f6563666744695751456c6d74435658 esp
exec ipsec tunnel protect ipip10 sa-out 100010 sa-in 10 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.11.1 p2p
exec ipsec sa add 100011 spi 200011 crypto-alg aes-gcm-256 crypto-key 50464354736c58596666525a4567655647447262666c59714a724a4965526b6e esp
exec ipsec sa add 11 spi 100011 crypto-alg aes-gcm-256 crypto-key 50464354736c58596666525a4567655647447262666c59714a724a4965526b6e esp
exec ipsec tunnel protect ipip11 sa-out 100011 sa-in 11 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.12.1 p2p
exec ipsec sa add 100012 spi 200012 crypto-alg aes-gcm-256 crypto-key 4b5652616c6e6c664266454b6b4648565068555975737170795554466344626a esp
exec ipsec sa add 12 spi 100012 crypto-alg aes-gcm-256 crypto-key 4b5652616c6e6c664266454b6b4648565068555975737170795554466344626a esp
exec ipsec tunnel protect ipip12 sa-out 100012 sa-in 12 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.13.1 p2p
exec ipsec sa add 100013 spi 200013 crypto-alg aes-gcm-256 crypto-key 59434644744b47454f697673505461785054765167457a726d496f796f7a4268 esp
exec ipsec sa add 13 spi 100013 crypto-alg aes-gcm-256 crypto-key 59434644744b47454f697673505461785054765167457a726d496f796f7a4268 esp
exec ipsec tunnel protect ipip13 sa-out 100013 sa-in 13 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.14.1 p2p
exec ipsec sa add 100014 spi 200014 crypto-alg aes-gcm-256 crypto-key 415774596a645378484d495248684e69794970504850734f5a45494c676c7347 esp
exec ipsec sa add 14 spi 100014 crypto-alg aes-gcm-256 crypto-key 415774596a645378484d495248684e69794970504850734f5a45494c676c7347 esp
exec ipsec tunnel protect ipip14 sa-out 100014 sa-in 14 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.15.1 p2p
exec ipsec sa add 100015 spi 200015 crypto-alg aes-gcm-256 crypto-key 4c58474c56446573595059706e7a57486e7153436e5041774f70454a48735856 esp
exec ipsec sa add 15 spi 100015 crypto-alg aes-gcm-256 crypto-key 4c58474c56446573595059706e7a57486e7153436e5041774f70454a48735856 esp
exec ipsec tunnel protect ipip15 sa-out 100015 sa-in 15 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.16.1 p2p
exec ipsec sa add 100016 spi 200016 crypto-alg aes-gcm-256 crypto-key 4a55535768676c6d424b4f7771726c6b4a4854454a7044537a55704970735859 esp
exec ipsec sa add 16 spi 100016 crypto-alg aes-gcm-256 crypto-key 4a55535768676c6d424b4f7771726c6b4a4854454a7044537a55704970735859 esp
exec ipsec tunnel protect ipip16 sa-out 100016 sa-in 16 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.17.1 p2p
exec ipsec sa add 100017 spi 200017 crypto-alg aes-gcm-256 crypto-key 70596d535374447861684572554d6f4c656279484d7263785961786d564d734a esp
exec ipsec sa add 17 spi 100017 crypto-alg aes-gcm-256 crypto-key 70596d535374447861684572554d6f4c656279484d7263785961786d564d734a esp
exec ipsec tunnel protect ipip17 sa-out 100017 sa-in 17 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.18.1 p2p
exec ipsec sa add 100018 spi 200018 crypto-alg aes-gcm-256 crypto-key 6d676e527a526f536f625541534a4c726b417644666772527259624a4a45716b esp
exec ipsec sa add 18 spi 100018 crypto-alg aes-gcm-256 crypto-key 6d676e527a526f536f625541534a4c726b417644666772527259624a4a45716b esp
exec ipsec tunnel protect ipip18 sa-out 100018 sa-in 18 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.19.1 p2p
exec ipsec sa add 100019 spi 200019 crypto-alg aes-gcm-256 crypto-key 6d6757436c53795a774c53636a6c53667952724170585442547a426574785a50 esp
exec ipsec sa add 19 spi 100019 crypto-alg aes-gcm-256 crypto-key 6d6757436c53795a774c53636a6c53667952724170585442547a426574785a50 esp
exec ipsec tunnel protect ipip19 sa-out 100019 sa-in 19 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.20.1 p2p
exec ipsec sa add 100020 spi 200020 crypto-alg aes-gcm-256 crypto-key 5679475a446342576a647773506a4b4d52536f726a6c55534b774f485856736b esp
exec ipsec sa add 20 spi 100020 crypto-alg aes-gcm-256 crypto-key 5679475a446342576a647773506a4b4d52536f726a6c55534b774f485856736b esp
exec ipsec tunnel protect ipip20 sa-out 100020 sa-in 20 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.21.1 p2p
exec ipsec sa add 100021 spi 200021 crypto-alg aes-gcm-256 crypto-key 4744794b6b51506563657454487772714f4e4c6e54414f6e5667484970496f77 esp
exec ipsec sa add 21 spi 100021 crypto-alg aes-gcm-256 crypto-key 4744794b6b51506563657454487772714f4e4c6e54414f6e5667484970496f77 esp
exec ipsec tunnel protect ipip21 sa-out 100021 sa-in 21 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.22.1 p2p
exec ipsec sa add 100022 spi 200022 crypto-alg aes-gcm-256 crypto-key 6c52464447436776596d61564e4c546158417370556a555a754844595a617079 esp
exec ipsec sa add 22 spi 100022 crypto-alg aes-gcm-256 crypto-key 6c52464447436776596d61564e4c546158417370556a555a754844595a617079 esp
exec ipsec tunnel protect ipip22 sa-out 100022 sa-in 22 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.23.1 p2p
exec ipsec sa add 100023 spi 200023 crypto-alg aes-gcm-256 crypto-key 786a486f5963514e4c61474e496f59434d4551517271594b41516a6c79496c4a esp
exec ipsec sa add 23 spi 100023 crypto-alg aes-gcm-256 crypto-key 786a486f5963514e4c61474e496f59434d4551517271594b41516a6c79496c4a esp
exec ipsec tunnel protect ipip23 sa-out 100023 sa-in 23 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.24.1 p2p
exec ipsec sa add 100024 spi 200024 crypto-alg aes-gcm-256 crypto-key 64744d4c4f5468664f5072744b4f69456f5946524559544d46696c496a634a68 esp
exec ipsec sa add 24 spi 100024 crypto-alg aes-gcm-256 crypto-key 64744d4c4f5468664f5072744b4f69456f5946524559544d46696c496a634a68 esp
exec ipsec tunnel protect ipip24 sa-out 100024 sa-in 24 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.25.1 p2p
exec ipsec sa add 100025 spi 200025 crypto-alg aes-gcm-256 crypto-key 556d6d47506c5372764868786758415753715a66426371567470494d78456d6d esp
exec ipsec sa add 25 spi 100025 crypto-alg aes-gcm-256 crypto-key 556d6d47506c5372764868786758415753715a66426371567470494d78456d6d esp
exec ipsec tunnel protect ipip25 sa-out 100025 sa-in 25 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.26.1 p2p
exec ipsec sa add 100026 spi 200026 crypto-alg aes-gcm-256 crypto-key 505a6f755050646a6c61504b494b427476507a76566e7946475a6e4e4a714f62 esp
exec ipsec sa add 26 spi 100026 crypto-alg aes-gcm-256 crypto-key 505a6f755050646a6c61504b494b427476507a76566e7946475a6e4e4a714f62 esp
exec ipsec tunnel protect ipip26 sa-out 100026 sa-in 26 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.27.1 p2p
exec ipsec sa add 100027 spi 200027 crypto-alg aes-gcm-256 crypto-key 45584a64556464666253684666766e486b65467777594b78566e50726c70705a esp
exec ipsec sa add 27 spi 100027 crypto-alg aes-gcm-256 crypto-key 45584a64556464666253684666766e486b65467777594b78566e50726c70705a esp
exec ipsec tunnel protect ipip27 sa-out 100027 sa-in 27 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.28.1 p2p
exec ipsec sa add 100028 spi 200028 crypto-alg aes-gcm-256 crypto-key 62756f7944524e6d4a556765726f637749665a7142554671786f50764e494341 esp
exec ipsec sa add 28 spi 100028 crypto-alg aes-gcm-256 crypto-key 62756f7944524e6d4a556765726f637749665a7142554671786f50764e494341 esp
exec ipsec tunnel protect ipip28 sa-out 100028 sa-in 28 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.29.1 p2p
exec ipsec sa add 100029 spi 200029 crypto-alg aes-gcm-256 crypto-key 61414d6b787659645264576c57666a6456584265537178577a45536a55475441 esp
exec ipsec sa add 29 spi 100029 crypto-alg aes-gcm-256 crypto-key 61414d6b787659645264576c57666a6456584265537178577a45536a55475441 esp
exec ipsec tunnel protect ipip29 sa-out 100029 sa-in 29 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.30.1 p2p
exec ipsec sa add 100030 spi 200030 crypto-alg aes-gcm-256 crypto-key 706f5372747643734d586c4d517178636c564b6d4554484c6956767445705962 esp
exec ipsec sa add 30 spi 100030 crypto-alg aes-gcm-256 crypto-key 706f5372747643734d586c4d517178636c564b6d4554484c6956767445705962 esp
exec ipsec tunnel protect ipip30 sa-out 100030 sa-in 30 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.31.1 p2p
exec ipsec sa add 100031 spi 200031 crypto-alg aes-gcm-256 crypto-key 724c596e635749427658714f49616f776356795942547242576d4e736b4e6869 esp
exec ipsec sa add 31 spi 100031 crypto-alg aes-gcm-256 crypto-key 724c596e635749427658714f49616f776356795942547242576d4e736b4e6869 esp
exec ipsec tunnel protect ipip31 sa-out 100031 sa-in 31 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.32.1 p2p
exec ipsec sa add 100032 spi 200032 crypto-alg aes-gcm-256 crypto-key 4346594c77794c4958506f7873634166767a4a486c58624d6366776d6a464f74 esp
exec ipsec sa add 32 spi 100032 crypto-alg aes-gcm-256 crypto-key 4346594c77794c4958506f7873634166767a4a486c58624d6366776d6a464f74 esp
exec ipsec tunnel protect ipip32 sa-out 100032 sa-in 32 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.33.1 p2p
exec ipsec sa add 100033 spi 200033 crypto-alg aes-gcm-256 crypto-key 764466704f6347454a6e65716a6d5a6851716b71736f5953587446535a654a4e esp
exec ipsec sa add 33 spi 100033 crypto-alg aes-gcm-256 crypto-key 764466704f6347454a6e65716a6d5a6851716b71736f5953587446535a654a4e esp
exec ipsec tunnel protect ipip33 sa-out 100033 sa-in 33 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.34.1 p2p
exec ipsec sa add 100034 spi 200034 crypto-alg aes-gcm-256 crypto-key 495a77667275426d464c59554854686666516971527859674c6f706757647948 esp
exec ipsec sa add 34 spi 100034 crypto-alg aes-gcm-256 crypto-key 495a77667275426d464c59554854686666516971527859674c6f706757647948 esp
exec ipsec tunnel protect ipip34 sa-out 100034 sa-in 34 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.35.1 p2p
exec ipsec sa add 100035 spi 200035 crypto-alg aes-gcm-256 crypto-key 434e44625359755579664c43636e526572626e70444759644859684d4a437450 esp
exec ipsec sa add 35 spi 100035 crypto-alg aes-gcm-256 crypto-key 434e44625359755579664c43636e526572626e70444759644859684d4a437450 esp
exec ipsec tunnel protect ipip35 sa-out 100035 sa-in 35 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.36.1 p2p
exec ipsec sa add 100036 spi 200036 crypto-alg aes-gcm-256 crypto-key 494a446479765a6776414a51757a7062615a7150414f486575637a717a6b5946 esp
exec ipsec sa add 36 spi 100036 crypto-alg aes-gcm-256 crypto-key 494a446479765a6776414a51757a7062615a7150414f486575637a717a6b5946 esp
exec ipsec tunnel protect ipip36 sa-out 100036 sa-in 36 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.37.1 p2p
exec ipsec sa add 100037 spi 200037 crypto-alg aes-gcm-256 crypto-key 6f76674958434e6a496a7144426a4e4b774867746b6a56674550616b72626151 esp
exec ipsec sa add 37 spi 100037 crypto-alg aes-gcm-256 crypto-key 6f76674958434e6a496a7144426a4e4b774867746b6a56674550616b72626151 esp
exec ipsec tunnel protect ipip37 sa-out 100037 sa-in 37 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.38.1 p2p
exec ipsec sa add 100038 spi 200038 crypto-alg aes-gcm-256 crypto-key 42755152654c6765756d4b457769587157486956474e4d4559724f4c6a786847 esp
exec ipsec sa add 38 spi 100038 crypto-alg aes-gcm-256 crypto-key 42755152654c6765756d4b457769587157486956474e4d4559724f4c6a786847 esp
exec ipsec tunnel protect ipip38 sa-out 100038 sa-in 38 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.39.1 p2p
exec ipsec sa add 100039 spi 200039 crypto-alg aes-gcm-256 crypto-key 4141566e5663424250594c6e58624a694347754e73595846665861647a6e6963 esp
exec ipsec sa add 39 spi 100039 crypto-alg aes-gcm-256 crypto-key 4141566e5663424250594c6e58624a694347754e73595846665861647a6e6963 esp
exec ipsec tunnel protect ipip39 sa-out 100039 sa-in 39 add
exec ip route add 100.0.0.1/8 via 200.0.0.101 TenGigabitEthernet8/0/0
exec set interface unnumbered ipip0 use TenGigabitEthernet8/0/0
exec set interface state ipip0 up
exec ip route add 10.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use TenGigabitEthernet8/0/0
exec set interface state ipip1 up
exec ip route add 10.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use TenGigabitEthernet8/0/0
exec set interface state ipip2 up
exec ip route add 10.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use TenGigabitEthernet8/0/0
exec set interface state ipip3 up
exec ip route add 10.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use TenGigabitEthernet8/0/0
exec set interface state ipip4 up
exec ip route add 10.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use TenGigabitEthernet8/0/0
exec set interface state ipip5 up
exec ip route add 10.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use TenGigabitEthernet8/0/0
exec set interface state ipip6 up
exec ip route add 10.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use TenGigabitEthernet8/0/0
exec set interface state ipip7 up
exec ip route add 10.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use TenGigabitEthernet8/0/0
exec set interface state ipip8 up
exec ip route add 10.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use TenGigabitEthernet8/0/0
exec set interface state ipip9 up
exec ip route add 10.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use TenGigabitEthernet8/0/0
exec set interface state ipip10 up
exec ip route add 10.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use TenGigabitEthernet8/0/0
exec set interface state ipip11 up
exec ip route add 10.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use TenGigabitEthernet8/0/0
exec set interface state ipip12 up
exec ip route add 10.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use TenGigabitEthernet8/0/0
exec set interface state ipip13 up
exec ip route add 10.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use TenGigabitEthernet8/0/0
exec set interface state ipip14 up
exec ip route add 10.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use TenGigabitEthernet8/0/0
exec set interface state ipip15 up
exec ip route add 10.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use TenGigabitEthernet8/0/0
exec set interface state ipip16 up
exec ip route add 10.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use TenGigabitEthernet8/0/0
exec set interface state ipip17 up
exec ip route add 10.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use TenGigabitEthernet8/0/0
exec set interface state ipip18 up
exec ip route add 10.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use TenGigabitEthernet8/0/0
exec set interface state ipip19 up
exec ip route add 10.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use TenGigabitEthernet8/0/0
exec set interface state ipip20 up
exec ip route add 10.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use TenGigabitEthernet8/0/0
exec set interface state ipip21 up
exec ip route add 10.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use TenGigabitEthernet8/0/0
exec set interface state ipip22 up
exec ip route add 10.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use TenGigabitEthernet8/0/0
exec set interface state ipip23 up
exec ip route add 10.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use TenGigabitEthernet8/0/0
exec set interface state ipip24 up
exec ip route add 10.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use TenGigabitEthernet8/0/0
exec set interface state ipip25 up
exec ip route add 10.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use TenGigabitEthernet8/0/0
exec set interface state ipip26 up
exec ip route add 10.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use TenGigabitEthernet8/0/0
exec set interface state ipip27 up
exec ip route add 10.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use TenGigabitEthernet8/0/0
exec set interface state ipip28 up
exec ip route add 10.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use TenGigabitEthernet8/0/0
exec set interface state ipip29 up
exec ip route add 10.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use TenGigabitEthernet8/0/0
exec set interface state ipip30 up
exec ip route add 10.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use TenGigabitEthernet8/0/0
exec set interface state ipip31 up
exec ip route add 10.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use TenGigabitEthernet8/0/0
exec set interface state ipip32 up
exec ip route add 10.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use TenGigabitEthernet8/0/0
exec set interface state ipip33 up
exec ip route add 10.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use TenGigabitEthernet8/0/0
exec set interface state ipip34 up
exec ip route add 10.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use TenGigabitEthernet8/0/0
exec set interface state ipip35 up
exec ip route add 10.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use TenGigabitEthernet8/0/0
exec set interface state ipip36 up
exec ip route add 10.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use TenGigabitEthernet8/0/0
exec set interface state ipip37 up
exec ip route add 10.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use TenGigabitEthernet8/0/0
exec set interface state ipip38 up
exec ip route add 10.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use TenGigabitEthernet8/0/0
exec set interface state ipip39 up
exec ip route add 10.0.0.39/32 via ipip39

 imix-2t2c-ethip4ipsec40tnlsw- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec create loopback interface
exec set interface state loop0 up
exec set interface ip address TenGigabitEthernet8/0/0 200.0.0.101/24
exec set ip neighbor TenGigabitEthernet8/0/0 200.0.0.102 ac:1f:6b:57:57:fe static
exec set interface ip address loop0 100.0.0.1/32
exec create ipip tunnel src 100.0.0.1 dst 200.0.0.102 p2p
exec ipsec sa add 0 spi 100000 crypto-alg aes-gcm-256 crypto-key 4a78444d4277447547734851585064647a516f5a6151704f536e47615a546168 esp
exec ipsec sa add 100000 spi 200000 crypto-alg aes-gcm-256 crypto-key 4a78444d4277447547734851585064647a516f5a6151704f536e47615a546168 esp
exec ipsec tunnel protect ipip0 sa-out 0 sa-in 100000 add
exec set interface ip address loop0 100.0.1.1/32
exec create ipip tunnel src 100.0.1.1 dst 200.0.0.102 p2p
exec ipsec sa add 1 spi 100001 crypto-alg aes-gcm-256 crypto-key 4272454d756e535a6a4d5841764c454a4243594c4b5a796a724a4c6756624451 esp
exec ipsec sa add 100001 spi 200001 crypto-alg aes-gcm-256 crypto-key 4272454d756e535a6a4d5841764c454a4243594c4b5a796a724a4c6756624451 esp
exec ipsec tunnel protect ipip1 sa-out 1 sa-in 100001 add
exec set interface ip address loop0 100.0.2.1/32
exec create ipip tunnel src 100.0.2.1 dst 200.0.0.102 p2p
exec ipsec sa add 2 spi 100002 crypto-alg aes-gcm-256 crypto-key 526e5451694377457269647042656544446d5557675a49676d6a74514563494d esp
exec ipsec sa add 100002 spi 200002 crypto-alg aes-gcm-256 crypto-key 526e5451694377457269647042656544446d5557675a49676d6a74514563494d esp
exec ipsec tunnel protect ipip2 sa-out 2 sa-in 100002 add
exec set interface ip address loop0 100.0.3.1/32
exec create ipip tunnel src 100.0.3.1 dst 200.0.0.102 p2p
exec ipsec sa add 3 spi 100003 crypto-alg aes-gcm-256 crypto-key 4f636974574f717542684557644174555143755a7444494c7044706d6954496b esp
exec ipsec sa add 100003 spi 200003 crypto-alg aes-gcm-256 crypto-key 4f636974574f717542684557644174555143755a7444494c7044706d6954496b esp
exec ipsec tunnel protect ipip3 sa-out 3 sa-in 100003 add
exec set interface ip address loop0 100.0.4.1/32
exec create ipip tunnel src 100.0.4.1 dst 200.0.0.102 p2p
exec ipsec sa add 4 spi 100004 crypto-alg aes-gcm-256 crypto-key 53645869776d6c496e58655372527a63524d686b5059566e49767547416c7766 esp
exec ipsec sa add 100004 spi 200004 crypto-alg aes-gcm-256 crypto-key 53645869776d6c496e58655372527a63524d686b5059566e49767547416c7766 esp
exec ipsec tunnel protect ipip4 sa-out 4 sa-in 100004 add
exec set interface ip address loop0 100.0.5.1/32
exec create ipip tunnel src 100.0.5.1 dst 200.0.0.102 p2p
exec ipsec sa add 5 spi 100005 crypto-alg aes-gcm-256 crypto-key 7763595a62516f71794d584744546866717a624e516b7a685355756c476f4d77 esp
exec ipsec sa add 100005 spi 200005 crypto-alg aes-gcm-256 crypto-key 7763595a62516f71794d584744546866717a624e516b7a685355756c476f4d77 esp
exec ipsec tunnel protect ipip5 sa-out 5 sa-in 100005 add
exec set interface ip address loop0 100.0.6.1/32
exec create ipip tunnel src 100.0.6.1 dst 200.0.0.102 p2p
exec ipsec sa add 6 spi 100006 crypto-alg aes-gcm-256 crypto-key 52517168517461674f5a4742687072466f55624e567a6e646d6b775644637754 esp
exec ipsec sa add 100006 spi 200006 crypto-alg aes-gcm-256 crypto-key 52517168517461674f5a4742687072466f55624e567a6e646d6b775644637754 esp
exec ipsec tunnel protect ipip6 sa-out 6 sa-in 100006 add
exec set interface ip address loop0 100.0.7.1/32
exec create ipip tunnel src 100.0.7.1 dst 200.0.0.102 p2p
exec ipsec sa add 7 spi 100007 crypto-alg aes-gcm-256 crypto-key 5069515944754e7a70734a6463644145796876454d6459744d634768615a4f4e esp
exec ipsec sa add 100007 spi 200007 crypto-alg aes-gcm-256 crypto-key 5069515944754e7a70734a6463644145796876454d6459744d634768615a4f4e esp
exec ipsec tunnel protect ipip7 sa-out 7 sa-in 100007 add
exec set interface ip address loop0 100.0.8.1/32
exec create ipip tunnel src 100.0.8.1 dst 200.0.0.102 p2p
exec ipsec sa add 8 spi 100008 crypto-alg aes-gcm-256 crypto-key 6675715154637842644945764a767655706845505a576763796d674a6d71536a esp
exec ipsec sa add 100008 spi 200008 crypto-alg aes-gcm-256 crypto-key 6675715154637842644945764a767655706845505a576763796d674a6d71536a esp
exec ipsec tunnel protect ipip8 sa-out 8 sa-in 100008 add
exec set interface ip address loop0 100.0.9.1/32
exec create ipip tunnel src 100.0.9.1 dst 200.0.0.102 p2p
exec ipsec sa add 9 spi 100009 crypto-alg aes-gcm-256 crypto-key 5756524554796d62487465756d766e72454e65694c626561546f434744625a50 esp
exec ipsec sa add 100009 spi 200009 crypto-alg aes-gcm-256 crypto-key 5756524554796d62487465756d766e72454e65694c626561546f434744625a50 esp
exec ipsec tunnel protect ipip9 sa-out 9 sa-in 100009 add
exec set interface ip address loop0 100.0.10.1/32
exec create ipip tunnel src 100.0.10.1 dst 200.0.0.102 p2p
exec ipsec sa add 10 spi 100010 crypto-alg aes-gcm-256 crypto-key 74446b665a486d587a58496f5063776f6a784d6477544c47706c775566464353 esp
exec ipsec sa add 100010 spi 200010 crypto-alg aes-gcm-256 crypto-key 74446b665a486d587a58496f5063776f6a784d6477544c47706c775566464353 esp
exec ipsec tunnel protect ipip10 sa-out 10 sa-in 100010 add
exec set interface ip address loop0 100.0.11.1/32
exec create ipip tunnel src 100.0.11.1 dst 200.0.0.102 p2p
exec ipsec sa add 11 spi 100011 crypto-alg aes-gcm-256 crypto-key 58444975766f61746347687661536f774169654d64627376584b776e5a4d7757 esp
exec ipsec sa add 100011 spi 200011 crypto-alg aes-gcm-256 crypto-key 58444975766f61746347687661536f774169654d64627376584b776e5a4d7757 esp
exec ipsec tunnel protect ipip11 sa-out 11 sa-in 100011 add
exec set interface ip address loop0 100.0.12.1/32
exec create ipip tunnel src 100.0.12.1 dst 200.0.0.102 p2p
exec ipsec sa add 12 spi 100012 crypto-alg aes-gcm-256 crypto-key 67586a54614d5544496c466e494a74585164615a45587749784f7a4b68505542 esp
exec ipsec sa add 100012 spi 200012 crypto-alg aes-gcm-256 crypto-key 67586a54614d5544496c466e494a74585164615a45587749784f7a4b68505542 esp
exec ipsec tunnel protect ipip12 sa-out 12 sa-in 100012 add
exec set interface ip address loop0 100.0.13.1/32
exec create ipip tunnel src 100.0.13.1 dst 200.0.0.102 p2p
exec ipsec sa add 13 spi 100013 crypto-alg aes-gcm-256 crypto-key 696e536b457946676b72497a64596b6e7363577575464f6467724e6b714c6557 esp
exec ipsec sa add 100013 spi 200013 crypto-alg aes-gcm-256 crypto-key 696e536b457946676b72497a64596b6e7363577575464f6467724e6b714c6557 esp
exec ipsec tunnel protect ipip13 sa-out 13 sa-in 100013 add
exec set interface ip address loop0 100.0.14.1/32
exec create ipip tunnel src 100.0.14.1 dst 200.0.0.102 p2p
exec ipsec sa add 14 spi 100014 crypto-alg aes-gcm-256 crypto-key 497a6b796552656562704d6863496f6768675a6e6d5371784276785273504277 esp
exec ipsec sa add 100014 spi 200014 crypto-alg aes-gcm-256 crypto-key 497a6b796552656562704d6863496f6768675a6e6d5371784276785273504277 esp
exec ipsec tunnel protect ipip14 sa-out 14 sa-in 100014 add
exec set interface ip address loop0 100.0.15.1/32
exec create ipip tunnel src 100.0.15.1 dst 200.0.0.102 p2p
exec ipsec sa add 15 spi 100015 crypto-alg aes-gcm-256 crypto-key 5764744b50616c6d6e4465586c44774656706b496341784f7763434b6e534772 esp
exec ipsec sa add 100015 spi 200015 crypto-alg aes-gcm-256 crypto-key 5764744b50616c6d6e4465586c44774656706b496341784f7763434b6e534772 esp
exec ipsec tunnel protect ipip15 sa-out 15 sa-in 100015 add
exec set interface ip address loop0 100.0.16.1/32
exec create ipip tunnel src 100.0.16.1 dst 200.0.0.102 p2p
exec ipsec sa add 16 spi 100016 crypto-alg aes-gcm-256 crypto-key 4f6950584868515a6e76714d78494c4948434c7a41656f4d4b50554b4e517469 esp
exec ipsec sa add 100016 spi 200016 crypto-alg aes-gcm-256 crypto-key 4f6950584868515a6e76714d78494c4948434c7a41656f4d4b50554b4e517469 esp
exec ipsec tunnel protect ipip16 sa-out 16 sa-in 100016 add
exec set interface ip address loop0 100.0.17.1/32
exec create ipip tunnel src 100.0.17.1 dst 200.0.0.102 p2p
exec ipsec sa add 17 spi 100017 crypto-alg aes-gcm-256 crypto-key 6245564345624872755a4c686b6b716a486771597249474f6945476c776d4144 esp
exec ipsec sa add 100017 spi 200017 crypto-alg aes-gcm-256 crypto-key 6245564345624872755a4c686b6b716a486771597249474f6945476c776d4144 esp
exec ipsec tunnel protect ipip17 sa-out 17 sa-in 100017 add
exec set interface ip address loop0 100.0.18.1/32
exec create ipip tunnel src 100.0.18.1 dst 200.0.0.102 p2p
exec ipsec sa add 18 spi 100018 crypto-alg aes-gcm-256 crypto-key 736a77636d694a737a494162546c7a4b4a68624c44734245484e6b596e4f6c55 esp
exec ipsec sa add 100018 spi 200018 crypto-alg aes-gcm-256 crypto-key 736a77636d694a737a494162546c7a4b4a68624c44734245484e6b596e4f6c55 esp
exec ipsec tunnel protect ipip18 sa-out 18 sa-in 100018 add
exec set interface ip address loop0 100.0.19.1/32
exec create ipip tunnel src 100.0.19.1 dst 200.0.0.102 p2p
exec ipsec sa add 19 spi 100019 crypto-alg aes-gcm-256 crypto-key 54547a4570566e5049446a6e475a485a6175786e626a744c684c716177534176 esp
exec ipsec sa add 100019 spi 200019 crypto-alg aes-gcm-256 crypto-key 54547a4570566e5049446a6e475a485a6175786e626a744c684c716177534176 esp
exec ipsec tunnel protect ipip19 sa-out 19 sa-in 100019 add
exec set interface ip address loop0 100.0.20.1/32
exec create ipip tunnel src 100.0.20.1 dst 200.0.0.102 p2p
exec ipsec sa add 20 spi 100020 crypto-alg aes-gcm-256 crypto-key 44646e50647367686a4a784f7269565644466f78557748464763737349664746 esp
exec ipsec sa add 100020 spi 200020 crypto-alg aes-gcm-256 crypto-key 44646e50647367686a4a784f7269565644466f78557748464763737349664746 esp
exec ipsec tunnel protect ipip20 sa-out 20 sa-in 100020 add
exec set interface ip address loop0 100.0.21.1/32
exec create ipip tunnel src 100.0.21.1 dst 200.0.0.102 p2p
exec ipsec sa add 21 spi 100021 crypto-alg aes-gcm-256 crypto-key 674c6d6b517448596549646469564f6e62597174624771745a786f54766a7370 esp
exec ipsec sa add 100021 spi 200021 crypto-alg aes-gcm-256 crypto-key 674c6d6b517448596549646469564f6e62597174624771745a786f54766a7370 esp
exec ipsec tunnel protect ipip21 sa-out 21 sa-in 100021 add
exec set interface ip address loop0 100.0.22.1/32
exec create ipip tunnel src 100.0.22.1 dst 200.0.0.102 p2p
exec ipsec sa add 22 spi 100022 crypto-alg aes-gcm-256 crypto-key 797156675a704277464b464c554d6746576d6179775066464676537a62766f58 esp
exec ipsec sa add 100022 spi 200022 crypto-alg aes-gcm-256 crypto-key 797156675a704277464b464c554d6746576d6179775066464676537a62766f58 esp
exec ipsec tunnel protect ipip22 sa-out 22 sa-in 100022 add
exec set interface ip address loop0 100.0.23.1/32
exec create ipip tunnel src 100.0.23.1 dst 200.0.0.102 p2p
exec ipsec sa add 23 spi 100023 crypto-alg aes-gcm-256 crypto-key 6279686c79434c4b534e554747476a767a426f6b455a454c73734f466975536e esp
exec ipsec sa add 100023 spi 200023 crypto-alg aes-gcm-256 crypto-key 6279686c79434c4b534e554747476a767a426f6b455a454c73734f466975536e esp
exec ipsec tunnel protect ipip23 sa-out 23 sa-in 100023 add
exec set interface ip address loop0 100.0.24.1/32
exec create ipip tunnel src 100.0.24.1 dst 200.0.0.102 p2p
exec ipsec sa add 24 spi 100024 crypto-alg aes-gcm-256 crypto-key 64487a645358774469624642637779554656456b416d534f476c78754d596f4e esp
exec ipsec sa add 100024 spi 200024 crypto-alg aes-gcm-256 crypto-key 64487a645358774469624642637779554656456b416d534f476c78754d596f4e esp
exec ipsec tunnel protect ipip24 sa-out 24 sa-in 100024 add
exec set interface ip address loop0 100.0.25.1/32
exec create ipip tunnel src 100.0.25.1 dst 200.0.0.102 p2p
exec ipsec sa add 25 spi 100025 crypto-alg aes-gcm-256 crypto-key 6462724a4850716548426962565a6a427972596f64484b736575566d44727a52 esp
exec ipsec sa add 100025 spi 200025 crypto-alg aes-gcm-256 crypto-key 6462724a4850716548426962565a6a427972596f64484b736575566d44727a52 esp
exec ipsec tunnel protect ipip25 sa-out 25 sa-in 100025 add
exec set interface ip address loop0 100.0.26.1/32
exec create ipip tunnel src 100.0.26.1 dst 200.0.0.102 p2p
exec ipsec sa add 26 spi 100026 crypto-alg aes-gcm-256 crypto-key 7a6e6c775552436945756d636d6d4962494a667058614c746a546677566f7250 esp
exec ipsec sa add 100026 spi 200026 crypto-alg aes-gcm-256 crypto-key 7a6e6c775552436945756d636d6d4962494a667058614c746a546677566f7250 esp
exec ipsec tunnel protect ipip26 sa-out 26 sa-in 100026 add
exec set interface ip address loop0 100.0.27.1/32
exec create ipip tunnel src 100.0.27.1 dst 200.0.0.102 p2p
exec ipsec sa add 27 spi 100027 crypto-alg aes-gcm-256 crypto-key 56774f6c547a526e644c72556a6a656a73796376705a5a61726c72447177794e esp
exec ipsec sa add 100027 spi 200027 crypto-alg aes-gcm-256 crypto-key 56774f6c547a526e644c72556a6a656a73796376705a5a61726c72447177794e esp
exec ipsec tunnel protect ipip27 sa-out 27 sa-in 100027 add
exec set interface ip address loop0 100.0.28.1/32
exec create ipip tunnel src 100.0.28.1 dst 200.0.0.102 p2p
exec ipsec sa add 28 spi 100028 crypto-alg aes-gcm-256 crypto-key 7266546d597a736b42466352664d49436f79574b706962535065725a6c58564b esp
exec ipsec sa add 100028 spi 200028 crypto-alg aes-gcm-256 crypto-key 7266546d597a736b42466352664d49436f79574b706962535065725a6c58564b esp
exec ipsec tunnel protect ipip28 sa-out 28 sa-in 100028 add
exec set interface ip address loop0 100.0.29.1/32
exec create ipip tunnel src 100.0.29.1 dst 200.0.0.102 p2p
exec ipsec sa add 29 spi 100029 crypto-alg aes-gcm-256 crypto-key 50784d4766694c774f717a70644c524a706b5970436c49467254764e6f7a5171 esp
exec ipsec sa add 100029 spi 200029 crypto-alg aes-gcm-256 crypto-key 50784d4766694c774f717a70644c524a706b5970436c49467254764e6f7a5171 esp
exec ipsec tunnel protect ipip29 sa-out 29 sa-in 100029 add
exec set interface ip address loop0 100.0.30.1/32
exec create ipip tunnel src 100.0.30.1 dst 200.0.0.102 p2p
exec ipsec sa add 30 spi 100030 crypto-alg aes-gcm-256 crypto-key 64644c416f454c4666574d5a4945544e5a4b6463684b65666b625a745178624d esp
exec ipsec sa add 100030 spi 200030 crypto-alg aes-gcm-256 crypto-key 64644c416f454c4666574d5a4945544e5a4b6463684b65666b625a745178624d esp
exec ipsec tunnel protect ipip30 sa-out 30 sa-in 100030 add
exec set interface ip address loop0 100.0.31.1/32
exec create ipip tunnel src 100.0.31.1 dst 200.0.0.102 p2p
exec ipsec sa add 31 spi 100031 crypto-alg aes-gcm-256 crypto-key 6450774f7555447a4e706752696165596354744d67475a56756c4d61725a4858 esp
exec ipsec sa add 100031 spi 200031 crypto-alg aes-gcm-256 crypto-key 6450774f7555447a4e706752696165596354744d67475a56756c4d61725a4858 esp
exec ipsec tunnel protect ipip31 sa-out 31 sa-in 100031 add
exec set interface ip address loop0 100.0.32.1/32
exec create ipip tunnel src 100.0.32.1 dst 200.0.0.102 p2p
exec ipsec sa add 32 spi 100032 crypto-alg aes-gcm-256 crypto-key 736f6c504366444e786e4d696551415348544f63706761517759745643435641 esp
exec ipsec sa add 100032 spi 200032 crypto-alg aes-gcm-256 crypto-key 736f6c504366444e786e4d696551415348544f63706761517759745643435641 esp
exec ipsec tunnel protect ipip32 sa-out 32 sa-in 100032 add
exec set interface ip address loop0 100.0.33.1/32
exec create ipip tunnel src 100.0.33.1 dst 200.0.0.102 p2p
exec ipsec sa add 33 spi 100033 crypto-alg aes-gcm-256 crypto-key 594a4765686e666f614e6d6e5846574374796552417174667151646e5a565071 esp
exec ipsec sa add 100033 spi 200033 crypto-alg aes-gcm-256 crypto-key 594a4765686e666f614e6d6e5846574374796552417174667151646e5a565071 esp
exec ipsec tunnel protect ipip33 sa-out 33 sa-in 100033 add
exec set interface ip address loop0 100.0.34.1/32
exec create ipip tunnel src 100.0.34.1 dst 200.0.0.102 p2p
exec ipsec sa add 34 spi 100034 crypto-alg aes-gcm-256 crypto-key 4e4c476a41624944474a616a4b514e6e6a70456146526c53724c6f684253784c esp
exec ipsec sa add 100034 spi 200034 crypto-alg aes-gcm-256 crypto-key 4e4c476a41624944474a616a4b514e6e6a70456146526c53724c6f684253784c esp
exec ipsec tunnel protect ipip34 sa-out 34 sa-in 100034 add
exec set interface ip address loop0 100.0.35.1/32
exec create ipip tunnel src 100.0.35.1 dst 200.0.0.102 p2p
exec ipsec sa add 35 spi 100035 crypto-alg aes-gcm-256 crypto-key 494976755773594e68554f764c65474c5572796942484764636a54704e615865 esp
exec ipsec sa add 100035 spi 200035 crypto-alg aes-gcm-256 crypto-key 494976755773594e68554f764c65474c5572796942484764636a54704e615865 esp
exec ipsec tunnel protect ipip35 sa-out 35 sa-in 100035 add
exec set interface ip address loop0 100.0.36.1/32
exec create ipip tunnel src 100.0.36.1 dst 200.0.0.102 p2p
exec ipsec sa add 36 spi 100036 crypto-alg aes-gcm-256 crypto-key 5175436954714e6948736e68454b53447662686548777a7541766e7a66686948 esp
exec ipsec sa add 100036 spi 200036 crypto-alg aes-gcm-256 crypto-key 5175436954714e6948736e68454b53447662686548777a7541766e7a66686948 esp
exec ipsec tunnel protect ipip36 sa-out 36 sa-in 100036 add
exec set interface ip address loop0 100.0.37.1/32
exec create ipip tunnel src 100.0.37.1 dst 200.0.0.102 p2p
exec ipsec sa add 37 spi 100037 crypto-alg aes-gcm-256 crypto-key 6e784e5a48465045626e61664776594d70554f4556596464785a4646706c7767 esp
exec ipsec sa add 100037 spi 200037 crypto-alg aes-gcm-256 crypto-key 6e784e5a48465045626e61664776594d70554f4556596464785a4646706c7767 esp
exec ipsec tunnel protect ipip37 sa-out 37 sa-in 100037 add
exec set interface ip address loop0 100.0.38.1/32
exec create ipip tunnel src 100.0.38.1 dst 200.0.0.102 p2p
exec ipsec sa add 38 spi 100038 crypto-alg aes-gcm-256 crypto-key 6d735179797978554f44586c514b774d6c5a5851587141564f574d6a674c4a41 esp
exec ipsec sa add 100038 spi 200038 crypto-alg aes-gcm-256 crypto-key 6d735179797978554f44586c514b774d6c5a5851587141564f574d6a674c4a41 esp
exec ipsec tunnel protect ipip38 sa-out 38 sa-in 100038 add
exec set interface ip address loop0 100.0.39.1/32
exec create ipip tunnel src 100.0.39.1 dst 200.0.0.102 p2p
exec ipsec sa add 39 spi 100039 crypto-alg aes-gcm-256 crypto-key 59664a6a69795a50766e4f6a4e745074615852516153724c655247735678704a esp
exec ipsec sa add 100039 spi 200039 crypto-alg aes-gcm-256 crypto-key 59664a6a69795a50766e4f6a4e745074615852516153724c655247735678704a esp
exec ipsec tunnel protect ipip39 sa-out 39 sa-in 100039 add
exec set interface unnumbered ipip0 use TenGigabitEthernet8/0/0
exec set interface state ipip0 up
exec ip route add 20.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use TenGigabitEthernet8/0/0
exec set interface state ipip1 up
exec ip route add 20.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use TenGigabitEthernet8/0/0
exec set interface state ipip2 up
exec ip route add 20.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use TenGigabitEthernet8/0/0
exec set interface state ipip3 up
exec ip route add 20.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use TenGigabitEthernet8/0/0
exec set interface state ipip4 up
exec ip route add 20.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use TenGigabitEthernet8/0/0
exec set interface state ipip5 up
exec ip route add 20.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use TenGigabitEthernet8/0/0
exec set interface state ipip6 up
exec ip route add 20.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use TenGigabitEthernet8/0/0
exec set interface state ipip7 up
exec ip route add 20.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use TenGigabitEthernet8/0/0
exec set interface state ipip8 up
exec ip route add 20.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use TenGigabitEthernet8/0/0
exec set interface state ipip9 up
exec ip route add 20.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use TenGigabitEthernet8/0/0
exec set interface state ipip10 up
exec ip route add 20.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use TenGigabitEthernet8/0/0
exec set interface state ipip11 up
exec ip route add 20.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use TenGigabitEthernet8/0/0
exec set interface state ipip12 up
exec ip route add 20.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use TenGigabitEthernet8/0/0
exec set interface state ipip13 up
exec ip route add 20.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use TenGigabitEthernet8/0/0
exec set interface state ipip14 up
exec ip route add 20.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use TenGigabitEthernet8/0/0
exec set interface state ipip15 up
exec ip route add 20.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use TenGigabitEthernet8/0/0
exec set interface state ipip16 up
exec ip route add 20.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use TenGigabitEthernet8/0/0
exec set interface state ipip17 up
exec ip route add 20.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use TenGigabitEthernet8/0/0
exec set interface state ipip18 up
exec ip route add 20.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use TenGigabitEthernet8/0/0
exec set interface state ipip19 up
exec ip route add 20.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use TenGigabitEthernet8/0/0
exec set interface state ipip20 up
exec ip route add 20.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use TenGigabitEthernet8/0/0
exec set interface state ipip21 up
exec ip route add 20.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use TenGigabitEthernet8/0/0
exec set interface state ipip22 up
exec ip route add 20.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use TenGigabitEthernet8/0/0
exec set interface state ipip23 up
exec ip route add 20.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use TenGigabitEthernet8/0/0
exec set interface state ipip24 up
exec ip route add 20.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use TenGigabitEthernet8/0/0
exec set interface state ipip25 up
exec ip route add 20.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use TenGigabitEthernet8/0/0
exec set interface state ipip26 up
exec ip route add 20.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use TenGigabitEthernet8/0/0
exec set interface state ipip27 up
exec ip route add 20.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use TenGigabitEthernet8/0/0
exec set interface state ipip28 up
exec ip route add 20.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use TenGigabitEthernet8/0/0
exec set interface state ipip29 up
exec ip route add 20.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use TenGigabitEthernet8/0/0
exec set interface state ipip30 up
exec ip route add 20.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use TenGigabitEthernet8/0/0
exec set interface state ipip31 up
exec ip route add 20.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use TenGigabitEthernet8/0/0
exec set interface state ipip32 up
exec ip route add 20.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use TenGigabitEthernet8/0/0
exec set interface state ipip33 up
exec ip route add 20.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use TenGigabitEthernet8/0/0
exec set interface state ipip34 up
exec ip route add 20.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use TenGigabitEthernet8/0/0
exec set interface state ipip35 up
exec ip route add 20.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use TenGigabitEthernet8/0/0
exec set interface state ipip36 up
exec ip route add 20.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use TenGigabitEthernet8/0/0
exec set interface state ipip37 up
exec ip route add 20.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use TenGigabitEthernet8/0/0
exec set interface state ipip38 up
exec ip route add 20.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use TenGigabitEthernet8/0/0
exec set interface state ipip39 up
exec ip route add 20.0.0.39/32 via ipip39
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec set interface ip address TenGigabitEthernet8/0/0 200.0.0.102/24.0
exec create ipip tunnel src 200.0.0.102 dst 100.0.0.1 p2p
exec ipsec sa add 100000 spi 200000 crypto-alg aes-gcm-256 crypto-key 4a78444d4277447547734851585064647a516f5a6151704f536e47615a546168 esp
exec ipsec sa add 0 spi 100000 crypto-alg aes-gcm-256 crypto-key 4a78444d4277447547734851585064647a516f5a6151704f536e47615a546168 esp
exec ipsec tunnel protect ipip0 sa-out 100000 sa-in 0 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.1.1 p2p
exec ipsec sa add 100001 spi 200001 crypto-alg aes-gcm-256 crypto-key 4272454d756e535a6a4d5841764c454a4243594c4b5a796a724a4c6756624451 esp
exec ipsec sa add 1 spi 100001 crypto-alg aes-gcm-256 crypto-key 4272454d756e535a6a4d5841764c454a4243594c4b5a796a724a4c6756624451 esp
exec ipsec tunnel protect ipip1 sa-out 100001 sa-in 1 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.2.1 p2p
exec ipsec sa add 100002 spi 200002 crypto-alg aes-gcm-256 crypto-key 526e5451694377457269647042656544446d5557675a49676d6a74514563494d esp
exec ipsec sa add 2 spi 100002 crypto-alg aes-gcm-256 crypto-key 526e5451694377457269647042656544446d5557675a49676d6a74514563494d esp
exec ipsec tunnel protect ipip2 sa-out 100002 sa-in 2 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.3.1 p2p
exec ipsec sa add 100003 spi 200003 crypto-alg aes-gcm-256 crypto-key 4f636974574f717542684557644174555143755a7444494c7044706d6954496b esp
exec ipsec sa add 3 spi 100003 crypto-alg aes-gcm-256 crypto-key 4f636974574f717542684557644174555143755a7444494c7044706d6954496b esp
exec ipsec tunnel protect ipip3 sa-out 100003 sa-in 3 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.4.1 p2p
exec ipsec sa add 100004 spi 200004 crypto-alg aes-gcm-256 crypto-key 53645869776d6c496e58655372527a63524d686b5059566e49767547416c7766 esp
exec ipsec sa add 4 spi 100004 crypto-alg aes-gcm-256 crypto-key 53645869776d6c496e58655372527a63524d686b5059566e49767547416c7766 esp
exec ipsec tunnel protect ipip4 sa-out 100004 sa-in 4 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.5.1 p2p
exec ipsec sa add 100005 spi 200005 crypto-alg aes-gcm-256 crypto-key 7763595a62516f71794d584744546866717a624e516b7a685355756c476f4d77 esp
exec ipsec sa add 5 spi 100005 crypto-alg aes-gcm-256 crypto-key 7763595a62516f71794d584744546866717a624e516b7a685355756c476f4d77 esp
exec ipsec tunnel protect ipip5 sa-out 100005 sa-in 5 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.6.1 p2p
exec ipsec sa add 100006 spi 200006 crypto-alg aes-gcm-256 crypto-key 52517168517461674f5a4742687072466f55624e567a6e646d6b775644637754 esp
exec ipsec sa add 6 spi 100006 crypto-alg aes-gcm-256 crypto-key 52517168517461674f5a4742687072466f55624e567a6e646d6b775644637754 esp
exec ipsec tunnel protect ipip6 sa-out 100006 sa-in 6 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.7.1 p2p
exec ipsec sa add 100007 spi 200007 crypto-alg aes-gcm-256 crypto-key 5069515944754e7a70734a6463644145796876454d6459744d634768615a4f4e esp
exec ipsec sa add 7 spi 100007 crypto-alg aes-gcm-256 crypto-key 5069515944754e7a70734a6463644145796876454d6459744d634768615a4f4e esp
exec ipsec tunnel protect ipip7 sa-out 100007 sa-in 7 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.8.1 p2p
exec ipsec sa add 100008 spi 200008 crypto-alg aes-gcm-256 crypto-key 6675715154637842644945764a767655706845505a576763796d674a6d71536a esp
exec ipsec sa add 8 spi 100008 crypto-alg aes-gcm-256 crypto-key 6675715154637842644945764a767655706845505a576763796d674a6d71536a esp
exec ipsec tunnel protect ipip8 sa-out 100008 sa-in 8 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.9.1 p2p
exec ipsec sa add 100009 spi 200009 crypto-alg aes-gcm-256 crypto-key 5756524554796d62487465756d766e72454e65694c626561546f434744625a50 esp
exec ipsec sa add 9 spi 100009 crypto-alg aes-gcm-256 crypto-key 5756524554796d62487465756d766e72454e65694c626561546f434744625a50 esp
exec ipsec tunnel protect ipip9 sa-out 100009 sa-in 9 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.10.1 p2p
exec ipsec sa add 100010 spi 200010 crypto-alg aes-gcm-256 crypto-key 74446b665a486d587a58496f5063776f6a784d6477544c47706c775566464353 esp
exec ipsec sa add 10 spi 100010 crypto-alg aes-gcm-256 crypto-key 74446b665a486d587a58496f5063776f6a784d6477544c47706c775566464353 esp
exec ipsec tunnel protect ipip10 sa-out 100010 sa-in 10 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.11.1 p2p
exec ipsec sa add 100011 spi 200011 crypto-alg aes-gcm-256 crypto-key 58444975766f61746347687661536f774169654d64627376584b776e5a4d7757 esp
exec ipsec sa add 11 spi 100011 crypto-alg aes-gcm-256 crypto-key 58444975766f61746347687661536f774169654d64627376584b776e5a4d7757 esp
exec ipsec tunnel protect ipip11 sa-out 100011 sa-in 11 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.12.1 p2p
exec ipsec sa add 100012 spi 200012 crypto-alg aes-gcm-256 crypto-key 67586a54614d5544496c466e494a74585164615a45587749784f7a4b68505542 esp
exec ipsec sa add 12 spi 100012 crypto-alg aes-gcm-256 crypto-key 67586a54614d5544496c466e494a74585164615a45587749784f7a4b68505542 esp
exec ipsec tunnel protect ipip12 sa-out 100012 sa-in 12 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.13.1 p2p
exec ipsec sa add 100013 spi 200013 crypto-alg aes-gcm-256 crypto-key 696e536b457946676b72497a64596b6e7363577575464f6467724e6b714c6557 esp
exec ipsec sa add 13 spi 100013 crypto-alg aes-gcm-256 crypto-key 696e536b457946676b72497a64596b6e7363577575464f6467724e6b714c6557 esp
exec ipsec tunnel protect ipip13 sa-out 100013 sa-in 13 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.14.1 p2p
exec ipsec sa add 100014 spi 200014 crypto-alg aes-gcm-256 crypto-key 497a6b796552656562704d6863496f6768675a6e6d5371784276785273504277 esp
exec ipsec sa add 14 spi 100014 crypto-alg aes-gcm-256 crypto-key 497a6b796552656562704d6863496f6768675a6e6d5371784276785273504277 esp
exec ipsec tunnel protect ipip14 sa-out 100014 sa-in 14 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.15.1 p2p
exec ipsec sa add 100015 spi 200015 crypto-alg aes-gcm-256 crypto-key 5764744b50616c6d6e4465586c44774656706b496341784f7763434b6e534772 esp
exec ipsec sa add 15 spi 100015 crypto-alg aes-gcm-256 crypto-key 5764744b50616c6d6e4465586c44774656706b496341784f7763434b6e534772 esp
exec ipsec tunnel protect ipip15 sa-out 100015 sa-in 15 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.16.1 p2p
exec ipsec sa add 100016 spi 200016 crypto-alg aes-gcm-256 crypto-key 4f6950584868515a6e76714d78494c4948434c7a41656f4d4b50554b4e517469 esp
exec ipsec sa add 16 spi 100016 crypto-alg aes-gcm-256 crypto-key 4f6950584868515a6e76714d78494c4948434c7a41656f4d4b50554b4e517469 esp
exec ipsec tunnel protect ipip16 sa-out 100016 sa-in 16 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.17.1 p2p
exec ipsec sa add 100017 spi 200017 crypto-alg aes-gcm-256 crypto-key 6245564345624872755a4c686b6b716a486771597249474f6945476c776d4144 esp
exec ipsec sa add 17 spi 100017 crypto-alg aes-gcm-256 crypto-key 6245564345624872755a4c686b6b716a486771597249474f6945476c776d4144 esp
exec ipsec tunnel protect ipip17 sa-out 100017 sa-in 17 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.18.1 p2p
exec ipsec sa add 100018 spi 200018 crypto-alg aes-gcm-256 crypto-key 736a77636d694a737a494162546c7a4b4a68624c44734245484e6b596e4f6c55 esp
exec ipsec sa add 18 spi 100018 crypto-alg aes-gcm-256 crypto-key 736a77636d694a737a494162546c7a4b4a68624c44734245484e6b596e4f6c55 esp
exec ipsec tunnel protect ipip18 sa-out 100018 sa-in 18 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.19.1 p2p
exec ipsec sa add 100019 spi 200019 crypto-alg aes-gcm-256 crypto-key 54547a4570566e5049446a6e475a485a6175786e626a744c684c716177534176 esp
exec ipsec sa add 19 spi 100019 crypto-alg aes-gcm-256 crypto-key 54547a4570566e5049446a6e475a485a6175786e626a744c684c716177534176 esp
exec ipsec tunnel protect ipip19 sa-out 100019 sa-in 19 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.20.1 p2p
exec ipsec sa add 100020 spi 200020 crypto-alg aes-gcm-256 crypto-key 44646e50647367686a4a784f7269565644466f78557748464763737349664746 esp
exec ipsec sa add 20 spi 100020 crypto-alg aes-gcm-256 crypto-key 44646e50647367686a4a784f7269565644466f78557748464763737349664746 esp
exec ipsec tunnel protect ipip20 sa-out 100020 sa-in 20 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.21.1 p2p
exec ipsec sa add 100021 spi 200021 crypto-alg aes-gcm-256 crypto-key 674c6d6b517448596549646469564f6e62597174624771745a786f54766a7370 esp
exec ipsec sa add 21 spi 100021 crypto-alg aes-gcm-256 crypto-key 674c6d6b517448596549646469564f6e62597174624771745a786f54766a7370 esp
exec ipsec tunnel protect ipip21 sa-out 100021 sa-in 21 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.22.1 p2p
exec ipsec sa add 100022 spi 200022 crypto-alg aes-gcm-256 crypto-key 797156675a704277464b464c554d6746576d6179775066464676537a62766f58 esp
exec ipsec sa add 22 spi 100022 crypto-alg aes-gcm-256 crypto-key 797156675a704277464b464c554d6746576d6179775066464676537a62766f58 esp
exec ipsec tunnel protect ipip22 sa-out 100022 sa-in 22 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.23.1 p2p
exec ipsec sa add 100023 spi 200023 crypto-alg aes-gcm-256 crypto-key 6279686c79434c4b534e554747476a767a426f6b455a454c73734f466975536e esp
exec ipsec sa add 23 spi 100023 crypto-alg aes-gcm-256 crypto-key 6279686c79434c4b534e554747476a767a426f6b455a454c73734f466975536e esp
exec ipsec tunnel protect ipip23 sa-out 100023 sa-in 23 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.24.1 p2p
exec ipsec sa add 100024 spi 200024 crypto-alg aes-gcm-256 crypto-key 64487a645358774469624642637779554656456b416d534f476c78754d596f4e esp
exec ipsec sa add 24 spi 100024 crypto-alg aes-gcm-256 crypto-key 64487a645358774469624642637779554656456b416d534f476c78754d596f4e esp
exec ipsec tunnel protect ipip24 sa-out 100024 sa-in 24 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.25.1 p2p
exec ipsec sa add 100025 spi 200025 crypto-alg aes-gcm-256 crypto-key 6462724a4850716548426962565a6a427972596f64484b736575566d44727a52 esp
exec ipsec sa add 25 spi 100025 crypto-alg aes-gcm-256 crypto-key 6462724a4850716548426962565a6a427972596f64484b736575566d44727a52 esp
exec ipsec tunnel protect ipip25 sa-out 100025 sa-in 25 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.26.1 p2p
exec ipsec sa add 100026 spi 200026 crypto-alg aes-gcm-256 crypto-key 7a6e6c775552436945756d636d6d4962494a667058614c746a546677566f7250 esp
exec ipsec sa add 26 spi 100026 crypto-alg aes-gcm-256 crypto-key 7a6e6c775552436945756d636d6d4962494a667058614c746a546677566f7250 esp
exec ipsec tunnel protect ipip26 sa-out 100026 sa-in 26 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.27.1 p2p
exec ipsec sa add 100027 spi 200027 crypto-alg aes-gcm-256 crypto-key 56774f6c547a526e644c72556a6a656a73796376705a5a61726c72447177794e esp
exec ipsec sa add 27 spi 100027 crypto-alg aes-gcm-256 crypto-key 56774f6c547a526e644c72556a6a656a73796376705a5a61726c72447177794e esp
exec ipsec tunnel protect ipip27 sa-out 100027 sa-in 27 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.28.1 p2p
exec ipsec sa add 100028 spi 200028 crypto-alg aes-gcm-256 crypto-key 7266546d597a736b42466352664d49436f79574b706962535065725a6c58564b esp
exec ipsec sa add 28 spi 100028 crypto-alg aes-gcm-256 crypto-key 7266546d597a736b42466352664d49436f79574b706962535065725a6c58564b esp
exec ipsec tunnel protect ipip28 sa-out 100028 sa-in 28 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.29.1 p2p
exec ipsec sa add 100029 spi 200029 crypto-alg aes-gcm-256 crypto-key 50784d4766694c774f717a70644c524a706b5970436c49467254764e6f7a5171 esp
exec ipsec sa add 29 spi 100029 crypto-alg aes-gcm-256 crypto-key 50784d4766694c774f717a70644c524a706b5970436c49467254764e6f7a5171 esp
exec ipsec tunnel protect ipip29 sa-out 100029 sa-in 29 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.30.1 p2p
exec ipsec sa add 100030 spi 200030 crypto-alg aes-gcm-256 crypto-key 64644c416f454c4666574d5a4945544e5a4b6463684b65666b625a745178624d esp
exec ipsec sa add 30 spi 100030 crypto-alg aes-gcm-256 crypto-key 64644c416f454c4666574d5a4945544e5a4b6463684b65666b625a745178624d esp
exec ipsec tunnel protect ipip30 sa-out 100030 sa-in 30 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.31.1 p2p
exec ipsec sa add 100031 spi 200031 crypto-alg aes-gcm-256 crypto-key 6450774f7555447a4e706752696165596354744d67475a56756c4d61725a4858 esp
exec ipsec sa add 31 spi 100031 crypto-alg aes-gcm-256 crypto-key 6450774f7555447a4e706752696165596354744d67475a56756c4d61725a4858 esp
exec ipsec tunnel protect ipip31 sa-out 100031 sa-in 31 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.32.1 p2p
exec ipsec sa add 100032 spi 200032 crypto-alg aes-gcm-256 crypto-key 736f6c504366444e786e4d696551415348544f63706761517759745643435641 esp
exec ipsec sa add 32 spi 100032 crypto-alg aes-gcm-256 crypto-key 736f6c504366444e786e4d696551415348544f63706761517759745643435641 esp
exec ipsec tunnel protect ipip32 sa-out 100032 sa-in 32 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.33.1 p2p
exec ipsec sa add 100033 spi 200033 crypto-alg aes-gcm-256 crypto-key 594a4765686e666f614e6d6e5846574374796552417174667151646e5a565071 esp
exec ipsec sa add 33 spi 100033 crypto-alg aes-gcm-256 crypto-key 594a4765686e666f614e6d6e5846574374796552417174667151646e5a565071 esp
exec ipsec tunnel protect ipip33 sa-out 100033 sa-in 33 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.34.1 p2p
exec ipsec sa add 100034 spi 200034 crypto-alg aes-gcm-256 crypto-key 4e4c476a41624944474a616a4b514e6e6a70456146526c53724c6f684253784c esp
exec ipsec sa add 34 spi 100034 crypto-alg aes-gcm-256 crypto-key 4e4c476a41624944474a616a4b514e6e6a70456146526c53724c6f684253784c esp
exec ipsec tunnel protect ipip34 sa-out 100034 sa-in 34 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.35.1 p2p
exec ipsec sa add 100035 spi 200035 crypto-alg aes-gcm-256 crypto-key 494976755773594e68554f764c65474c5572796942484764636a54704e615865 esp
exec ipsec sa add 35 spi 100035 crypto-alg aes-gcm-256 crypto-key 494976755773594e68554f764c65474c5572796942484764636a54704e615865 esp
exec ipsec tunnel protect ipip35 sa-out 100035 sa-in 35 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.36.1 p2p
exec ipsec sa add 100036 spi 200036 crypto-alg aes-gcm-256 crypto-key 5175436954714e6948736e68454b53447662686548777a7541766e7a66686948 esp
exec ipsec sa add 36 spi 100036 crypto-alg aes-gcm-256 crypto-key 5175436954714e6948736e68454b53447662686548777a7541766e7a66686948 esp
exec ipsec tunnel protect ipip36 sa-out 100036 sa-in 36 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.37.1 p2p
exec ipsec sa add 100037 spi 200037 crypto-alg aes-gcm-256 crypto-key 6e784e5a48465045626e61664776594d70554f4556596464785a4646706c7767 esp
exec ipsec sa add 37 spi 100037 crypto-alg aes-gcm-256 crypto-key 6e784e5a48465045626e61664776594d70554f4556596464785a4646706c7767 esp
exec ipsec tunnel protect ipip37 sa-out 100037 sa-in 37 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.38.1 p2p
exec ipsec sa add 100038 spi 200038 crypto-alg aes-gcm-256 crypto-key 6d735179797978554f44586c514b774d6c5a5851587141564f574d6a674c4a41 esp
exec ipsec sa add 38 spi 100038 crypto-alg aes-gcm-256 crypto-key 6d735179797978554f44586c514b774d6c5a5851587141564f574d6a674c4a41 esp
exec ipsec tunnel protect ipip38 sa-out 100038 sa-in 38 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.39.1 p2p
exec ipsec sa add 100039 spi 200039 crypto-alg aes-gcm-256 crypto-key 59664a6a69795a50766e4f6a4e745074615852516153724c655247735678704a esp
exec ipsec sa add 39 spi 100039 crypto-alg aes-gcm-256 crypto-key 59664a6a69795a50766e4f6a4e745074615852516153724c655247735678704a esp
exec ipsec tunnel protect ipip39 sa-out 100039 sa-in 39 add
exec ip route add 100.0.0.1/8 via 200.0.0.101 TenGigabitEthernet8/0/0
exec set interface unnumbered ipip0 use TenGigabitEthernet8/0/0
exec set interface state ipip0 up
exec ip route add 10.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use TenGigabitEthernet8/0/0
exec set interface state ipip1 up
exec ip route add 10.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use TenGigabitEthernet8/0/0
exec set interface state ipip2 up
exec ip route add 10.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use TenGigabitEthernet8/0/0
exec set interface state ipip3 up
exec ip route add 10.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use TenGigabitEthernet8/0/0
exec set interface state ipip4 up
exec ip route add 10.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use TenGigabitEthernet8/0/0
exec set interface state ipip5 up
exec ip route add 10.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use TenGigabitEthernet8/0/0
exec set interface state ipip6 up
exec ip route add 10.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use TenGigabitEthernet8/0/0
exec set interface state ipip7 up
exec ip route add 10.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use TenGigabitEthernet8/0/0
exec set interface state ipip8 up
exec ip route add 10.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use TenGigabitEthernet8/0/0
exec set interface state ipip9 up
exec ip route add 10.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use TenGigabitEthernet8/0/0
exec set interface state ipip10 up
exec ip route add 10.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use TenGigabitEthernet8/0/0
exec set interface state ipip11 up
exec ip route add 10.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use TenGigabitEthernet8/0/0
exec set interface state ipip12 up
exec ip route add 10.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use TenGigabitEthernet8/0/0
exec set interface state ipip13 up
exec ip route add 10.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use TenGigabitEthernet8/0/0
exec set interface state ipip14 up
exec ip route add 10.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use TenGigabitEthernet8/0/0
exec set interface state ipip15 up
exec ip route add 10.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use TenGigabitEthernet8/0/0
exec set interface state ipip16 up
exec ip route add 10.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use TenGigabitEthernet8/0/0
exec set interface state ipip17 up
exec ip route add 10.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use TenGigabitEthernet8/0/0
exec set interface state ipip18 up
exec ip route add 10.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use TenGigabitEthernet8/0/0
exec set interface state ipip19 up
exec ip route add 10.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use TenGigabitEthernet8/0/0
exec set interface state ipip20 up
exec ip route add 10.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use TenGigabitEthernet8/0/0
exec set interface state ipip21 up
exec ip route add 10.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use TenGigabitEthernet8/0/0
exec set interface state ipip22 up
exec ip route add 10.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use TenGigabitEthernet8/0/0
exec set interface state ipip23 up
exec ip route add 10.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use TenGigabitEthernet8/0/0
exec set interface state ipip24 up
exec ip route add 10.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use TenGigabitEthernet8/0/0
exec set interface state ipip25 up
exec ip route add 10.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use TenGigabitEthernet8/0/0
exec set interface state ipip26 up
exec ip route add 10.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use TenGigabitEthernet8/0/0
exec set interface state ipip27 up
exec ip route add 10.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use TenGigabitEthernet8/0/0
exec set interface state ipip28 up
exec ip route add 10.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use TenGigabitEthernet8/0/0
exec set interface state ipip29 up
exec ip route add 10.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use TenGigabitEthernet8/0/0
exec set interface state ipip30 up
exec ip route add 10.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use TenGigabitEthernet8/0/0
exec set interface state ipip31 up
exec ip route add 10.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use TenGigabitEthernet8/0/0
exec set interface state ipip32 up
exec ip route add 10.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use TenGigabitEthernet8/0/0
exec set interface state ipip33 up
exec ip route add 10.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use TenGigabitEthernet8/0/0
exec set interface state ipip34 up
exec ip route add 10.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use TenGigabitEthernet8/0/0
exec set interface state ipip35 up
exec ip route add 10.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use TenGigabitEthernet8/0/0
exec set interface state ipip36 up
exec ip route add 10.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use TenGigabitEthernet8/0/0
exec set interface state ipip37 up
exec ip route add 10.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use TenGigabitEthernet8/0/0
exec set interface state ipip38 up
exec ip route add 10.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use TenGigabitEthernet8/0/0
exec set interface state ipip39 up
exec ip route add 10.0.0.39/32 via ipip39

 imix-4t4c-ethip4ipsec40tnlsw- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec create loopback interface
exec set interface state loop0 up
exec set interface ip address TenGigabitEthernet8/0/0 200.0.0.101/24
exec set ip neighbor TenGigabitEthernet8/0/0 200.0.0.102 ac:1f:6b:57:57:fe static
exec set interface ip address loop0 100.0.0.1/32
exec create ipip tunnel src 100.0.0.1 dst 200.0.0.102 p2p
exec ipsec sa add 0 spi 100000 crypto-alg aes-gcm-256 crypto-key 535344644a6a634d4a67756a724371655643704642494c706864734d4a4b6f68 esp
exec ipsec sa add 100000 spi 200000 crypto-alg aes-gcm-256 crypto-key 535344644a6a634d4a67756a724371655643704642494c706864734d4a4b6f68 esp
exec ipsec tunnel protect ipip0 sa-out 0 sa-in 100000 add
exec set interface ip address loop0 100.0.1.1/32
exec create ipip tunnel src 100.0.1.1 dst 200.0.0.102 p2p
exec ipsec sa add 1 spi 100001 crypto-alg aes-gcm-256 crypto-key 4d646d554f704a497574734e58484c726c754a73446d456c515946717170644d esp
exec ipsec sa add 100001 spi 200001 crypto-alg aes-gcm-256 crypto-key 4d646d554f704a497574734e58484c726c754a73446d456c515946717170644d esp
exec ipsec tunnel protect ipip1 sa-out 1 sa-in 100001 add
exec set interface ip address loop0 100.0.2.1/32
exec create ipip tunnel src 100.0.2.1 dst 200.0.0.102 p2p
exec ipsec sa add 2 spi 100002 crypto-alg aes-gcm-256 crypto-key 74755058474b774b476c4b6478504d596f564b46725843736259634252555754 esp
exec ipsec sa add 100002 spi 200002 crypto-alg aes-gcm-256 crypto-key 74755058474b774b476c4b6478504d596f564b46725843736259634252555754 esp
exec ipsec tunnel protect ipip2 sa-out 2 sa-in 100002 add
exec set interface ip address loop0 100.0.3.1/32
exec create ipip tunnel src 100.0.3.1 dst 200.0.0.102 p2p
exec ipsec sa add 3 spi 100003 crypto-alg aes-gcm-256 crypto-key 616653546e4a5061726a476c645157636d776641417541776346755a5063796d esp
exec ipsec sa add 100003 spi 200003 crypto-alg aes-gcm-256 crypto-key 616653546e4a5061726a476c645157636d776641417541776346755a5063796d esp
exec ipsec tunnel protect ipip3 sa-out 3 sa-in 100003 add
exec set interface ip address loop0 100.0.4.1/32
exec create ipip tunnel src 100.0.4.1 dst 200.0.0.102 p2p
exec ipsec sa add 4 spi 100004 crypto-alg aes-gcm-256 crypto-key 4c52795a66436568544c4c6246636353595146455273624250464a4a75656162 esp
exec ipsec sa add 100004 spi 200004 crypto-alg aes-gcm-256 crypto-key 4c52795a66436568544c4c6246636353595146455273624250464a4a75656162 esp
exec ipsec tunnel protect ipip4 sa-out 4 sa-in 100004 add
exec set interface ip address loop0 100.0.5.1/32
exec create ipip tunnel src 100.0.5.1 dst 200.0.0.102 p2p
exec ipsec sa add 5 spi 100005 crypto-alg aes-gcm-256 crypto-key 51576971716541536371424a75724e426864547574574a494150645342795348 esp
exec ipsec sa add 100005 spi 200005 crypto-alg aes-gcm-256 crypto-key 51576971716541536371424a75724e426864547574574a494150645342795348 esp
exec ipsec tunnel protect ipip5 sa-out 5 sa-in 100005 add
exec set interface ip address loop0 100.0.6.1/32
exec create ipip tunnel src 100.0.6.1 dst 200.0.0.102 p2p
exec ipsec sa add 6 spi 100006 crypto-alg aes-gcm-256 crypto-key 626f484e61524c6d4766654b4f6f54647a6c7262657464646276724f64786771 esp
exec ipsec sa add 100006 spi 200006 crypto-alg aes-gcm-256 crypto-key 626f484e61524c6d4766654b4f6f54647a6c7262657464646276724f64786771 esp
exec ipsec tunnel protect ipip6 sa-out 6 sa-in 100006 add
exec set interface ip address loop0 100.0.7.1/32
exec create ipip tunnel src 100.0.7.1 dst 200.0.0.102 p2p
exec ipsec sa add 7 spi 100007 crypto-alg aes-gcm-256 crypto-key 4656794c6a694673615757654b435a68494f63676e4249497a6f4f7265675962 esp
exec ipsec sa add 100007 spi 200007 crypto-alg aes-gcm-256 crypto-key 4656794c6a694673615757654b435a68494f63676e4249497a6f4f7265675962 esp
exec ipsec tunnel protect ipip7 sa-out 7 sa-in 100007 add
exec set interface ip address loop0 100.0.8.1/32
exec create ipip tunnel src 100.0.8.1 dst 200.0.0.102 p2p
exec ipsec sa add 8 spi 100008 crypto-alg aes-gcm-256 crypto-key 6e684e59687a6a5669794d6c4f774b4a636d52484f45555159787268534a5451 esp
exec ipsec sa add 100008 spi 200008 crypto-alg aes-gcm-256 crypto-key 6e684e59687a6a5669794d6c4f774b4a636d52484f45555159787268534a5451 esp
exec ipsec tunnel protect ipip8 sa-out 8 sa-in 100008 add
exec set interface ip address loop0 100.0.9.1/32
exec create ipip tunnel src 100.0.9.1 dst 200.0.0.102 p2p
exec ipsec sa add 9 spi 100009 crypto-alg aes-gcm-256 crypto-key 6144654958467253554a464d4d597248485842584f714d524c6b50784c496d57 esp
exec ipsec sa add 100009 spi 200009 crypto-alg aes-gcm-256 crypto-key 6144654958467253554a464d4d597248485842584f714d524c6b50784c496d57 esp
exec ipsec tunnel protect ipip9 sa-out 9 sa-in 100009 add
exec set interface ip address loop0 100.0.10.1/32
exec create ipip tunnel src 100.0.10.1 dst 200.0.0.102 p2p
exec ipsec sa add 10 spi 100010 crypto-alg aes-gcm-256 crypto-key 46584e4e705a4272546d564f514d4c7a4e4e5361777241734544776c43687478 esp
exec ipsec sa add 100010 spi 200010 crypto-alg aes-gcm-256 crypto-key 46584e4e705a4272546d564f514d4c7a4e4e5361777241734544776c43687478 esp
exec ipsec tunnel protect ipip10 sa-out 10 sa-in 100010 add
exec set interface ip address loop0 100.0.11.1/32
exec create ipip tunnel src 100.0.11.1 dst 200.0.0.102 p2p
exec ipsec sa add 11 spi 100011 crypto-alg aes-gcm-256 crypto-key 674356504b46775258686771535a57684d7462786e416d5741466c4f4471694b esp
exec ipsec sa add 100011 spi 200011 crypto-alg aes-gcm-256 crypto-key 674356504b46775258686771535a57684d7462786e416d5741466c4f4471694b esp
exec ipsec tunnel protect ipip11 sa-out 11 sa-in 100011 add
exec set interface ip address loop0 100.0.12.1/32
exec create ipip tunnel src 100.0.12.1 dst 200.0.0.102 p2p
exec ipsec sa add 12 spi 100012 crypto-alg aes-gcm-256 crypto-key 52677a4e6c696c53615365706a50636f6368636a656667554a4242425a776450 esp
exec ipsec sa add 100012 spi 200012 crypto-alg aes-gcm-256 crypto-key 52677a4e6c696c53615365706a50636f6368636a656667554a4242425a776450 esp
exec ipsec tunnel protect ipip12 sa-out 12 sa-in 100012 add
exec set interface ip address loop0 100.0.13.1/32
exec create ipip tunnel src 100.0.13.1 dst 200.0.0.102 p2p
exec ipsec sa add 13 spi 100013 crypto-alg aes-gcm-256 crypto-key 625374725858746a694c52434c5644706e6843444257785656506168427a496a esp
exec ipsec sa add 100013 spi 200013 crypto-alg aes-gcm-256 crypto-key 625374725858746a694c52434c5644706e6843444257785656506168427a496a esp
exec ipsec tunnel protect ipip13 sa-out 13 sa-in 100013 add
exec set interface ip address loop0 100.0.14.1/32
exec create ipip tunnel src 100.0.14.1 dst 200.0.0.102 p2p
exec ipsec sa add 14 spi 100014 crypto-alg aes-gcm-256 crypto-key 6749766d4e75465a536c6c6f6a484d6971484557714f7359774b72684b59764b esp
exec ipsec sa add 100014 spi 200014 crypto-alg aes-gcm-256 crypto-key 6749766d4e75465a536c6c6f6a484d6971484557714f7359774b72684b59764b esp
exec ipsec tunnel protect ipip14 sa-out 14 sa-in 100014 add
exec set interface ip address loop0 100.0.15.1/32
exec create ipip tunnel src 100.0.15.1 dst 200.0.0.102 p2p
exec ipsec sa add 15 spi 100015 crypto-alg aes-gcm-256 crypto-key 57484c4f65424c427676774c626545424b71506a4750444f51764452756e7062 esp
exec ipsec sa add 100015 spi 200015 crypto-alg aes-gcm-256 crypto-key 57484c4f65424c427676774c626545424b71506a4750444f51764452756e7062 esp
exec ipsec tunnel protect ipip15 sa-out 15 sa-in 100015 add
exec set interface ip address loop0 100.0.16.1/32
exec create ipip tunnel src 100.0.16.1 dst 200.0.0.102 p2p
exec ipsec sa add 16 spi 100016 crypto-alg aes-gcm-256 crypto-key 777144616a705364514a6966736c654c4d666a64436c6965796e6c4169554f44 esp
exec ipsec sa add 100016 spi 200016 crypto-alg aes-gcm-256 crypto-key 777144616a705364514a6966736c654c4d666a64436c6965796e6c4169554f44 esp
exec ipsec tunnel protect ipip16 sa-out 16 sa-in 100016 add
exec set interface ip address loop0 100.0.17.1/32
exec create ipip tunnel src 100.0.17.1 dst 200.0.0.102 p2p
exec ipsec sa add 17 spi 100017 crypto-alg aes-gcm-256 crypto-key 646b684753544970435a5862524a41644d4e684457504e71576f7854514c6d62 esp
exec ipsec sa add 100017 spi 200017 crypto-alg aes-gcm-256 crypto-key 646b684753544970435a5862524a41644d4e684457504e71576f7854514c6d62 esp
exec ipsec tunnel protect ipip17 sa-out 17 sa-in 100017 add
exec set interface ip address loop0 100.0.18.1/32
exec create ipip tunnel src 100.0.18.1 dst 200.0.0.102 p2p
exec ipsec sa add 18 spi 100018 crypto-alg aes-gcm-256 crypto-key 51494246566d4848436f446d72656d506348515a4c775243544a664174744442 esp
exec ipsec sa add 100018 spi 200018 crypto-alg aes-gcm-256 crypto-key 51494246566d4848436f446d72656d506348515a4c775243544a664174744442 esp
exec ipsec tunnel protect ipip18 sa-out 18 sa-in 100018 add
exec set interface ip address loop0 100.0.19.1/32
exec create ipip tunnel src 100.0.19.1 dst 200.0.0.102 p2p
exec ipsec sa add 19 spi 100019 crypto-alg aes-gcm-256 crypto-key 46646c534c46616b6d6a53504b58664f7a5970544a7858597145517a716b7643 esp
exec ipsec sa add 100019 spi 200019 crypto-alg aes-gcm-256 crypto-key 46646c534c46616b6d6a53504b58664f7a5970544a7858597145517a716b7643 esp
exec ipsec tunnel protect ipip19 sa-out 19 sa-in 100019 add
exec set interface ip address loop0 100.0.20.1/32
exec create ipip tunnel src 100.0.20.1 dst 200.0.0.102 p2p
exec ipsec sa add 20 spi 100020 crypto-alg aes-gcm-256 crypto-key 48674772756e4e54704f595556447a484d59686a4376514f4a746d5863414356 esp
exec ipsec sa add 100020 spi 200020 crypto-alg aes-gcm-256 crypto-key 48674772756e4e54704f595556447a484d59686a4376514f4a746d5863414356 esp
exec ipsec tunnel protect ipip20 sa-out 20 sa-in 100020 add
exec set interface ip address loop0 100.0.21.1/32
exec create ipip tunnel src 100.0.21.1 dst 200.0.0.102 p2p
exec ipsec sa add 21 spi 100021 crypto-alg aes-gcm-256 crypto-key 704d544d4a756c536e52556b6845704c4953485353734a634a7a556873464561 esp
exec ipsec sa add 100021 spi 200021 crypto-alg aes-gcm-256 crypto-key 704d544d4a756c536e52556b6845704c4953485353734a634a7a556873464561 esp
exec ipsec tunnel protect ipip21 sa-out 21 sa-in 100021 add
exec set interface ip address loop0 100.0.22.1/32
exec create ipip tunnel src 100.0.22.1 dst 200.0.0.102 p2p
exec ipsec sa add 22 spi 100022 crypto-alg aes-gcm-256 crypto-key 4a54565844497478556466587a7266465270514c6c45576f624668546e454259 esp
exec ipsec sa add 100022 spi 200022 crypto-alg aes-gcm-256 crypto-key 4a54565844497478556466587a7266465270514c6c45576f624668546e454259 esp
exec ipsec tunnel protect ipip22 sa-out 22 sa-in 100022 add
exec set interface ip address loop0 100.0.23.1/32
exec create ipip tunnel src 100.0.23.1 dst 200.0.0.102 p2p
exec ipsec sa add 23 spi 100023 crypto-alg aes-gcm-256 crypto-key 5468476a706d43766642466d797847666b7751456848477558416e7a47654d65 esp
exec ipsec sa add 100023 spi 200023 crypto-alg aes-gcm-256 crypto-key 5468476a706d43766642466d797847666b7751456848477558416e7a47654d65 esp
exec ipsec tunnel protect ipip23 sa-out 23 sa-in 100023 add
exec set interface ip address loop0 100.0.24.1/32
exec create ipip tunnel src 100.0.24.1 dst 200.0.0.102 p2p
exec ipsec sa add 24 spi 100024 crypto-alg aes-gcm-256 crypto-key 6442795576656f4b4b6b61584d45566f6a6e6c48564c4f744f55754e70704847 esp
exec ipsec sa add 100024 spi 200024 crypto-alg aes-gcm-256 crypto-key 6442795576656f4b4b6b61584d45566f6a6e6c48564c4f744f55754e70704847 esp
exec ipsec tunnel protect ipip24 sa-out 24 sa-in 100024 add
exec set interface ip address loop0 100.0.25.1/32
exec create ipip tunnel src 100.0.25.1 dst 200.0.0.102 p2p
exec ipsec sa add 25 spi 100025 crypto-alg aes-gcm-256 crypto-key 566e4778524357494e584247564548436c725445684f5a55765a754c6654704a esp
exec ipsec sa add 100025 spi 200025 crypto-alg aes-gcm-256 crypto-key 566e4778524357494e584247564548436c725445684f5a55765a754c6654704a esp
exec ipsec tunnel protect ipip25 sa-out 25 sa-in 100025 add
exec set interface ip address loop0 100.0.26.1/32
exec create ipip tunnel src 100.0.26.1 dst 200.0.0.102 p2p
exec ipsec sa add 26 spi 100026 crypto-alg aes-gcm-256 crypto-key 77554247716d47564457446c6b446a6a566b536666494944787a79717276566d esp
exec ipsec sa add 100026 spi 200026 crypto-alg aes-gcm-256 crypto-key 77554247716d47564457446c6b446a6a566b536666494944787a79717276566d esp
exec ipsec tunnel protect ipip26 sa-out 26 sa-in 100026 add
exec set interface ip address loop0 100.0.27.1/32
exec create ipip tunnel src 100.0.27.1 dst 200.0.0.102 p2p
exec ipsec sa add 27 spi 100027 crypto-alg aes-gcm-256 crypto-key 4378465a546a457962775659456f4f476772646f544975435a706f566e66666c esp
exec ipsec sa add 100027 spi 200027 crypto-alg aes-gcm-256 crypto-key 4378465a546a457962775659456f4f476772646f544975435a706f566e66666c esp
exec ipsec tunnel protect ipip27 sa-out 27 sa-in 100027 add
exec set interface ip address loop0 100.0.28.1/32
exec create ipip tunnel src 100.0.28.1 dst 200.0.0.102 p2p
exec ipsec sa add 28 spi 100028 crypto-alg aes-gcm-256 crypto-key 72477843626553476e656266746d7a6e454457467451664f6b634d68616d4b70 esp
exec ipsec sa add 100028 spi 200028 crypto-alg aes-gcm-256 crypto-key 72477843626553476e656266746d7a6e454457467451664f6b634d68616d4b70 esp
exec ipsec tunnel protect ipip28 sa-out 28 sa-in 100028 add
exec set interface ip address loop0 100.0.29.1/32
exec create ipip tunnel src 100.0.29.1 dst 200.0.0.102 p2p
exec ipsec sa add 29 spi 100029 crypto-alg aes-gcm-256 crypto-key 6961547278746c53704a784e566962577a515743587779745664576679557064 esp
exec ipsec sa add 100029 spi 200029 crypto-alg aes-gcm-256 crypto-key 6961547278746c53704a784e566962577a515743587779745664576679557064 esp
exec ipsec tunnel protect ipip29 sa-out 29 sa-in 100029 add
exec set interface ip address loop0 100.0.30.1/32
exec create ipip tunnel src 100.0.30.1 dst 200.0.0.102 p2p
exec ipsec sa add 30 spi 100030 crypto-alg aes-gcm-256 crypto-key 415044547253584378445756577665516571504a557176746f78674c74414b61 esp
exec ipsec sa add 100030 spi 200030 crypto-alg aes-gcm-256 crypto-key 415044547253584378445756577665516571504a557176746f78674c74414b61 esp
exec ipsec tunnel protect ipip30 sa-out 30 sa-in 100030 add
exec set interface ip address loop0 100.0.31.1/32
exec create ipip tunnel src 100.0.31.1 dst 200.0.0.102 p2p
exec ipsec sa add 31 spi 100031 crypto-alg aes-gcm-256 crypto-key 46534946646b6e4369734f547869516c77735965775664747042576952715970 esp
exec ipsec sa add 100031 spi 200031 crypto-alg aes-gcm-256 crypto-key 46534946646b6e4369734f547869516c77735965775664747042576952715970 esp
exec ipsec tunnel protect ipip31 sa-out 31 sa-in 100031 add
exec set interface ip address loop0 100.0.32.1/32
exec create ipip tunnel src 100.0.32.1 dst 200.0.0.102 p2p
exec ipsec sa add 32 spi 100032 crypto-alg aes-gcm-256 crypto-key 554a53504a756859666c49574e6f6e4645415576764a486670436f5046686361 esp
exec ipsec sa add 100032 spi 200032 crypto-alg aes-gcm-256 crypto-key 554a53504a756859666c49574e6f6e4645415576764a486670436f5046686361 esp
exec ipsec tunnel protect ipip32 sa-out 32 sa-in 100032 add
exec set interface ip address loop0 100.0.33.1/32
exec create ipip tunnel src 100.0.33.1 dst 200.0.0.102 p2p
exec ipsec sa add 33 spi 100033 crypto-alg aes-gcm-256 crypto-key 4244464f774462505971735a734f696c7946554c654e664d66654e526e635876 esp
exec ipsec sa add 100033 spi 200033 crypto-alg aes-gcm-256 crypto-key 4244464f774462505971735a734f696c7946554c654e664d66654e526e635876 esp
exec ipsec tunnel protect ipip33 sa-out 33 sa-in 100033 add
exec set interface ip address loop0 100.0.34.1/32
exec create ipip tunnel src 100.0.34.1 dst 200.0.0.102 p2p
exec ipsec sa add 34 spi 100034 crypto-alg aes-gcm-256 crypto-key 42467755766e7365455a7866764b465a7066484b5a5651777747465178456279 esp
exec ipsec sa add 100034 spi 200034 crypto-alg aes-gcm-256 crypto-key 42467755766e7365455a7866764b465a7066484b5a5651777747465178456279 esp
exec ipsec tunnel protect ipip34 sa-out 34 sa-in 100034 add
exec set interface ip address loop0 100.0.35.1/32
exec create ipip tunnel src 100.0.35.1 dst 200.0.0.102 p2p
exec ipsec sa add 35 spi 100035 crypto-alg aes-gcm-256 crypto-key 4f6c616d59734e687363695546505a4b4e6c4250745244484665576d5153776c esp
exec ipsec sa add 100035 spi 200035 crypto-alg aes-gcm-256 crypto-key 4f6c616d59734e687363695546505a4b4e6c4250745244484665576d5153776c esp
exec ipsec tunnel protect ipip35 sa-out 35 sa-in 100035 add
exec set interface ip address loop0 100.0.36.1/32
exec create ipip tunnel src 100.0.36.1 dst 200.0.0.102 p2p
exec ipsec sa add 36 spi 100036 crypto-alg aes-gcm-256 crypto-key 6f746e52514d5a46446e5041544a4c694f49535a4459426a4c45514b64546862 esp
exec ipsec sa add 100036 spi 200036 crypto-alg aes-gcm-256 crypto-key 6f746e52514d5a46446e5041544a4c694f49535a4459426a4c45514b64546862 esp
exec ipsec tunnel protect ipip36 sa-out 36 sa-in 100036 add
exec set interface ip address loop0 100.0.37.1/32
exec create ipip tunnel src 100.0.37.1 dst 200.0.0.102 p2p
exec ipsec sa add 37 spi 100037 crypto-alg aes-gcm-256 crypto-key 6b6b4257434261614e56734b4c61656e594f5973574c7969494a524c4e5a4d51 esp
exec ipsec sa add 100037 spi 200037 crypto-alg aes-gcm-256 crypto-key 6b6b4257434261614e56734b4c61656e594f5973574c7969494a524c4e5a4d51 esp
exec ipsec tunnel protect ipip37 sa-out 37 sa-in 100037 add
exec set interface ip address loop0 100.0.38.1/32
exec create ipip tunnel src 100.0.38.1 dst 200.0.0.102 p2p
exec ipsec sa add 38 spi 100038 crypto-alg aes-gcm-256 crypto-key 4278757546594d6859644848424d637864664651655876694f4c576e4b6d654a esp
exec ipsec sa add 100038 spi 200038 crypto-alg aes-gcm-256 crypto-key 4278757546594d6859644848424d637864664651655876694f4c576e4b6d654a esp
exec ipsec tunnel protect ipip38 sa-out 38 sa-in 100038 add
exec set interface ip address loop0 100.0.39.1/32
exec create ipip tunnel src 100.0.39.1 dst 200.0.0.102 p2p
exec ipsec sa add 39 spi 100039 crypto-alg aes-gcm-256 crypto-key 7168656d764476774c6a6b5962694b55765866646d41555a5753496c4b4c7947 esp
exec ipsec sa add 100039 spi 200039 crypto-alg aes-gcm-256 crypto-key 7168656d764476774c6a6b5962694b55765866646d41555a5753496c4b4c7947 esp
exec ipsec tunnel protect ipip39 sa-out 39 sa-in 100039 add
exec set interface unnumbered ipip0 use TenGigabitEthernet8/0/0
exec set interface state ipip0 up
exec ip route add 20.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use TenGigabitEthernet8/0/0
exec set interface state ipip1 up
exec ip route add 20.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use TenGigabitEthernet8/0/0
exec set interface state ipip2 up
exec ip route add 20.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use TenGigabitEthernet8/0/0
exec set interface state ipip3 up
exec ip route add 20.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use TenGigabitEthernet8/0/0
exec set interface state ipip4 up
exec ip route add 20.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use TenGigabitEthernet8/0/0
exec set interface state ipip5 up
exec ip route add 20.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use TenGigabitEthernet8/0/0
exec set interface state ipip6 up
exec ip route add 20.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use TenGigabitEthernet8/0/0
exec set interface state ipip7 up
exec ip route add 20.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use TenGigabitEthernet8/0/0
exec set interface state ipip8 up
exec ip route add 20.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use TenGigabitEthernet8/0/0
exec set interface state ipip9 up
exec ip route add 20.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use TenGigabitEthernet8/0/0
exec set interface state ipip10 up
exec ip route add 20.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use TenGigabitEthernet8/0/0
exec set interface state ipip11 up
exec ip route add 20.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use TenGigabitEthernet8/0/0
exec set interface state ipip12 up
exec ip route add 20.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use TenGigabitEthernet8/0/0
exec set interface state ipip13 up
exec ip route add 20.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use TenGigabitEthernet8/0/0
exec set interface state ipip14 up
exec ip route add 20.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use TenGigabitEthernet8/0/0
exec set interface state ipip15 up
exec ip route add 20.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use TenGigabitEthernet8/0/0
exec set interface state ipip16 up
exec ip route add 20.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use TenGigabitEthernet8/0/0
exec set interface state ipip17 up
exec ip route add 20.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use TenGigabitEthernet8/0/0
exec set interface state ipip18 up
exec ip route add 20.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use TenGigabitEthernet8/0/0
exec set interface state ipip19 up
exec ip route add 20.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use TenGigabitEthernet8/0/0
exec set interface state ipip20 up
exec ip route add 20.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use TenGigabitEthernet8/0/0
exec set interface state ipip21 up
exec ip route add 20.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use TenGigabitEthernet8/0/0
exec set interface state ipip22 up
exec ip route add 20.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use TenGigabitEthernet8/0/0
exec set interface state ipip23 up
exec ip route add 20.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use TenGigabitEthernet8/0/0
exec set interface state ipip24 up
exec ip route add 20.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use TenGigabitEthernet8/0/0
exec set interface state ipip25 up
exec ip route add 20.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use TenGigabitEthernet8/0/0
exec set interface state ipip26 up
exec ip route add 20.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use TenGigabitEthernet8/0/0
exec set interface state ipip27 up
exec ip route add 20.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use TenGigabitEthernet8/0/0
exec set interface state ipip28 up
exec ip route add 20.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use TenGigabitEthernet8/0/0
exec set interface state ipip29 up
exec ip route add 20.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use TenGigabitEthernet8/0/0
exec set interface state ipip30 up
exec ip route add 20.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use TenGigabitEthernet8/0/0
exec set interface state ipip31 up
exec ip route add 20.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use TenGigabitEthernet8/0/0
exec set interface state ipip32 up
exec ip route add 20.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use TenGigabitEthernet8/0/0
exec set interface state ipip33 up
exec ip route add 20.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use TenGigabitEthernet8/0/0
exec set interface state ipip34 up
exec ip route add 20.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use TenGigabitEthernet8/0/0
exec set interface state ipip35 up
exec ip route add 20.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use TenGigabitEthernet8/0/0
exec set interface state ipip36 up
exec ip route add 20.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use TenGigabitEthernet8/0/0
exec set interface state ipip37 up
exec ip route add 20.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use TenGigabitEthernet8/0/0
exec set interface state ipip38 up
exec ip route add 20.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use TenGigabitEthernet8/0/0
exec set interface state ipip39 up
exec ip route add 20.0.0.39/32 via ipip39
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec set interface ip address TenGigabitEthernet8/0/0 200.0.0.102/24.0
exec create ipip tunnel src 200.0.0.102 dst 100.0.0.1 p2p
exec ipsec sa add 100000 spi 200000 crypto-alg aes-gcm-256 crypto-key 535344644a6a634d4a67756a724371655643704642494c706864734d4a4b6f68 esp
exec ipsec sa add 0 spi 100000 crypto-alg aes-gcm-256 crypto-key 535344644a6a634d4a67756a724371655643704642494c706864734d4a4b6f68 esp
exec ipsec tunnel protect ipip0 sa-out 100000 sa-in 0 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.1.1 p2p
exec ipsec sa add 100001 spi 200001 crypto-alg aes-gcm-256 crypto-key 4d646d554f704a497574734e58484c726c754a73446d456c515946717170644d esp
exec ipsec sa add 1 spi 100001 crypto-alg aes-gcm-256 crypto-key 4d646d554f704a497574734e58484c726c754a73446d456c515946717170644d esp
exec ipsec tunnel protect ipip1 sa-out 100001 sa-in 1 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.2.1 p2p
exec ipsec sa add 100002 spi 200002 crypto-alg aes-gcm-256 crypto-key 74755058474b774b476c4b6478504d596f564b46725843736259634252555754 esp
exec ipsec sa add 2 spi 100002 crypto-alg aes-gcm-256 crypto-key 74755058474b774b476c4b6478504d596f564b46725843736259634252555754 esp
exec ipsec tunnel protect ipip2 sa-out 100002 sa-in 2 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.3.1 p2p
exec ipsec sa add 100003 spi 200003 crypto-alg aes-gcm-256 crypto-key 616653546e4a5061726a476c645157636d776641417541776346755a5063796d esp
exec ipsec sa add 3 spi 100003 crypto-alg aes-gcm-256 crypto-key 616653546e4a5061726a476c645157636d776641417541776346755a5063796d esp
exec ipsec tunnel protect ipip3 sa-out 100003 sa-in 3 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.4.1 p2p
exec ipsec sa add 100004 spi 200004 crypto-alg aes-gcm-256 crypto-key 4c52795a66436568544c4c6246636353595146455273624250464a4a75656162 esp
exec ipsec sa add 4 spi 100004 crypto-alg aes-gcm-256 crypto-key 4c52795a66436568544c4c6246636353595146455273624250464a4a75656162 esp
exec ipsec tunnel protect ipip4 sa-out 100004 sa-in 4 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.5.1 p2p
exec ipsec sa add 100005 spi 200005 crypto-alg aes-gcm-256 crypto-key 51576971716541536371424a75724e426864547574574a494150645342795348 esp
exec ipsec sa add 5 spi 100005 crypto-alg aes-gcm-256 crypto-key 51576971716541536371424a75724e426864547574574a494150645342795348 esp
exec ipsec tunnel protect ipip5 sa-out 100005 sa-in 5 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.6.1 p2p
exec ipsec sa add 100006 spi 200006 crypto-alg aes-gcm-256 crypto-key 626f484e61524c6d4766654b4f6f54647a6c7262657464646276724f64786771 esp
exec ipsec sa add 6 spi 100006 crypto-alg aes-gcm-256 crypto-key 626f484e61524c6d4766654b4f6f54647a6c7262657464646276724f64786771 esp
exec ipsec tunnel protect ipip6 sa-out 100006 sa-in 6 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.7.1 p2p
exec ipsec sa add 100007 spi 200007 crypto-alg aes-gcm-256 crypto-key 4656794c6a694673615757654b435a68494f63676e4249497a6f4f7265675962 esp
exec ipsec sa add 7 spi 100007 crypto-alg aes-gcm-256 crypto-key 4656794c6a694673615757654b435a68494f63676e4249497a6f4f7265675962 esp
exec ipsec tunnel protect ipip7 sa-out 100007 sa-in 7 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.8.1 p2p
exec ipsec sa add 100008 spi 200008 crypto-alg aes-gcm-256 crypto-key 6e684e59687a6a5669794d6c4f774b4a636d52484f45555159787268534a5451 esp
exec ipsec sa add 8 spi 100008 crypto-alg aes-gcm-256 crypto-key 6e684e59687a6a5669794d6c4f774b4a636d52484f45555159787268534a5451 esp
exec ipsec tunnel protect ipip8 sa-out 100008 sa-in 8 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.9.1 p2p
exec ipsec sa add 100009 spi 200009 crypto-alg aes-gcm-256 crypto-key 6144654958467253554a464d4d597248485842584f714d524c6b50784c496d57 esp
exec ipsec sa add 9 spi 100009 crypto-alg aes-gcm-256 crypto-key 6144654958467253554a464d4d597248485842584f714d524c6b50784c496d57 esp
exec ipsec tunnel protect ipip9 sa-out 100009 sa-in 9 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.10.1 p2p
exec ipsec sa add 100010 spi 200010 crypto-alg aes-gcm-256 crypto-key 46584e4e705a4272546d564f514d4c7a4e4e5361777241734544776c43687478 esp
exec ipsec sa add 10 spi 100010 crypto-alg aes-gcm-256 crypto-key 46584e4e705a4272546d564f514d4c7a4e4e5361777241734544776c43687478 esp
exec ipsec tunnel protect ipip10 sa-out 100010 sa-in 10 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.11.1 p2p
exec ipsec sa add 100011 spi 200011 crypto-alg aes-gcm-256 crypto-key 674356504b46775258686771535a57684d7462786e416d5741466c4f4471694b esp
exec ipsec sa add 11 spi 100011 crypto-alg aes-gcm-256 crypto-key 674356504b46775258686771535a57684d7462786e416d5741466c4f4471694b esp
exec ipsec tunnel protect ipip11 sa-out 100011 sa-in 11 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.12.1 p2p
exec ipsec sa add 100012 spi 200012 crypto-alg aes-gcm-256 crypto-key 52677a4e6c696c53615365706a50636f6368636a656667554a4242425a776450 esp
exec ipsec sa add 12 spi 100012 crypto-alg aes-gcm-256 crypto-key 52677a4e6c696c53615365706a50636f6368636a656667554a4242425a776450 esp
exec ipsec tunnel protect ipip12 sa-out 100012 sa-in 12 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.13.1 p2p
exec ipsec sa add 100013 spi 200013 crypto-alg aes-gcm-256 crypto-key 625374725858746a694c52434c5644706e6843444257785656506168427a496a esp
exec ipsec sa add 13 spi 100013 crypto-alg aes-gcm-256 crypto-key 625374725858746a694c52434c5644706e6843444257785656506168427a496a esp
exec ipsec tunnel protect ipip13 sa-out 100013 sa-in 13 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.14.1 p2p
exec ipsec sa add 100014 spi 200014 crypto-alg aes-gcm-256 crypto-key 6749766d4e75465a536c6c6f6a484d6971484557714f7359774b72684b59764b esp
exec ipsec sa add 14 spi 100014 crypto-alg aes-gcm-256 crypto-key 6749766d4e75465a536c6c6f6a484d6971484557714f7359774b72684b59764b esp
exec ipsec tunnel protect ipip14 sa-out 100014 sa-in 14 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.15.1 p2p
exec ipsec sa add 100015 spi 200015 crypto-alg aes-gcm-256 crypto-key 57484c4f65424c427676774c626545424b71506a4750444f51764452756e7062 esp
exec ipsec sa add 15 spi 100015 crypto-alg aes-gcm-256 crypto-key 57484c4f65424c427676774c626545424b71506a4750444f51764452756e7062 esp
exec ipsec tunnel protect ipip15 sa-out 100015 sa-in 15 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.16.1 p2p
exec ipsec sa add 100016 spi 200016 crypto-alg aes-gcm-256 crypto-key 777144616a705364514a6966736c654c4d666a64436c6965796e6c4169554f44 esp
exec ipsec sa add 16 spi 100016 crypto-alg aes-gcm-256 crypto-key 777144616a705364514a6966736c654c4d666a64436c6965796e6c4169554f44 esp
exec ipsec tunnel protect ipip16 sa-out 100016 sa-in 16 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.17.1 p2p
exec ipsec sa add 100017 spi 200017 crypto-alg aes-gcm-256 crypto-key 646b684753544970435a5862524a41644d4e684457504e71576f7854514c6d62 esp
exec ipsec sa add 17 spi 100017 crypto-alg aes-gcm-256 crypto-key 646b684753544970435a5862524a41644d4e684457504e71576f7854514c6d62 esp
exec ipsec tunnel protect ipip17 sa-out 100017 sa-in 17 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.18.1 p2p
exec ipsec sa add 100018 spi 200018 crypto-alg aes-gcm-256 crypto-key 51494246566d4848436f446d72656d506348515a4c775243544a664174744442 esp
exec ipsec sa add 18 spi 100018 crypto-alg aes-gcm-256 crypto-key 51494246566d4848436f446d72656d506348515a4c775243544a664174744442 esp
exec ipsec tunnel protect ipip18 sa-out 100018 sa-in 18 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.19.1 p2p
exec ipsec sa add 100019 spi 200019 crypto-alg aes-gcm-256 crypto-key 46646c534c46616b6d6a53504b58664f7a5970544a7858597145517a716b7643 esp
exec ipsec sa add 19 spi 100019 crypto-alg aes-gcm-256 crypto-key 46646c534c46616b6d6a53504b58664f7a5970544a7858597145517a716b7643 esp
exec ipsec tunnel protect ipip19 sa-out 100019 sa-in 19 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.20.1 p2p
exec ipsec sa add 100020 spi 200020 crypto-alg aes-gcm-256 crypto-key 48674772756e4e54704f595556447a484d59686a4376514f4a746d5863414356 esp
exec ipsec sa add 20 spi 100020 crypto-alg aes-gcm-256 crypto-key 48674772756e4e54704f595556447a484d59686a4376514f4a746d5863414356 esp
exec ipsec tunnel protect ipip20 sa-out 100020 sa-in 20 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.21.1 p2p
exec ipsec sa add 100021 spi 200021 crypto-alg aes-gcm-256 crypto-key 704d544d4a756c536e52556b6845704c4953485353734a634a7a556873464561 esp
exec ipsec sa add 21 spi 100021 crypto-alg aes-gcm-256 crypto-key 704d544d4a756c536e52556b6845704c4953485353734a634a7a556873464561 esp
exec ipsec tunnel protect ipip21 sa-out 100021 sa-in 21 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.22.1 p2p
exec ipsec sa add 100022 spi 200022 crypto-alg aes-gcm-256 crypto-key 4a54565844497478556466587a7266465270514c6c45576f624668546e454259 esp
exec ipsec sa add 22 spi 100022 crypto-alg aes-gcm-256 crypto-key 4a54565844497478556466587a7266465270514c6c45576f624668546e454259 esp
exec ipsec tunnel protect ipip22 sa-out 100022 sa-in 22 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.23.1 p2p
exec ipsec sa add 100023 spi 200023 crypto-alg aes-gcm-256 crypto-key 5468476a706d43766642466d797847666b7751456848477558416e7a47654d65 esp
exec ipsec sa add 23 spi 100023 crypto-alg aes-gcm-256 crypto-key 5468476a706d43766642466d797847666b7751456848477558416e7a47654d65 esp
exec ipsec tunnel protect ipip23 sa-out 100023 sa-in 23 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.24.1 p2p
exec ipsec sa add 100024 spi 200024 crypto-alg aes-gcm-256 crypto-key 6442795576656f4b4b6b61584d45566f6a6e6c48564c4f744f55754e70704847 esp
exec ipsec sa add 24 spi 100024 crypto-alg aes-gcm-256 crypto-key 6442795576656f4b4b6b61584d45566f6a6e6c48564c4f744f55754e70704847 esp
exec ipsec tunnel protect ipip24 sa-out 100024 sa-in 24 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.25.1 p2p
exec ipsec sa add 100025 spi 200025 crypto-alg aes-gcm-256 crypto-key 566e4778524357494e584247564548436c725445684f5a55765a754c6654704a esp
exec ipsec sa add 25 spi 100025 crypto-alg aes-gcm-256 crypto-key 566e4778524357494e584247564548436c725445684f5a55765a754c6654704a esp
exec ipsec tunnel protect ipip25 sa-out 100025 sa-in 25 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.26.1 p2p
exec ipsec sa add 100026 spi 200026 crypto-alg aes-gcm-256 crypto-key 77554247716d47564457446c6b446a6a566b536666494944787a79717276566d esp
exec ipsec sa add 26 spi 100026 crypto-alg aes-gcm-256 crypto-key 77554247716d47564457446c6b446a6a566b536666494944787a79717276566d esp
exec ipsec tunnel protect ipip26 sa-out 100026 sa-in 26 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.27.1 p2p
exec ipsec sa add 100027 spi 200027 crypto-alg aes-gcm-256 crypto-key 4378465a546a457962775659456f4f476772646f544975435a706f566e66666c esp
exec ipsec sa add 27 spi 100027 crypto-alg aes-gcm-256 crypto-key 4378465a546a457962775659456f4f476772646f544975435a706f566e66666c esp
exec ipsec tunnel protect ipip27 sa-out 100027 sa-in 27 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.28.1 p2p
exec ipsec sa add 100028 spi 200028 crypto-alg aes-gcm-256 crypto-key 72477843626553476e656266746d7a6e454457467451664f6b634d68616d4b70 esp
exec ipsec sa add 28 spi 100028 crypto-alg aes-gcm-256 crypto-key 72477843626553476e656266746d7a6e454457467451664f6b634d68616d4b70 esp
exec ipsec tunnel protect ipip28 sa-out 100028 sa-in 28 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.29.1 p2p
exec ipsec sa add 100029 spi 200029 crypto-alg aes-gcm-256 crypto-key 6961547278746c53704a784e566962577a515743587779745664576679557064 esp
exec ipsec sa add 29 spi 100029 crypto-alg aes-gcm-256 crypto-key 6961547278746c53704a784e566962577a515743587779745664576679557064 esp
exec ipsec tunnel protect ipip29 sa-out 100029 sa-in 29 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.30.1 p2p
exec ipsec sa add 100030 spi 200030 crypto-alg aes-gcm-256 crypto-key 415044547253584378445756577665516571504a557176746f78674c74414b61 esp
exec ipsec sa add 30 spi 100030 crypto-alg aes-gcm-256 crypto-key 415044547253584378445756577665516571504a557176746f78674c74414b61 esp
exec ipsec tunnel protect ipip30 sa-out 100030 sa-in 30 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.31.1 p2p
exec ipsec sa add 100031 spi 200031 crypto-alg aes-gcm-256 crypto-key 46534946646b6e4369734f547869516c77735965775664747042576952715970 esp
exec ipsec sa add 31 spi 100031 crypto-alg aes-gcm-256 crypto-key 46534946646b6e4369734f547869516c77735965775664747042576952715970 esp
exec ipsec tunnel protect ipip31 sa-out 100031 sa-in 31 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.32.1 p2p
exec ipsec sa add 100032 spi 200032 crypto-alg aes-gcm-256 crypto-key 554a53504a756859666c49574e6f6e4645415576764a486670436f5046686361 esp
exec ipsec sa add 32 spi 100032 crypto-alg aes-gcm-256 crypto-key 554a53504a756859666c49574e6f6e4645415576764a486670436f5046686361 esp
exec ipsec tunnel protect ipip32 sa-out 100032 sa-in 32 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.33.1 p2p
exec ipsec sa add 100033 spi 200033 crypto-alg aes-gcm-256 crypto-key 4244464f774462505971735a734f696c7946554c654e664d66654e526e635876 esp
exec ipsec sa add 33 spi 100033 crypto-alg aes-gcm-256 crypto-key 4244464f774462505971735a734f696c7946554c654e664d66654e526e635876 esp
exec ipsec tunnel protect ipip33 sa-out 100033 sa-in 33 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.34.1 p2p
exec ipsec sa add 100034 spi 200034 crypto-alg aes-gcm-256 crypto-key 42467755766e7365455a7866764b465a7066484b5a5651777747465178456279 esp
exec ipsec sa add 34 spi 100034 crypto-alg aes-gcm-256 crypto-key 42467755766e7365455a7866764b465a7066484b5a5651777747465178456279 esp
exec ipsec tunnel protect ipip34 sa-out 100034 sa-in 34 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.35.1 p2p
exec ipsec sa add 100035 spi 200035 crypto-alg aes-gcm-256 crypto-key 4f6c616d59734e687363695546505a4b4e6c4250745244484665576d5153776c esp
exec ipsec sa add 35 spi 100035 crypto-alg aes-gcm-256 crypto-key 4f6c616d59734e687363695546505a4b4e6c4250745244484665576d5153776c esp
exec ipsec tunnel protect ipip35 sa-out 100035 sa-in 35 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.36.1 p2p
exec ipsec sa add 100036 spi 200036 crypto-alg aes-gcm-256 crypto-key 6f746e52514d5a46446e5041544a4c694f49535a4459426a4c45514b64546862 esp
exec ipsec sa add 36 spi 100036 crypto-alg aes-gcm-256 crypto-key 6f746e52514d5a46446e5041544a4c694f49535a4459426a4c45514b64546862 esp
exec ipsec tunnel protect ipip36 sa-out 100036 sa-in 36 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.37.1 p2p
exec ipsec sa add 100037 spi 200037 crypto-alg aes-gcm-256 crypto-key 6b6b4257434261614e56734b4c61656e594f5973574c7969494a524c4e5a4d51 esp
exec ipsec sa add 37 spi 100037 crypto-alg aes-gcm-256 crypto-key 6b6b4257434261614e56734b4c61656e594f5973574c7969494a524c4e5a4d51 esp
exec ipsec tunnel protect ipip37 sa-out 100037 sa-in 37 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.38.1 p2p
exec ipsec sa add 100038 spi 200038 crypto-alg aes-gcm-256 crypto-key 4278757546594d6859644848424d637864664651655876694f4c576e4b6d654a esp
exec ipsec sa add 38 spi 100038 crypto-alg aes-gcm-256 crypto-key 4278757546594d6859644848424d637864664651655876694f4c576e4b6d654a esp
exec ipsec tunnel protect ipip38 sa-out 100038 sa-in 38 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.39.1 p2p
exec ipsec sa add 100039 spi 200039 crypto-alg aes-gcm-256 crypto-key 7168656d764476774c6a6b5962694b55765866646d41555a5753496c4b4c7947 esp
exec ipsec sa add 39 spi 100039 crypto-alg aes-gcm-256 crypto-key 7168656d764476774c6a6b5962694b55765866646d41555a5753496c4b4c7947 esp
exec ipsec tunnel protect ipip39 sa-out 100039 sa-in 39 add
exec ip route add 100.0.0.1/8 via 200.0.0.101 TenGigabitEthernet8/0/0
exec set interface unnumbered ipip0 use TenGigabitEthernet8/0/0
exec set interface state ipip0 up
exec ip route add 10.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use TenGigabitEthernet8/0/0
exec set interface state ipip1 up
exec ip route add 10.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use TenGigabitEthernet8/0/0
exec set interface state ipip2 up
exec ip route add 10.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use TenGigabitEthernet8/0/0
exec set interface state ipip3 up
exec ip route add 10.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use TenGigabitEthernet8/0/0
exec set interface state ipip4 up
exec ip route add 10.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use TenGigabitEthernet8/0/0
exec set interface state ipip5 up
exec ip route add 10.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use TenGigabitEthernet8/0/0
exec set interface state ipip6 up
exec ip route add 10.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use TenGigabitEthernet8/0/0
exec set interface state ipip7 up
exec ip route add 10.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use TenGigabitEthernet8/0/0
exec set interface state ipip8 up
exec ip route add 10.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use TenGigabitEthernet8/0/0
exec set interface state ipip9 up
exec ip route add 10.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use TenGigabitEthernet8/0/0
exec set interface state ipip10 up
exec ip route add 10.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use TenGigabitEthernet8/0/0
exec set interface state ipip11 up
exec ip route add 10.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use TenGigabitEthernet8/0/0
exec set interface state ipip12 up
exec ip route add 10.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use TenGigabitEthernet8/0/0
exec set interface state ipip13 up
exec ip route add 10.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use TenGigabitEthernet8/0/0
exec set interface state ipip14 up
exec ip route add 10.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use TenGigabitEthernet8/0/0
exec set interface state ipip15 up
exec ip route add 10.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use TenGigabitEthernet8/0/0
exec set interface state ipip16 up
exec ip route add 10.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use TenGigabitEthernet8/0/0
exec set interface state ipip17 up
exec ip route add 10.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use TenGigabitEthernet8/0/0
exec set interface state ipip18 up
exec ip route add 10.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use TenGigabitEthernet8/0/0
exec set interface state ipip19 up
exec ip route add 10.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use TenGigabitEthernet8/0/0
exec set interface state ipip20 up
exec ip route add 10.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use TenGigabitEthernet8/0/0
exec set interface state ipip21 up
exec ip route add 10.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use TenGigabitEthernet8/0/0
exec set interface state ipip22 up
exec ip route add 10.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use TenGigabitEthernet8/0/0
exec set interface state ipip23 up
exec ip route add 10.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use TenGigabitEthernet8/0/0
exec set interface state ipip24 up
exec ip route add 10.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use TenGigabitEthernet8/0/0
exec set interface state ipip25 up
exec ip route add 10.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use TenGigabitEthernet8/0/0
exec set interface state ipip26 up
exec ip route add 10.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use TenGigabitEthernet8/0/0
exec set interface state ipip27 up
exec ip route add 10.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use TenGigabitEthernet8/0/0
exec set interface state ipip28 up
exec ip route add 10.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use TenGigabitEthernet8/0/0
exec set interface state ipip29 up
exec ip route add 10.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use TenGigabitEthernet8/0/0
exec set interface state ipip30 up
exec ip route add 10.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use TenGigabitEthernet8/0/0
exec set interface state ipip31 up
exec ip route add 10.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use TenGigabitEthernet8/0/0
exec set interface state ipip32 up
exec ip route add 10.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use TenGigabitEthernet8/0/0
exec set interface state ipip33 up
exec ip route add 10.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use TenGigabitEthernet8/0/0
exec set interface state ipip34 up
exec ip route add 10.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use TenGigabitEthernet8/0/0
exec set interface state ipip35 up
exec ip route add 10.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use TenGigabitEthernet8/0/0
exec set interface state ipip36 up
exec ip route add 10.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use TenGigabitEthernet8/0/0
exec set interface state ipip37 up
exec ip route add 10.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use TenGigabitEthernet8/0/0
exec set interface state ipip38 up
exec ip route add 10.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use TenGigabitEthernet8/0/0
exec set interface state ipip39 up
exec ip route add 10.0.0.39/32 via ipip39

10ge2p1x553-ethip4ipsec4tnlsw-ip4base-int-aes128cbc-hmac512sha-ndrpdr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular topology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG verification: TG finds and reports throughput NDR (Non Drop Rate) with zero packet loss tolerance and throughput PDR (Partial Drop Rate) with non-zero packet loss tolerance (LT) expressed in percentage of packets transmitted. NDR and PDR are discovered for different Ethernet L2 frame sizes using MLRsearch library.

Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to number of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG node interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 64b-4t4c-ethip4ipsec4tnlsw-ip4base- 
int-aes128cbc-hmac512sha-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00e’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 1, ‘flags’: 1, ‘mac_address’: ‘ac:1f:6b:57:57:fe’, ‘ip_address’: ‘200.0.0.102’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’uxriMvNqelXgHkWh’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’GJAQylTDXEfkJTVlWqcgFMQbrLMMwUvHmyfKISukvgyOSpEbzuhtVczPdbVUfiDz’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’uxriMvNqelXgHkWh’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’GJAQylTDXEfkJTVlWqcgFMQbrLMMwUvHmyfKISukvgyOSpEbzuhtVczPdbVUfiDz’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’VpqkXVMPNeNFivKS’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’RNiDuxygAuULCtuOWePsviAtdeLjlZNpQjsGIXUqFcYlwcLLtHGaVmHgbntCdwyS’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’VpqkXVMPNeNFivKS’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’RNiDuxygAuULCtuOWePsviAtdeLjlZNpQjsGIXUqFcYlwcLLtHGaVmHgbntCdwyS’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’dXoXzzEDaEGJdfoI’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’brwtOuXFWKNxNBGQKbKpulLFIkluiepSoufRsescOtvQGmsWaWmBCspmCsubRncJ’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’dXoXzzEDaEGJdfoI’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’brwtOuXFWKNxNBGQKbKpulLFIkluiepSoufRsescOtvQGmsWaWmBCspmCsubRncJ’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’nuXAKMRyUfiSVNqN’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’mLliPgnfoZLDeGgyeiwqitnnEjQWQSsKHhquNMGxHhyfVVHftktaQYKCSfVTuJHa’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’nuXAKMRyUfiSVNqN’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’mLliPgnfoZLDeGgyeiwqitnnEjQWQSsKHhquNMGxHhyfVVHftktaQYKCSfVTuJHa’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 1, ‘n_sa_in’: 1, ‘sa_in’: [100001]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 2, ‘n_sa_in’: 1, ‘sa_in’: [100002]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 7, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 3, ‘n_sa_in’: 1, ‘sa_in’: [100003]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=7)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
sw_interface_set_flags(sw_if_index=7,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 7, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’uxriMvNqelXgHkWh’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’GJAQylTDXEfkJTVlWqcgFMQbrLMMwUvHmyfKISukvgyOSpEbzuhtVczPdbVUfiDz’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’uxriMvNqelXgHkWh’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’GJAQylTDXEfkJTVlWqcgFMQbrLMMwUvHmyfKISukvgyOSpEbzuhtVczPdbVUfiDz’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’VpqkXVMPNeNFivKS’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’RNiDuxygAuULCtuOWePsviAtdeLjlZNpQjsGIXUqFcYlwcLLtHGaVmHgbntCdwyS’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’VpqkXVMPNeNFivKS’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’RNiDuxygAuULCtuOWePsviAtdeLjlZNpQjsGIXUqFcYlwcLLtHGaVmHgbntCdwyS’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’dXoXzzEDaEGJdfoI’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’brwtOuXFWKNxNBGQKbKpulLFIkluiepSoufRsescOtvQGmsWaWmBCspmCsubRncJ’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’dXoXzzEDaEGJdfoI’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’brwtOuXFWKNxNBGQKbKpulLFIkluiepSoufRsescOtvQGmsWaWmBCspmCsubRncJ’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’nuXAKMRyUfiSVNqN’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’mLliPgnfoZLDeGgyeiwqitnnEjQWQSsKHhquNMGxHhyfVVHftktaQYKCSfVTuJHa’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’nuXAKMRyUfiSVNqN’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’mLliPgnfoZLDeGgyeiwqitnnEjQWQSsKHhquNMGxHhyfVVHftktaQYKCSfVTuJHa’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-1t1c-ethip4ipsec4tnlsw-ip4base- 
int-aes128cbc-hmac512sha-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00e’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 1, ‘flags’: 1, ‘mac_address’: ‘ac:1f:6b:57:57:fe’, ‘ip_address’: ‘200.0.0.102’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’fequtQoqFIqloDIT’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’iujiJrZBcNkvzPGzZacJOSEOZFVwYzyyDWVMJOingCLOBScAnPXIpEdcUtRyxgMX’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’fequtQoqFIqloDIT’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’iujiJrZBcNkvzPGzZacJOSEOZFVwYzyyDWVMJOingCLOBScAnPXIpEdcUtRyxgMX’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’MSACrBahqgVzkvap’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’shdRfVDVufCHIkulooupBZaIHlhHpMSgifMlXZxpNMFHMTgkzDiJjujcUBduomeL’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’MSACrBahqgVzkvap’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’shdRfVDVufCHIkulooupBZaIHlhHpMSgifMlXZxpNMFHMTgkzDiJjujcUBduomeL’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’dGrHtubnZjdBkywF’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’nUaHvRmULfOzzcsImEsKMaxBeGMypODFeWJINxLvFpPlduxGRlKnZMojhpohDLuU’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’dGrHtubnZjdBkywF’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’nUaHvRmULfOzzcsImEsKMaxBeGMypODFeWJINxLvFpPlduxGRlKnZMojhpohDLuU’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’jfJgFDwOBtvGwwgm’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’HmBjnBRPiztgzbNBFFtCaCxkSXFYHvNSfWVeyVuUoRpAMeCVSVegDcgfOMSzRHTp’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’jfJgFDwOBtvGwwgm’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’HmBjnBRPiztgzbNBFFtCaCxkSXFYHvNSfWVeyVuUoRpAMeCVSVegDcgfOMSzRHTp’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 1, ‘n_sa_in’: 1, ‘sa_in’: [100001]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 2, ‘n_sa_in’: 1, ‘sa_in’: [100002]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 7, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 3, ‘n_sa_in’: 1, ‘sa_in’: [100003]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=7)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
sw_interface_set_flags(sw_if_index=7,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 7, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’fequtQoqFIqloDIT’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’iujiJrZBcNkvzPGzZacJOSEOZFVwYzyyDWVMJOingCLOBScAnPXIpEdcUtRyxgMX’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’fequtQoqFIqloDIT’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’iujiJrZBcNkvzPGzZacJOSEOZFVwYzyyDWVMJOingCLOBScAnPXIpEdcUtRyxgMX’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’MSACrBahqgVzkvap’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’shdRfVDVufCHIkulooupBZaIHlhHpMSgifMlXZxpNMFHMTgkzDiJjujcUBduomeL’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’MSACrBahqgVzkvap’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’shdRfVDVufCHIkulooupBZaIHlhHpMSgifMlXZxpNMFHMTgkzDiJjujcUBduomeL’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’dGrHtubnZjdBkywF’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’nUaHvRmULfOzzcsImEsKMaxBeGMypODFeWJINxLvFpPlduxGRlKnZMojhpohDLuU’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’dGrHtubnZjdBkywF’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’nUaHvRmULfOzzcsImEsKMaxBeGMypODFeWJINxLvFpPlduxGRlKnZMojhpohDLuU’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’jfJgFDwOBtvGwwgm’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’HmBjnBRPiztgzbNBFFtCaCxkSXFYHvNSfWVeyVuUoRpAMeCVSVegDcgfOMSzRHTp’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’jfJgFDwOBtvGwwgm’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’HmBjnBRPiztgzbNBFFtCaCxkSXFYHvNSfWVeyVuUoRpAMeCVSVegDcgfOMSzRHTp’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-2t2c-ethip4ipsec4tnlsw-ip4base- 
int-aes128cbc-hmac512sha-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00e’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 1, ‘flags’: 1, ‘mac_address’: ‘ac:1f:6b:57:57:fe’, ‘ip_address’: ‘200.0.0.102’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’XlTVfVTPYWVWbfKD’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’LFzEPckABtQugPODBxVCvuFdYDqcIKwLWMqTPFtvNELsSXdJVifkeCAFCuZabvQX’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’XlTVfVTPYWVWbfKD’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’LFzEPckABtQugPODBxVCvuFdYDqcIKwLWMqTPFtvNELsSXdJVifkeCAFCuZabvQX’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’AbVtSjXTfmZAadWE’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’wykekWNTIPhmPvJuTTIUTHJDHTfBiWdmyjbuUVGCigElhEGoTngsbMtCTDTUdDNw’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’AbVtSjXTfmZAadWE’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’wykekWNTIPhmPvJuTTIUTHJDHTfBiWdmyjbuUVGCigElhEGoTngsbMtCTDTUdDNw’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’vksaBSjIvMiuOtKR’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’JjICYXZRdvLUSQanEeLXsAMutyARzNHmGcaMBhnoXnaWjRQrXcCSMReexEvfXvxu’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’vksaBSjIvMiuOtKR’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’JjICYXZRdvLUSQanEeLXsAMutyARzNHmGcaMBhnoXnaWjRQrXcCSMReexEvfXvxu’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’IUEffwUHljZsPJli’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’qkwiQwuorsddYcXPCrHUgisJHlQCUXQbjLnprQmkBCTnYJSvFMkamdfoGUwImNwO’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’IUEffwUHljZsPJli’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’qkwiQwuorsddYcXPCrHUgisJHlQCUXQbjLnprQmkBCTnYJSvFMkamdfoGUwImNwO’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 1, ‘n_sa_in’: 1, ‘sa_in’: [100001]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 2, ‘n_sa_in’: 1, ‘sa_in’: [100002]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 7, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 3, ‘n_sa_in’: 1, ‘sa_in’: [100003]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=7)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
sw_interface_set_flags(sw_if_index=7,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 7, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’XlTVfVTPYWVWbfKD’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’LFzEPckABtQugPODBxVCvuFdYDqcIKwLWMqTPFtvNELsSXdJVifkeCAFCuZabvQX’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’XlTVfVTPYWVWbfKD’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’LFzEPckABtQugPODBxVCvuFdYDqcIKwLWMqTPFtvNELsSXdJVifkeCAFCuZabvQX’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’AbVtSjXTfmZAadWE’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’wykekWNTIPhmPvJuTTIUTHJDHTfBiWdmyjbuUVGCigElhEGoTngsbMtCTDTUdDNw’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’AbVtSjXTfmZAadWE’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’wykekWNTIPhmPvJuTTIUTHJDHTfBiWdmyjbuUVGCigElhEGoTngsbMtCTDTUdDNw’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’vksaBSjIvMiuOtKR’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’JjICYXZRdvLUSQanEeLXsAMutyARzNHmGcaMBhnoXnaWjRQrXcCSMReexEvfXvxu’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’vksaBSjIvMiuOtKR’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’JjICYXZRdvLUSQanEeLXsAMutyARzNHmGcaMBhnoXnaWjRQrXcCSMReexEvfXvxu’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’IUEffwUHljZsPJli’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’qkwiQwuorsddYcXPCrHUgisJHlQCUXQbjLnprQmkBCTnYJSvFMkamdfoGUwImNwO’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’IUEffwUHljZsPJli’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’qkwiQwuorsddYcXPCrHUgisJHlQCUXQbjLnprQmkBCTnYJSvFMkamdfoGUwImNwO’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-1t1c-ethip4ipsec4tnlsw-ip4base- 
int-aes128cbc-hmac512sha-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00e’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 1, ‘flags’: 1, ‘mac_address’: ‘ac:1f:6b:57:57:fe’, ‘ip_address’: ‘200.0.0.102’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’YossZqfHaAEISiSG’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’JeUsnEOjZjfvoBTjTucdtoKlgIubSdfabGxpopMlKcIbnYEKGlOvtEqipMFRErTQ’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’YossZqfHaAEISiSG’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’JeUsnEOjZjfvoBTjTucdtoKlgIubSdfabGxpopMlKcIbnYEKGlOvtEqipMFRErTQ’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’cDsDrWungCpNRhIM’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’tfHGkVqqAKROfVwvRCbVRztTdtiCUOFQiGRILXzxPbYGaNSoYyrDzRuIgHbztkCc’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’cDsDrWungCpNRhIM’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’tfHGkVqqAKROfVwvRCbVRztTdtiCUOFQiGRILXzxPbYGaNSoYyrDzRuIgHbztkCc’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’UdoklruJKpaPwiWT’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’RdxMwsRyDAkzOVAFmVyUiWSrbQllnLAUMIWwNGSWGKxhQRMKbymljtrRgUbRJRKY’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’UdoklruJKpaPwiWT’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’RdxMwsRyDAkzOVAFmVyUiWSrbQllnLAUMIWwNGSWGKxhQRMKbymljtrRgUbRJRKY’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’WzwMtraooBVGVNVj’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’uXEHPjXzpbblPYHGMIInYPETmJiTYRDfHAJmlSYEPhGCxrvzpUcGfbPYeimwTNYf’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’WzwMtraooBVGVNVj’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’uXEHPjXzpbblPYHGMIInYPETmJiTYRDfHAJmlSYEPhGCxrvzpUcGfbPYeimwTNYf’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 1, ‘n_sa_in’: 1, ‘sa_in’: [100001]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 2, ‘n_sa_in’: 1, ‘sa_in’: [100002]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 7, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 3, ‘n_sa_in’: 1, ‘sa_in’: [100003]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=7)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
sw_interface_set_flags(sw_if_index=7,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 7, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’YossZqfHaAEISiSG’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’JeUsnEOjZjfvoBTjTucdtoKlgIubSdfabGxpopMlKcIbnYEKGlOvtEqipMFRErTQ’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’YossZqfHaAEISiSG’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’JeUsnEOjZjfvoBTjTucdtoKlgIubSdfabGxpopMlKcIbnYEKGlOvtEqipMFRErTQ’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’cDsDrWungCpNRhIM’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’tfHGkVqqAKROfVwvRCbVRztTdtiCUOFQiGRILXzxPbYGaNSoYyrDzRuIgHbztkCc’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’cDsDrWungCpNRhIM’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’tfHGkVqqAKROfVwvRCbVRztTdtiCUOFQiGRILXzxPbYGaNSoYyrDzRuIgHbztkCc’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’UdoklruJKpaPwiWT’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’RdxMwsRyDAkzOVAFmVyUiWSrbQllnLAUMIWwNGSWGKxhQRMKbymljtrRgUbRJRKY’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’UdoklruJKpaPwiWT’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’RdxMwsRyDAkzOVAFmVyUiWSrbQllnLAUMIWwNGSWGKxhQRMKbymljtrRgUbRJRKY’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’WzwMtraooBVGVNVj’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’uXEHPjXzpbblPYHGMIInYPETmJiTYRDfHAJmlSYEPhGCxrvzpUcGfbPYeimwTNYf’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’WzwMtraooBVGVNVj’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’uXEHPjXzpbblPYHGMIInYPETmJiTYRDfHAJmlSYEPhGCxrvzpUcGfbPYeimwTNYf’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-2t2c-ethip4ipsec4tnlsw-ip4base- 
int-aes128cbc-hmac512sha-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00e’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 1, ‘flags’: 1, ‘mac_address’: ‘ac:1f:6b:57:57:fe’, ‘ip_address’: ‘200.0.0.102’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’fSWIJpoGzqCevYpV’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’GGjyrWpVtnRXpJAMoaghFoDrZlKgpfYUvscoYtNjUGyxqxdnNiJcIJqpQziIlsDe’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’fSWIJpoGzqCevYpV’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’GGjyrWpVtnRXpJAMoaghFoDrZlKgpfYUvscoYtNjUGyxqxdnNiJcIJqpQziIlsDe’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’syudHlmdfiZhkYsx’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’XzKxPLpinxfQQoOcMMHFysTYxzotHitdGeuSyRVILzjGEheYqNMejeTlMySWYBHx’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’syudHlmdfiZhkYsx’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’XzKxPLpinxfQQoOcMMHFysTYxzotHitdGeuSyRVILzjGEheYqNMejeTlMySWYBHx’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’eejjrzgzmNcbNOZJ’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’hXWUgWmsIIPXfElFOhMoEAriuMEezAlfKenEMjHiuTgVSlYUasDotAtGrlQvSnDq’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’eejjrzgzmNcbNOZJ’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’hXWUgWmsIIPXfElFOhMoEAriuMEezAlfKenEMjHiuTgVSlYUasDotAtGrlQvSnDq’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’oDFMYhYWntBkTgnM’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’RVtfJfisrpdKpOaocRSbWctOGdQcNsfhHWAPxUKaIGsrnpBgYTNaeXmiJKgnFaSh’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’oDFMYhYWntBkTgnM’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’RVtfJfisrpdKpOaocRSbWctOGdQcNsfhHWAPxUKaIGsrnpBgYTNaeXmiJKgnFaSh’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 1, ‘n_sa_in’: 1, ‘sa_in’: [100001]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 2, ‘n_sa_in’: 1, ‘sa_in’: [100002]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 7, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 3, ‘n_sa_in’: 1, ‘sa_in’: [100003]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=7)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
sw_interface_set_flags(sw_if_index=7,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 7, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’fSWIJpoGzqCevYpV’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’GGjyrWpVtnRXpJAMoaghFoDrZlKgpfYUvscoYtNjUGyxqxdnNiJcIJqpQziIlsDe’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’fSWIJpoGzqCevYpV’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’GGjyrWpVtnRXpJAMoaghFoDrZlKgpfYUvscoYtNjUGyxqxdnNiJcIJqpQziIlsDe’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’syudHlmdfiZhkYsx’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’XzKxPLpinxfQQoOcMMHFysTYxzotHitdGeuSyRVILzjGEheYqNMejeTlMySWYBHx’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’syudHlmdfiZhkYsx’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’XzKxPLpinxfQQoOcMMHFysTYxzotHitdGeuSyRVILzjGEheYqNMejeTlMySWYBHx’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’eejjrzgzmNcbNOZJ’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’hXWUgWmsIIPXfElFOhMoEAriuMEezAlfKenEMjHiuTgVSlYUasDotAtGrlQvSnDq’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’eejjrzgzmNcbNOZJ’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’hXWUgWmsIIPXfElFOhMoEAriuMEezAlfKenEMjHiuTgVSlYUasDotAtGrlQvSnDq’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’oDFMYhYWntBkTgnM’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’RVtfJfisrpdKpOaocRSbWctOGdQcNsfhHWAPxUKaIGsrnpBgYTNaeXmiJKgnFaSh’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’oDFMYhYWntBkTgnM’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’RVtfJfisrpdKpOaocRSbWctOGdQcNsfhHWAPxUKaIGsrnpBgYTNaeXmiJKgnFaSh’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-4t4c-ethip4ipsec4tnlsw-ip4base- 
int-aes128cbc-hmac512sha-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00e’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 1, ‘flags’: 1, ‘mac_address’: ‘ac:1f:6b:57:57:fe’, ‘ip_address’: ‘200.0.0.102’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’jRtXpUESGZrgKpVY’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’acdTSjBzIZoUjrKgBBeBKcTGfQOIWnKwKzXVBXRmeLTdLEdKIkVXpMvjoCjpFhdn’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’jRtXpUESGZrgKpVY’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’acdTSjBzIZoUjrKgBBeBKcTGfQOIWnKwKzXVBXRmeLTdLEdKIkVXpMvjoCjpFhdn’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’AyfgdWKHKGabQfuE’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’YHbPOtIvimtqHaTXbfAnjOvkaLaBEWvbzYNBfjbHbVqHvWhfkzquFYhInFxbTjaH’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’AyfgdWKHKGabQfuE’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’YHbPOtIvimtqHaTXbfAnjOvkaLaBEWvbzYNBfjbHbVqHvWhfkzquFYhInFxbTjaH’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’txZJPTdlfVheNwUV’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’pnHrOceSrywBgyDnDJyfdyFsatwslMnhfldaaOveKtHfiGIDwlrUYGgghobNqQOx’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’txZJPTdlfVheNwUV’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’pnHrOceSrywBgyDnDJyfdyFsatwslMnhfldaaOveKtHfiGIDwlrUYGgghobNqQOx’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’YKeIgKBQFYZDGCZz’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’XxbWFHmiGzjubhbZfqBxCJqExqWBcWDFZPVvRegDucefbZbzokuqPJkmtGmLyOwQ’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’YKeIgKBQFYZDGCZz’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’XxbWFHmiGzjubhbZfqBxCJqExqWBcWDFZPVvRegDucefbZbzokuqPJkmtGmLyOwQ’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 1, ‘n_sa_in’: 1, ‘sa_in’: [100001]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 2, ‘n_sa_in’: 1, ‘sa_in’: [100002]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 7, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 3, ‘n_sa_in’: 1, ‘sa_in’: [100003]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=7)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
sw_interface_set_flags(sw_if_index=7,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 7, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’jRtXpUESGZrgKpVY’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’acdTSjBzIZoUjrKgBBeBKcTGfQOIWnKwKzXVBXRmeLTdLEdKIkVXpMvjoCjpFhdn’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’jRtXpUESGZrgKpVY’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’acdTSjBzIZoUjrKgBBeBKcTGfQOIWnKwKzXVBXRmeLTdLEdKIkVXpMvjoCjpFhdn’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’AyfgdWKHKGabQfuE’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’YHbPOtIvimtqHaTXbfAnjOvkaLaBEWvbzYNBfjbHbVqHvWhfkzquFYhInFxbTjaH’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’AyfgdWKHKGabQfuE’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’YHbPOtIvimtqHaTXbfAnjOvkaLaBEWvbzYNBfjbHbVqHvWhfkzquFYhInFxbTjaH’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’txZJPTdlfVheNwUV’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’pnHrOceSrywBgyDnDJyfdyFsatwslMnhfldaaOveKtHfiGIDwlrUYGgghobNqQOx’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’txZJPTdlfVheNwUV’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’pnHrOceSrywBgyDnDJyfdyFsatwslMnhfldaaOveKtHfiGIDwlrUYGgghobNqQOx’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’YKeIgKBQFYZDGCZz’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’XxbWFHmiGzjubhbZfqBxCJqExqWBcWDFZPVvRegDucefbZbzokuqPJkmtGmLyOwQ’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’YKeIgKBQFYZDGCZz’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’XxbWFHmiGzjubhbZfqBxCJqExqWBcWDFZPVvRegDucefbZbzokuqPJkmtGmLyOwQ’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

10ge2p1x553-ethip4ipsec4tnlsw-ip4base-int-aes128gcm-ndrpdr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular topology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG verification: TG finds and reports throughput NDR (Non Drop Rate) with zero packet loss tolerance and throughput PDR (Partial Drop Rate) with non-zero packet loss tolerance (LT) expressed in percentage of packets transmitted. NDR and PDR are discovered for different Ethernet L2 frame sizes using MLRsearch library.

Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to number of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG node interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 1518b-2t2c-ethip4ipsec4tnlsw- 
ip4base-int-aes128gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00e’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 1, ‘flags’: 1, ‘mac_address’: ‘ac:1f:6b:57:57:fe’, ‘ip_address’: ‘200.0.0.102’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’JiTcbirRIoDPmldJ’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’JiTcbirRIoDPmldJ’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’EvlIDCwKOtORAQIn’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’EvlIDCwKOtORAQIn’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’FzlRsAprhbxeqPHY’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’FzlRsAprhbxeqPHY’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’pgVATyTuYODQcZWh’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’pgVATyTuYODQcZWh’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 1, ‘n_sa_in’: 1, ‘sa_in’: [100001]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 2, ‘n_sa_in’: 1, ‘sa_in’: [100002]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 7, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 3, ‘n_sa_in’: 1, ‘sa_in’: [100003]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=7)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
sw_interface_set_flags(sw_if_index=7,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 7, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’JiTcbirRIoDPmldJ’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’JiTcbirRIoDPmldJ’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’EvlIDCwKOtORAQIn’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’EvlIDCwKOtORAQIn’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’FzlRsAprhbxeqPHY’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’FzlRsAprhbxeqPHY’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’pgVATyTuYODQcZWh’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’pgVATyTuYODQcZWh’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-1t1c-ethip4ipsec4tnlsw- 
ip4base-int-aes128gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00e’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 1, ‘flags’: 1, ‘mac_address’: ‘ac:1f:6b:57:57:fe’, ‘ip_address’: ‘200.0.0.102’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’LVtgIlPDVgvIZlcz’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’LVtgIlPDVgvIZlcz’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’aoYnxeciuCcdknhL’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’aoYnxeciuCcdknhL’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’snDOjgTUbbISfaYO’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’snDOjgTUbbISfaYO’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’vCvqwkSgBcUwepWc’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’vCvqwkSgBcUwepWc’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 1, ‘n_sa_in’: 1, ‘sa_in’: [100001]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 2, ‘n_sa_in’: 1, ‘sa_in’: [100002]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 7, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 3, ‘n_sa_in’: 1, ‘sa_in’: [100003]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=7)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
sw_interface_set_flags(sw_if_index=7,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 7, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’LVtgIlPDVgvIZlcz’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’LVtgIlPDVgvIZlcz’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’aoYnxeciuCcdknhL’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’aoYnxeciuCcdknhL’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’snDOjgTUbbISfaYO’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’snDOjgTUbbISfaYO’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’vCvqwkSgBcUwepWc’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’vCvqwkSgBcUwepWc’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

10ge2p1x553-ethip4ipsec4tnlsw-ip4base-int-aes256gcm-ndrpdr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular topology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG verification: TG finds and reports throughput NDR (Non Drop Rate) with zero packet loss tolerance and throughput PDR (Partial Drop Rate) with non-zero packet loss tolerance (LT) expressed in percentage of packets transmitted. NDR and PDR are discovered for different Ethernet L2 frame sizes using MLRsearch library.

Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to number of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG node interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 64b-2t2c-ethip4ipsec4tnlsw- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00e’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 1, ‘flags’: 1, ‘mac_address’: ‘ac:1f:6b:57:57:fe’, ‘ip_address’: ‘200.0.0.102’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’ekckkLmyFRZaQloCORRwdASsiiqDQhfA’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’ekckkLmyFRZaQloCORRwdASsiiqDQhfA’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’FYEypwktBcMhfIjPOvMJKWMPASkuIJRt’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’FYEypwktBcMhfIjPOvMJKWMPASkuIJRt’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’cRWABcTobgIRjsHLDNpVWzaKDqunFfTj’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’cRWABcTobgIRjsHLDNpVWzaKDqunFfTj’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’naixKUAWJTofLdFTJTtCHfdBxyKeXIaz’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’naixKUAWJTofLdFTJTtCHfdBxyKeXIaz’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 1, ‘n_sa_in’: 1, ‘sa_in’: [100001]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 2, ‘n_sa_in’: 1, ‘sa_in’: [100002]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 7, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 3, ‘n_sa_in’: 1, ‘sa_in’: [100003]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=7)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
sw_interface_set_flags(sw_if_index=7,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 7, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’ekckkLmyFRZaQloCORRwdASsiiqDQhfA’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’ekckkLmyFRZaQloCORRwdASsiiqDQhfA’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’FYEypwktBcMhfIjPOvMJKWMPASkuIJRt’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’FYEypwktBcMhfIjPOvMJKWMPASkuIJRt’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’cRWABcTobgIRjsHLDNpVWzaKDqunFfTj’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’cRWABcTobgIRjsHLDNpVWzaKDqunFfTj’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’naixKUAWJTofLdFTJTtCHfdBxyKeXIaz’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’naixKUAWJTofLdFTJTtCHfdBxyKeXIaz’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 64b-4t4c-ethip4ipsec4tnlsw- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00e’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 1, ‘flags’: 1, ‘mac_address’: ‘ac:1f:6b:57:57:fe’, ‘ip_address’: ‘200.0.0.102’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’iJsZXovSSeOZBtWfjRJFbmUrhXGIsieM’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’iJsZXovSSeOZBtWfjRJFbmUrhXGIsieM’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’wtabuRZkvYHbUYAnSaSwqfhGClYJpXsb’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’wtabuRZkvYHbUYAnSaSwqfhGClYJpXsb’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’GmsWPEjnfiJwDunosXMyQkYAPyaONDen’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’GmsWPEjnfiJwDunosXMyQkYAPyaONDen’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’ZFBfBAqODHXtlZeegMElzXzkEwvcGzCs’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’ZFBfBAqODHXtlZeegMElzXzkEwvcGzCs’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 1, ‘n_sa_in’: 1, ‘sa_in’: [100001]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 2, ‘n_sa_in’: 1, ‘sa_in’: [100002]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 7, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 3, ‘n_sa_in’: 1, ‘sa_in’: [100003]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=7)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
sw_interface_set_flags(sw_if_index=7,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 7, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’iJsZXovSSeOZBtWfjRJFbmUrhXGIsieM’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’iJsZXovSSeOZBtWfjRJFbmUrhXGIsieM’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’wtabuRZkvYHbUYAnSaSwqfhGClYJpXsb’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’wtabuRZkvYHbUYAnSaSwqfhGClYJpXsb’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’GmsWPEjnfiJwDunosXMyQkYAPyaONDen’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’GmsWPEjnfiJwDunosXMyQkYAPyaONDen’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’ZFBfBAqODHXtlZeegMElzXzkEwvcGzCs’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’ZFBfBAqODHXtlZeegMElzXzkEwvcGzCs’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-1t1c-ethip4ipsec4tnlsw- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00e’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 1, ‘flags’: 1, ‘mac_address’: ‘ac:1f:6b:57:57:fe’, ‘ip_address’: ‘200.0.0.102’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’JiPgXBdHmHuOqyyAivQkpsaiEcPDcfUJ’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’JiPgXBdHmHuOqyyAivQkpsaiEcPDcfUJ’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’JxiwIebWDFGWgBjBjEWLiABUxLQwQosv’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’JxiwIebWDFGWgBjBjEWLiABUxLQwQosv’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’vWnSwjxAotogrhPOtbohenfENoeMXwqo’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’vWnSwjxAotogrhPOtbohenfENoeMXwqo’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’mYekHUfjDwYtphoBoqOysGiFBWuVlqrz’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’mYekHUfjDwYtphoBoqOysGiFBWuVlqrz’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 1, ‘n_sa_in’: 1, ‘sa_in’: [100001]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 2, ‘n_sa_in’: 1, ‘sa_in’: [100002]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 7, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 3, ‘n_sa_in’: 1, ‘sa_in’: [100003]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=7)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
sw_interface_set_flags(sw_if_index=7,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 7, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’JiPgXBdHmHuOqyyAivQkpsaiEcPDcfUJ’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’JiPgXBdHmHuOqyyAivQkpsaiEcPDcfUJ’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’JxiwIebWDFGWgBjBjEWLiABUxLQwQosv’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’JxiwIebWDFGWgBjBjEWLiABUxLQwQosv’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’vWnSwjxAotogrhPOtbohenfENoeMXwqo’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’vWnSwjxAotogrhPOtbohenfENoeMXwqo’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’mYekHUfjDwYtphoBoqOysGiFBWuVlqrz’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’mYekHUfjDwYtphoBoqOysGiFBWuVlqrz’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-2t2c-ethip4ipsec4tnlsw- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00e’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 1, ‘flags’: 1, ‘mac_address’: ‘ac:1f:6b:57:57:fe’, ‘ip_address’: ‘200.0.0.102’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’KGcnNEUNyMelFAYjnHhFoIlyaravfVyo’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’KGcnNEUNyMelFAYjnHhFoIlyaravfVyo’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’ecCQEHIlmDqZHsLYxoMRnTscKTYXKPTW’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’ecCQEHIlmDqZHsLYxoMRnTscKTYXKPTW’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’frSMMootlpEVKLauTGhkwgxKjLbOQRrS’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’frSMMootlpEVKLauTGhkwgxKjLbOQRrS’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’ZEbYLGfPrzLIMsUDwPFtbKWjGElvqmxd’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’ZEbYLGfPrzLIMsUDwPFtbKWjGElvqmxd’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 1, ‘n_sa_in’: 1, ‘sa_in’: [100001]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 2, ‘n_sa_in’: 1, ‘sa_in’: [100002]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 7, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 3, ‘n_sa_in’: 1, ‘sa_in’: [100003]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=7)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
sw_interface_set_flags(sw_if_index=7,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 7, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’KGcnNEUNyMelFAYjnHhFoIlyaravfVyo’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’KGcnNEUNyMelFAYjnHhFoIlyaravfVyo’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’ecCQEHIlmDqZHsLYxoMRnTscKTYXKPTW’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’ecCQEHIlmDqZHsLYxoMRnTscKTYXKPTW’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’frSMMootlpEVKLauTGhkwgxKjLbOQRrS’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’frSMMootlpEVKLauTGhkwgxKjLbOQRrS’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’ZEbYLGfPrzLIMsUDwPFtbKWjGElvqmxd’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’ZEbYLGfPrzLIMsUDwPFtbKWjGElvqmxd’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-2t2c-ethip4ipsec4tnlsw- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00e’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 1, ‘flags’: 1, ‘mac_address’: ‘ac:1f:6b:57:57:fe’, ‘ip_address’: ‘200.0.0.102’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’UAYCXwawYosuvVadaMbrWZpWdfgIqufZ’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’UAYCXwawYosuvVadaMbrWZpWdfgIqufZ’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’VdAJZAZeUfaTAKmkmGHtkbfWMTNkJdAp’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’VdAJZAZeUfaTAKmkmGHtkbfWMTNkJdAp’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’gXtiUrdAuWfElHShEhwPQKKYMQbyeiqO’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’gXtiUrdAuWfElHShEhwPQKKYMQbyeiqO’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’BWVdZSVJxXJZMZlMvJRPsoCvlZNUvyky’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’BWVdZSVJxXJZMZlMvJRPsoCvlZNUvyky’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 1, ‘n_sa_in’: 1, ‘sa_in’: [100001]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 2, ‘n_sa_in’: 1, ‘sa_in’: [100002]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 7, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 3, ‘n_sa_in’: 1, ‘sa_in’: [100003]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=7)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
sw_interface_set_flags(sw_if_index=7,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 7, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’UAYCXwawYosuvVadaMbrWZpWdfgIqufZ’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’UAYCXwawYosuvVadaMbrWZpWdfgIqufZ’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’VdAJZAZeUfaTAKmkmGHtkbfWMTNkJdAp’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’VdAJZAZeUfaTAKmkmGHtkbfWMTNkJdAp’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’gXtiUrdAuWfElHShEhwPQKKYMQbyeiqO’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’gXtiUrdAuWfElHShEhwPQKKYMQbyeiqO’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’BWVdZSVJxXJZMZlMvJRPsoCvlZNUvyky’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’BWVdZSVJxXJZMZlMvJRPsoCvlZNUvyky’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

10ge2p1x553-ethip4ipsec4tnlswasync-scheduler-ip4base-int-aes128cbc-hmac512sha-ndrpdr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular topology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them, run with IPsec async mode and use crypto sw scheduler engine to schedule crypto work to crypto cores. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG verification: TG finds and reports throughput NDR (Non Drop Rate) with zero packet loss tolerance and throughput PDR (Partial Drop Rate) with non-zero packet loss tolerance (LT) expressed in percentage of packets transmitted. NDR and PDR are discovered for different Ethernet L2 frame sizes using MLRsearch library.

Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to number of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG node interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 64b-1t2c-ethip4ipsec4tnlswasync-scheduler- 
ip4base-int-aes128cbc-hmac512sha-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00e’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 1, ‘flags’: 1, ‘mac_address’: ‘ac:1f:6b:57:57:fe’, ‘ip_address’: ‘200.0.0.102’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’svOuhcWeGgitUvbm’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’PuXdwCTNMVmWSOQhgtYvjUtVSBrybtThwvUvLZSKdgsMMJKspdmxAOeTUijNNLxM’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’svOuhcWeGgitUvbm’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’PuXdwCTNMVmWSOQhgtYvjUtVSBrybtThwvUvLZSKdgsMMJKspdmxAOeTUijNNLxM’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’nPWRhHIaRISwhjWG’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’FMdkMVgNcSplyffAQdZZZdAmPfERWscQQdojNNEUZeNmlgWJbLzytcUybrmMlxho’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’nPWRhHIaRISwhjWG’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’FMdkMVgNcSplyffAQdZZZdAmPfERWscQQdojNNEUZeNmlgWJbLzytcUybrmMlxho’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’oOZqlhhbTNOFMkQh’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’yJIvKvODfFvChLuRlkjeoHaKQrkGyrXNTpkHQTwLrLbXYcdYeanBYdxSpamuQbLi’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’oOZqlhhbTNOFMkQh’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’yJIvKvODfFvChLuRlkjeoHaKQrkGyrXNTpkHQTwLrLbXYcdYeanBYdxSpamuQbLi’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’SdDoJJdHJCPOTXmF’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’NUSUYYhEvwSFZbgorOPopcfPsFELQNurZORMoDpQVbbeMJQMGvnFLIxyzwdrqmXQ’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’SdDoJJdHJCPOTXmF’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’NUSUYYhEvwSFZbgorOPopcfPsFELQNurZORMoDpQVbbeMJQMGvnFLIxyzwdrqmXQ’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 1, ‘n_sa_in’: 1, ‘sa_in’: [100001]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 2, ‘n_sa_in’: 1, ‘sa_in’: [100002]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 7, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 3, ‘n_sa_in’: 1, ‘sa_in’: [100003]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=7)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
sw_interface_set_flags(sw_if_index=7,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 7, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’svOuhcWeGgitUvbm’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’PuXdwCTNMVmWSOQhgtYvjUtVSBrybtThwvUvLZSKdgsMMJKspdmxAOeTUijNNLxM’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’svOuhcWeGgitUvbm’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’PuXdwCTNMVmWSOQhgtYvjUtVSBrybtThwvUvLZSKdgsMMJKspdmxAOeTUijNNLxM’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’nPWRhHIaRISwhjWG’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’FMdkMVgNcSplyffAQdZZZdAmPfERWscQQdojNNEUZeNmlgWJbLzytcUybrmMlxho’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’nPWRhHIaRISwhjWG’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’FMdkMVgNcSplyffAQdZZZdAmPfERWscQQdojNNEUZeNmlgWJbLzytcUybrmMlxho’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’oOZqlhhbTNOFMkQh’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’yJIvKvODfFvChLuRlkjeoHaKQrkGyrXNTpkHQTwLrLbXYcdYeanBYdxSpamuQbLi’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’oOZqlhhbTNOFMkQh’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’yJIvKvODfFvChLuRlkjeoHaKQrkGyrXNTpkHQTwLrLbXYcdYeanBYdxSpamuQbLi’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’SdDoJJdHJCPOTXmF’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’NUSUYYhEvwSFZbgorOPopcfPsFELQNurZORMoDpQVbbeMJQMGvnFLIxyzwdrqmXQ’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’SdDoJJdHJCPOTXmF’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’NUSUYYhEvwSFZbgorOPopcfPsFELQNurZORMoDpQVbbeMJQMGvnFLIxyzwdrqmXQ’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-1t2c-ethip4ipsec4tnlswasync-scheduler- 
ip4base-int-aes128cbc-hmac512sha-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00e’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 1, ‘flags’: 1, ‘mac_address’: ‘ac:1f:6b:57:57:fe’, ‘ip_address’: ‘200.0.0.102’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’EzjfatWHLMgCjAHN’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’mlyqAYVSEuHiyMrRhKDRQJkJFLZTbPFGhjWrisUThZFdcaKzwWutkLLtfXcSsWpy’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’EzjfatWHLMgCjAHN’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’mlyqAYVSEuHiyMrRhKDRQJkJFLZTbPFGhjWrisUThZFdcaKzwWutkLLtfXcSsWpy’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’AVyVzZioZylOsPpV’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’EokbsXRsKXKciEMSIOTLeblhDJDkFtbzeHDpvssHWvAVWzffDULGXKUVcVyDeUsD’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’AVyVzZioZylOsPpV’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’EokbsXRsKXKciEMSIOTLeblhDJDkFtbzeHDpvssHWvAVWzffDULGXKUVcVyDeUsD’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’LHBSZZAQpVIGIcFQ’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’hapQIkphoFoVcJzQBwkkbbVsLxZQhiQvlXXzbeCkZkocNgKNeOvSxELWsKSIasCN’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’LHBSZZAQpVIGIcFQ’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’hapQIkphoFoVcJzQBwkkbbVsLxZQhiQvlXXzbeCkZkocNgKNeOvSxELWsKSIasCN’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’XlMehJsPyPdSRrLb’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’GCxmIkzzAfWQVGkLOWCBfhByyxadRZuEECPbGHEHgejpBglglbnHTZZBSMPEILwa’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’XlMehJsPyPdSRrLb’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’GCxmIkzzAfWQVGkLOWCBfhByyxadRZuEECPbGHEHgejpBglglbnHTZZBSMPEILwa’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 1, ‘n_sa_in’: 1, ‘sa_in’: [100001]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 2, ‘n_sa_in’: 1, ‘sa_in’: [100002]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 7, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 3, ‘n_sa_in’: 1, ‘sa_in’: [100003]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=7)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
sw_interface_set_flags(sw_if_index=7,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 7, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’EzjfatWHLMgCjAHN’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’mlyqAYVSEuHiyMrRhKDRQJkJFLZTbPFGhjWrisUThZFdcaKzwWutkLLtfXcSsWpy’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’EzjfatWHLMgCjAHN’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’mlyqAYVSEuHiyMrRhKDRQJkJFLZTbPFGhjWrisUThZFdcaKzwWutkLLtfXcSsWpy’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’AVyVzZioZylOsPpV’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’EokbsXRsKXKciEMSIOTLeblhDJDkFtbzeHDpvssHWvAVWzffDULGXKUVcVyDeUsD’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’AVyVzZioZylOsPpV’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’EokbsXRsKXKciEMSIOTLeblhDJDkFtbzeHDpvssHWvAVWzffDULGXKUVcVyDeUsD’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’LHBSZZAQpVIGIcFQ’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’hapQIkphoFoVcJzQBwkkbbVsLxZQhiQvlXXzbeCkZkocNgKNeOvSxELWsKSIasCN’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’LHBSZZAQpVIGIcFQ’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’hapQIkphoFoVcJzQBwkkbbVsLxZQhiQvlXXzbeCkZkocNgKNeOvSxELWsKSIasCN’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’XlMehJsPyPdSRrLb’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’GCxmIkzzAfWQVGkLOWCBfhByyxadRZuEECPbGHEHgejpBglglbnHTZZBSMPEILwa’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’XlMehJsPyPdSRrLb’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’GCxmIkzzAfWQVGkLOWCBfhByyxadRZuEECPbGHEHgejpBglglbnHTZZBSMPEILwa’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-1t4c-ethip4ipsec4tnlswasync-scheduler- 
ip4base-int-aes128cbc-hmac512sha-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00e’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 1, ‘flags’: 1, ‘mac_address’: ‘ac:1f:6b:57:57:fe’, ‘ip_address’: ‘200.0.0.102’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’EWiCmpZEHAvaoBEf’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’etlKLIEDFCLHvyvJqcDWLMjOKdWQJMQjmFNjlQrtFMenqctPzKnQKGimHMzdWYvs’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’EWiCmpZEHAvaoBEf’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’etlKLIEDFCLHvyvJqcDWLMjOKdWQJMQjmFNjlQrtFMenqctPzKnQKGimHMzdWYvs’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’HgzFrCxQZVXVImAj’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’nPoiksMsFVXONpEIXnauIYPxqKdZolCIfQRAmOiwrgXQfeLmqOOAhRJKpTvbLjLq’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’HgzFrCxQZVXVImAj’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’nPoiksMsFVXONpEIXnauIYPxqKdZolCIfQRAmOiwrgXQfeLmqOOAhRJKpTvbLjLq’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’sdBdKInyptmIhRJJ’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’BvOlkligljbNGCCCfUHLISLRDauuLEVhcApCLJIxRMKnOcQEwPPiFBsaqDiFnJuh’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’sdBdKInyptmIhRJJ’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’BvOlkligljbNGCCCfUHLISLRDauuLEVhcApCLJIxRMKnOcQEwPPiFBsaqDiFnJuh’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’bFWYHqXXfiuyXGak’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’BMxxVyorJlEdIYJTdkRKEuyiJzLgeJZardwdcwInARHpHFZrxcVDxthfeBGPzAUK’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’bFWYHqXXfiuyXGak’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’BMxxVyorJlEdIYJTdkRKEuyiJzLgeJZardwdcwInARHpHFZrxcVDxthfeBGPzAUK’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 1, ‘n_sa_in’: 1, ‘sa_in’: [100001]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 2, ‘n_sa_in’: 1, ‘sa_in’: [100002]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 7, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 3, ‘n_sa_in’: 1, ‘sa_in’: [100003]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=7)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
sw_interface_set_flags(sw_if_index=7,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 7, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’EWiCmpZEHAvaoBEf’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’etlKLIEDFCLHvyvJqcDWLMjOKdWQJMQjmFNjlQrtFMenqctPzKnQKGimHMzdWYvs’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’EWiCmpZEHAvaoBEf’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’etlKLIEDFCLHvyvJqcDWLMjOKdWQJMQjmFNjlQrtFMenqctPzKnQKGimHMzdWYvs’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’HgzFrCxQZVXVImAj’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’nPoiksMsFVXONpEIXnauIYPxqKdZolCIfQRAmOiwrgXQfeLmqOOAhRJKpTvbLjLq’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’HgzFrCxQZVXVImAj’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’nPoiksMsFVXONpEIXnauIYPxqKdZolCIfQRAmOiwrgXQfeLmqOOAhRJKpTvbLjLq’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’sdBdKInyptmIhRJJ’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’BvOlkligljbNGCCCfUHLISLRDauuLEVhcApCLJIxRMKnOcQEwPPiFBsaqDiFnJuh’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’sdBdKInyptmIhRJJ’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’BvOlkligljbNGCCCfUHLISLRDauuLEVhcApCLJIxRMKnOcQEwPPiFBsaqDiFnJuh’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’bFWYHqXXfiuyXGak’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’BMxxVyorJlEdIYJTdkRKEuyiJzLgeJZardwdcwInARHpHFZrxcVDxthfeBGPzAUK’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’bFWYHqXXfiuyXGak’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’BMxxVyorJlEdIYJTdkRKEuyiJzLgeJZardwdcwInARHpHFZrxcVDxthfeBGPzAUK’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

10ge2p1x553-ethip4ipsec4tnlswasync-scheduler-ip4base-int-aes128gcm-ndrpdr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular topology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them, run with IPsec async mode and use crypto sw scheduler engine to schedule crypto work to crypto cores. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG verification: TG finds and reports throughput NDR (Non Drop Rate) with zero packet loss tolerance and throughput PDR (Partial Drop Rate) with non-zero packet loss tolerance (LT) expressed in percentage of packets transmitted. NDR and PDR are discovered for different Ethernet L2 frame sizes using MLRsearch library.

Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to number of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG node interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 64b-1t2c-ethip4ipsec4tnlswasync-scheduler- 
ip4base-int-aes128gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00e’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 1, ‘flags’: 1, ‘mac_address’: ‘ac:1f:6b:57:57:fe’, ‘ip_address’: ‘200.0.0.102’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’YtahjrcTvXGYdbsE’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’YtahjrcTvXGYdbsE’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’CnRAQbZraQryrgAz’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’CnRAQbZraQryrgAz’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’mgaxOxPmugynPUbb’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’mgaxOxPmugynPUbb’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’ccjdjQDIEujJHTQk’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’ccjdjQDIEujJHTQk’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 1, ‘n_sa_in’: 1, ‘sa_in’: [100001]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 2, ‘n_sa_in’: 1, ‘sa_in’: [100002]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 7, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 3, ‘n_sa_in’: 1, ‘sa_in’: [100003]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=7)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
sw_interface_set_flags(sw_if_index=7,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 7, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’YtahjrcTvXGYdbsE’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’YtahjrcTvXGYdbsE’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’CnRAQbZraQryrgAz’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’CnRAQbZraQryrgAz’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’mgaxOxPmugynPUbb’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’mgaxOxPmugynPUbb’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’ccjdjQDIEujJHTQk’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’ccjdjQDIEujJHTQk’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 64b-1t4c-ethip4ipsec4tnlswasync-scheduler- 
ip4base-int-aes128gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00e’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 1, ‘flags’: 1, ‘mac_address’: ‘ac:1f:6b:57:57:fe’, ‘ip_address’: ‘200.0.0.102’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’OzNTkBMYZzpuHYeF’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’OzNTkBMYZzpuHYeF’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’DmiyxmpedQQwSUOT’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’DmiyxmpedQQwSUOT’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’ktZInfispkzBPLXk’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’ktZInfispkzBPLXk’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’sqBDIBttRiXaiKOq’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’sqBDIBttRiXaiKOq’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 1, ‘n_sa_in’: 1, ‘sa_in’: [100001]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 2, ‘n_sa_in’: 1, ‘sa_in’: [100002]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 7, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 3, ‘n_sa_in’: 1, ‘sa_in’: [100003]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=7)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
sw_interface_set_flags(sw_if_index=7,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 7, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’OzNTkBMYZzpuHYeF’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’OzNTkBMYZzpuHYeF’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’DmiyxmpedQQwSUOT’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’DmiyxmpedQQwSUOT’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’ktZInfispkzBPLXk’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’ktZInfispkzBPLXk’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’sqBDIBttRiXaiKOq’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’sqBDIBttRiXaiKOq’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-1t2c-ethip4ipsec4tnlswasync-scheduler- 
ip4base-int-aes128gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00e’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 1, ‘flags’: 1, ‘mac_address’: ‘ac:1f:6b:57:57:fe’, ‘ip_address’: ‘200.0.0.102’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’CPZJdBZWAVFuFbsR’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’CPZJdBZWAVFuFbsR’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’SOFTAEEGsPzzIoDd’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’SOFTAEEGsPzzIoDd’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’GQErnGlgzHMKVcLH’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’GQErnGlgzHMKVcLH’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’WHilBWgUlAMrUGBq’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’WHilBWgUlAMrUGBq’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 1, ‘n_sa_in’: 1, ‘sa_in’: [100001]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 2, ‘n_sa_in’: 1, ‘sa_in’: [100002]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 7, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 3, ‘n_sa_in’: 1, ‘sa_in’: [100003]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=7)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
sw_interface_set_flags(sw_if_index=7,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 7, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’CPZJdBZWAVFuFbsR’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’CPZJdBZWAVFuFbsR’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’SOFTAEEGsPzzIoDd’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’SOFTAEEGsPzzIoDd’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’GQErnGlgzHMKVcLH’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’GQErnGlgzHMKVcLH’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’WHilBWgUlAMrUGBq’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’WHilBWgUlAMrUGBq’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-1t2c-ethip4ipsec4tnlswasync-scheduler- 
ip4base-int-aes128gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00e’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 1, ‘flags’: 1, ‘mac_address’: ‘ac:1f:6b:57:57:fe’, ‘ip_address’: ‘200.0.0.102’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’BULBvVEtgGbAkron’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’BULBvVEtgGbAkron’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’FBuhQHhctwQfWfAP’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’FBuhQHhctwQfWfAP’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’BJkazFzQLFopWAEb’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’BJkazFzQLFopWAEb’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’RavqDvhbPaDTwwbN’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’RavqDvhbPaDTwwbN’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 1, ‘n_sa_in’: 1, ‘sa_in’: [100001]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 2, ‘n_sa_in’: 1, ‘sa_in’: [100002]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 7, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 3, ‘n_sa_in’: 1, ‘sa_in’: [100003]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=7)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
sw_interface_set_flags(sw_if_index=7,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 7, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’BULBvVEtgGbAkron’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’BULBvVEtgGbAkron’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’FBuhQHhctwQfWfAP’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’FBuhQHhctwQfWfAP’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’BJkazFzQLFopWAEb’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’BJkazFzQLFopWAEb’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’RavqDvhbPaDTwwbN’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’RavqDvhbPaDTwwbN’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-1t4c-ethip4ipsec4tnlswasync-scheduler- 
ip4base-int-aes128gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00e’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 1, ‘flags’: 1, ‘mac_address’: ‘ac:1f:6b:57:57:fe’, ‘ip_address’: ‘200.0.0.102’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’QgMkJQuxCfovCzLB’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’QgMkJQuxCfovCzLB’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’zJoOyjZYzUYornlj’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’zJoOyjZYzUYornlj’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’tekDwROWDvxADqUf’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’tekDwROWDvxADqUf’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’ofASbtJqVpPkbFor’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’ofASbtJqVpPkbFor’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 1, ‘n_sa_in’: 1, ‘sa_in’: [100001]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 2, ‘n_sa_in’: 1, ‘sa_in’: [100002]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 7, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 3, ‘n_sa_in’: 1, ‘sa_in’: [100003]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=7)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
sw_interface_set_flags(sw_if_index=7,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 7, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’QgMkJQuxCfovCzLB’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’QgMkJQuxCfovCzLB’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’zJoOyjZYzUYornlj’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’zJoOyjZYzUYornlj’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’tekDwROWDvxADqUf’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’tekDwROWDvxADqUf’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’ofASbtJqVpPkbFor’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’ofASbtJqVpPkbFor’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

10ge2p1x553-ethip4ipsec4tnlswasync-scheduler-ip4base-int-aes256gcm-ndrpdr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular topology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them, run with IPsec async mode and use crypto sw scheduler engine to schedule crypto work to crypto cores. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG verification: TG finds and reports throughput NDR (Non Drop Rate) with zero packet loss tolerance and throughput PDR (Partial Drop Rate) with non-zero packet loss tolerance (LT) expressed in percentage of packets transmitted. NDR and PDR are discovered for different Ethernet L2 frame sizes using MLRsearch library.

Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to number of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG node interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 64b-1t2c-ethip4ipsec4tnlswasync-scheduler- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00e’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 1, ‘flags’: 1, ‘mac_address’: ‘ac:1f:6b:57:57:fe’, ‘ip_address’: ‘200.0.0.102’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’aeWgAwtKniGcrZMOWRvBjyEfgzAybqBO’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’aeWgAwtKniGcrZMOWRvBjyEfgzAybqBO’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’KbauaXdeetohTdOFmRsmbjQJsgJIqnUL’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’KbauaXdeetohTdOFmRsmbjQJsgJIqnUL’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’onGwRygCQBFNKqLzhwBrsoOYXmNcLGOR’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’onGwRygCQBFNKqLzhwBrsoOYXmNcLGOR’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’RIJwmDAjsszVOjCYiLyaFzxgMoHYtRwX’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’RIJwmDAjsszVOjCYiLyaFzxgMoHYtRwX’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 1, ‘n_sa_in’: 1, ‘sa_in’: [100001]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 2, ‘n_sa_in’: 1, ‘sa_in’: [100002]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 7, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 3, ‘n_sa_in’: 1, ‘sa_in’: [100003]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=7)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
sw_interface_set_flags(sw_if_index=7,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 7, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’aeWgAwtKniGcrZMOWRvBjyEfgzAybqBO’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’aeWgAwtKniGcrZMOWRvBjyEfgzAybqBO’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’KbauaXdeetohTdOFmRsmbjQJsgJIqnUL’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’KbauaXdeetohTdOFmRsmbjQJsgJIqnUL’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’onGwRygCQBFNKqLzhwBrsoOYXmNcLGOR’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’onGwRygCQBFNKqLzhwBrsoOYXmNcLGOR’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’RIJwmDAjsszVOjCYiLyaFzxgMoHYtRwX’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’RIJwmDAjsszVOjCYiLyaFzxgMoHYtRwX’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-1t2c-ethip4ipsec4tnlswasync-scheduler- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00e’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 1, ‘flags’: 1, ‘mac_address’: ‘ac:1f:6b:57:57:fe’, ‘ip_address’: ‘200.0.0.102’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’CkPHcpZOwRVmzOOVQawOYardcWfAzFUO’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’CkPHcpZOwRVmzOOVQawOYardcWfAzFUO’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’MroDURwszwybbJTLKWcLBVDbESEOUDWi’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’MroDURwszwybbJTLKWcLBVDbESEOUDWi’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’oAeKFVVEIlhBszctUcAjKvCHDnWWNlSq’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’oAeKFVVEIlhBszctUcAjKvCHDnWWNlSq’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’hpvJPBUSAUjxuHMzSaGtRCSpoCIZuCAN’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’hpvJPBUSAUjxuHMzSaGtRCSpoCIZuCAN’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 1, ‘n_sa_in’: 1, ‘sa_in’: [100001]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 2, ‘n_sa_in’: 1, ‘sa_in’: [100002]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 7, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 3, ‘n_sa_in’: 1, ‘sa_in’: [100003]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=7)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
sw_interface_set_flags(sw_if_index=7,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 7, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’CkPHcpZOwRVmzOOVQawOYardcWfAzFUO’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’CkPHcpZOwRVmzOOVQawOYardcWfAzFUO’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’MroDURwszwybbJTLKWcLBVDbESEOUDWi’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’MroDURwszwybbJTLKWcLBVDbESEOUDWi’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’oAeKFVVEIlhBszctUcAjKvCHDnWWNlSq’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’oAeKFVVEIlhBszctUcAjKvCHDnWWNlSq’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’hpvJPBUSAUjxuHMzSaGtRCSpoCIZuCAN’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’hpvJPBUSAUjxuHMzSaGtRCSpoCIZuCAN’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-1t2c-ethip4ipsec4tnlswasync-scheduler- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00e’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 1, ‘flags’: 1, ‘mac_address’: ‘ac:1f:6b:57:57:fe’, ‘ip_address’: ‘200.0.0.102’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’KQpAazscpUrfnCdVHuTXnMvlrNsYusEk’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’KQpAazscpUrfnCdVHuTXnMvlrNsYusEk’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’LMEQqEuzojowAhhuuElQCMUUtUHckGfG’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’LMEQqEuzojowAhhuuElQCMUUtUHckGfG’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’QYICRkWUlXMGoeWQhIPblwKBqKamCspZ’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’QYICRkWUlXMGoeWQhIPblwKBqKamCspZ’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’HqbFdfqHOeqDREcmLuytOTQvxtmrFMWT’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’HqbFdfqHOeqDREcmLuytOTQvxtmrFMWT’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 1, ‘n_sa_in’: 1, ‘sa_in’: [100001]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 2, ‘n_sa_in’: 1, ‘sa_in’: [100002]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 7, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 3, ‘n_sa_in’: 1, ‘sa_in’: [100003]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=7)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
sw_interface_set_flags(sw_if_index=7,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 7, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’KQpAazscpUrfnCdVHuTXnMvlrNsYusEk’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’KQpAazscpUrfnCdVHuTXnMvlrNsYusEk’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’LMEQqEuzojowAhhuuElQCMUUtUHckGfG’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’LMEQqEuzojowAhhuuElQCMUUtUHckGfG’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’QYICRkWUlXMGoeWQhIPblwKBqKamCspZ’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’QYICRkWUlXMGoeWQhIPblwKBqKamCspZ’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’HqbFdfqHOeqDREcmLuytOTQvxtmrFMWT’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’HqbFdfqHOeqDREcmLuytOTQvxtmrFMWT’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

10ge2p1x553-ethip4ipsec8tnlswasync-scheduler-ip4base-int-aes128cbc-hmac512sha-ndrpdr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular topology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them, run with IPsec async mode and use crypto sw scheduler engine to schedule crypto work to crypto cores. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG verification: TG finds and reports throughput NDR (Non Drop Rate) with zero packet loss tolerance and throughput PDR (Partial Drop Rate) with non-zero packet loss tolerance (LT) expressed in percentage of packets transmitted. NDR and PDR are discovered for different Ethernet L2 frame sizes using MLRsearch library.

Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to number of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG node interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 64b-1t2c-ethip4ipsec8tnlswasync-scheduler- 
ip4base-int-aes128cbc-hmac512sha-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00e’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 1, ‘flags’: 1, ‘mac_address’: ‘ac:1f:6b:57:57:fe’, ‘ip_address’: ‘200.0.0.102’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x06x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x07x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x06x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x07x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’QehBDFnvxAwlkXLo’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’evpGZhitjzNDjJVKlANmeYwMPvlspVaLJKIuzRoRRllwIfOCaIEeIBEoJIfXPORh’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’QehBDFnvxAwlkXLo’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’evpGZhitjzNDjJVKlANmeYwMPvlspVaLJKIuzRoRRllwIfOCaIEeIBEoJIfXPORh’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’jSAZMSybvVFwXdAr’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’oxMZnZSkIcwDOewMKUorDHwaiadZoYuTfjxLWaumeNiJgGQuPgdHoZFlStZHzMtH’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’jSAZMSybvVFwXdAr’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’oxMZnZSkIcwDOewMKUorDHwaiadZoYuTfjxLWaumeNiJgGQuPgdHoZFlStZHzMtH’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 6, ‘spi’: 100006, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’zMSPyHWxCMAHgZyq’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’UpvUvrkkHCawQRULmLCCdcRhkQYViOKEFdvVTZNTrJjHOpnXKsBxKwtZzbvMuWtj’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100006, ‘spi’: 200006, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’zMSPyHWxCMAHgZyq’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’UpvUvrkkHCawQRULmLCCdcRhkQYViOKEFdvVTZNTrJjHOpnXKsBxKwtZzbvMuWtj’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 7, ‘spi’: 100007, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’cUiYFGKVIHhnXTqH’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’qIQpdtfGpONLKxPktmLDVOOKeRJhgXmXBdOxKAdLqLZZHLEQlGvWZKvWtsXWdJGg’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100007, ‘spi’: 200007, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’cUiYFGKVIHhnXTqH’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’qIQpdtfGpONLKxPktmLDVOOKeRJhgXmXBdOxKAdLqLZZHLEQlGvWZKvWtsXWdJGg’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 1, ‘n_sa_in’: 1, ‘sa_in’: [100001]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 10, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 6, ‘n_sa_in’: 1, ‘sa_in’: [100006]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 11, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 7, ‘n_sa_in’: 1, ‘sa_in’: [100007]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=10)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=11)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=10,flags=1)
sw_interface_set_flags(sw_if_index=11,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x06’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 10, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x07’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 11, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x06x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x07x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’QehBDFnvxAwlkXLo’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’evpGZhitjzNDjJVKlANmeYwMPvlspVaLJKIuzRoRRllwIfOCaIEeIBEoJIfXPORh’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’QehBDFnvxAwlkXLo’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’evpGZhitjzNDjJVKlANmeYwMPvlspVaLJKIuzRoRRllwIfOCaIEeIBEoJIfXPORh’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’jSAZMSybvVFwXdAr’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’oxMZnZSkIcwDOewMKUorDHwaiadZoYuTfjxLWaumeNiJgGQuPgdHoZFlStZHzMtH’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’jSAZMSybvVFwXdAr’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’oxMZnZSkIcwDOewMKUorDHwaiadZoYuTfjxLWaumeNiJgGQuPgdHoZFlStZHzMtH’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100006, ‘spi’: 200006, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’zMSPyHWxCMAHgZyq’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’UpvUvrkkHCawQRULmLCCdcRhkQYViOKEFdvVTZNTrJjHOpnXKsBxKwtZzbvMuWtj’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 6, ‘spi’: 100006, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’zMSPyHWxCMAHgZyq’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’UpvUvrkkHCawQRULmLCCdcRhkQYViOKEFdvVTZNTrJjHOpnXKsBxKwtZzbvMuWtj’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100007, ‘spi’: 200007, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’cUiYFGKVIHhnXTqH’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’qIQpdtfGpONLKxPktmLDVOOKeRJhgXmXBdOxKAdLqLZZHLEQlGvWZKvWtsXWdJGg’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 7, ‘spi’: 100007, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’cUiYFGKVIHhnXTqH’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’qIQpdtfGpONLKxPktmLDVOOKeRJhgXmXBdOxKAdLqLZZHLEQlGvWZKvWtsXWdJGg’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 9, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100006, ‘n_sa_in’: 1, ‘sa_in’: [6]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 10, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100007, ‘n_sa_in’: 1, ‘sa_in’: [7]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=9)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=10)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=9,flags=1)
sw_interface_set_flags(sw_if_index=10,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x06’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 9, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x07’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 10, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 64b-1t4c-ethip4ipsec8tnlswasync-scheduler- 
ip4base-int-aes128cbc-hmac512sha-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00e’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 1, ‘flags’: 1, ‘mac_address’: ‘ac:1f:6b:57:57:fe’, ‘ip_address’: ‘200.0.0.102’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x06x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x07x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x06x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x07x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’WjdtNaDnLFkjFNoT’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’hvimxTWDIPDjCDbxXkOevOheYgsKXeonpnqZmJFZSITJdDPQQYpBrkeDiufdTMCz’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’WjdtNaDnLFkjFNoT’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’hvimxTWDIPDjCDbxXkOevOheYgsKXeonpnqZmJFZSITJdDPQQYpBrkeDiufdTMCz’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’OTjwmdKsMzPoAanQ’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’VpEDXTtNIcGbJeliMpUMZEIAIxxPFkmCddUQwPBvnRbbYXPOLyidZZMgScUAyPSV’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’OTjwmdKsMzPoAanQ’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’VpEDXTtNIcGbJeliMpUMZEIAIxxPFkmCddUQwPBvnRbbYXPOLyidZZMgScUAyPSV’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 6, ‘spi’: 100006, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’mHEexjQsOAwxxfeX’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’VMrZcWHDbrkuKdfqaoPPBrVgAeQMcTOeIuceHAovVPQornWWNWIbEOwsVOQhAvWn’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100006, ‘spi’: 200006, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’mHEexjQsOAwxxfeX’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’VMrZcWHDbrkuKdfqaoPPBrVgAeQMcTOeIuceHAovVPQornWWNWIbEOwsVOQhAvWn’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 7, ‘spi’: 100007, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’QJZcptiJTdqBWZQd’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’TvccJAhQnUseNipzIvOjfABXyFKXguyJXHUsAAqSWQQvADVRoPkcBQJjeqfVlvNc’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100007, ‘spi’: 200007, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’QJZcptiJTdqBWZQd’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’TvccJAhQnUseNipzIvOjfABXyFKXguyJXHUsAAqSWQQvADVRoPkcBQJjeqfVlvNc’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 1, ‘n_sa_in’: 1, ‘sa_in’: [100001]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 10, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 6, ‘n_sa_in’: 1, ‘sa_in’: [100006]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 11, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 7, ‘n_sa_in’: 1, ‘sa_in’: [100007]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=10)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=11)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=10,flags=1)
sw_interface_set_flags(sw_if_index=11,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x06’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 10, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x07’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 11, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x06x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x07x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’WjdtNaDnLFkjFNoT’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’hvimxTWDIPDjCDbxXkOevOheYgsKXeonpnqZmJFZSITJdDPQQYpBrkeDiufdTMCz’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’WjdtNaDnLFkjFNoT’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’hvimxTWDIPDjCDbxXkOevOheYgsKXeonpnqZmJFZSITJdDPQQYpBrkeDiufdTMCz’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’OTjwmdKsMzPoAanQ’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’VpEDXTtNIcGbJeliMpUMZEIAIxxPFkmCddUQwPBvnRbbYXPOLyidZZMgScUAyPSV’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’OTjwmdKsMzPoAanQ’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’VpEDXTtNIcGbJeliMpUMZEIAIxxPFkmCddUQwPBvnRbbYXPOLyidZZMgScUAyPSV’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100006, ‘spi’: 200006, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’mHEexjQsOAwxxfeX’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’VMrZcWHDbrkuKdfqaoPPBrVgAeQMcTOeIuceHAovVPQornWWNWIbEOwsVOQhAvWn’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 6, ‘spi’: 100006, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’mHEexjQsOAwxxfeX’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’VMrZcWHDbrkuKdfqaoPPBrVgAeQMcTOeIuceHAovVPQornWWNWIbEOwsVOQhAvWn’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100007, ‘spi’: 200007, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’QJZcptiJTdqBWZQd’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’TvccJAhQnUseNipzIvOjfABXyFKXguyJXHUsAAqSWQQvADVRoPkcBQJjeqfVlvNc’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 7, ‘spi’: 100007, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’QJZcptiJTdqBWZQd’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’TvccJAhQnUseNipzIvOjfABXyFKXguyJXHUsAAqSWQQvADVRoPkcBQJjeqfVlvNc’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 9, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100006, ‘n_sa_in’: 1, ‘sa_in’: [6]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 10, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100007, ‘n_sa_in’: 1, ‘sa_in’: [7]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=9)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=10)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=9,flags=1)
sw_interface_set_flags(sw_if_index=10,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x06’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 9, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x07’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 10, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-1t2c-ethip4ipsec8tnlswasync-scheduler- 
ip4base-int-aes128cbc-hmac512sha-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00e’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 1, ‘flags’: 1, ‘mac_address’: ‘ac:1f:6b:57:57:fe’, ‘ip_address’: ‘200.0.0.102’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x06x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x07x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x06x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x07x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’noePinvbDCFYfjwC’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’SQnyMZBZFCwnxFNLHdtAQweiDbWjjvxgwwbcjDyUwgERQWzheZJYRBcXMvZgwjve’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’noePinvbDCFYfjwC’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’SQnyMZBZFCwnxFNLHdtAQweiDbWjjvxgwwbcjDyUwgERQWzheZJYRBcXMvZgwjve’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’hdFUjTWlbWjcNapi’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’DxAKloJacwCqtOIjgCLPlrAenlBgXcPVUdZfbtvbffJgPPcbAekLMbOVKeHboUXt’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’hdFUjTWlbWjcNapi’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’DxAKloJacwCqtOIjgCLPlrAenlBgXcPVUdZfbtvbffJgPPcbAekLMbOVKeHboUXt’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 6, ‘spi’: 100006, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’GZZcEAyWuROpauZp’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’ZRcNbsttSVDvIsjhtKTdrEIxQDclUWeCwmyZVUGnaAyaFUOynFIQkqOSuROIrEYM’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100006, ‘spi’: 200006, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’GZZcEAyWuROpauZp’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’ZRcNbsttSVDvIsjhtKTdrEIxQDclUWeCwmyZVUGnaAyaFUOynFIQkqOSuROIrEYM’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 7, ‘spi’: 100007, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’FrcDwnhuSabqurHk’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’xcvNKHdYAKvXzvBssJVQNxeaCYAIeDWlfcSoPsKcJzeJJkFbpbjOSTICQfAzOIHG’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100007, ‘spi’: 200007, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’FrcDwnhuSabqurHk’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’xcvNKHdYAKvXzvBssJVQNxeaCYAIeDWlfcSoPsKcJzeJJkFbpbjOSTICQfAzOIHG’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 1, ‘n_sa_in’: 1, ‘sa_in’: [100001]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 10, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 6, ‘n_sa_in’: 1, ‘sa_in’: [100006]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 11, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 7, ‘n_sa_in’: 1, ‘sa_in’: [100007]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=10)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=11)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=10,flags=1)
sw_interface_set_flags(sw_if_index=11,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x06’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 10, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x07’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 11, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x06x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x07x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’noePinvbDCFYfjwC’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’SQnyMZBZFCwnxFNLHdtAQweiDbWjjvxgwwbcjDyUwgERQWzheZJYRBcXMvZgwjve’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’noePinvbDCFYfjwC’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’SQnyMZBZFCwnxFNLHdtAQweiDbWjjvxgwwbcjDyUwgERQWzheZJYRBcXMvZgwjve’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’hdFUjTWlbWjcNapi’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’DxAKloJacwCqtOIjgCLPlrAenlBgXcPVUdZfbtvbffJgPPcbAekLMbOVKeHboUXt’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’hdFUjTWlbWjcNapi’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’DxAKloJacwCqtOIjgCLPlrAenlBgXcPVUdZfbtvbffJgPPcbAekLMbOVKeHboUXt’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100006, ‘spi’: 200006, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’GZZcEAyWuROpauZp’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’ZRcNbsttSVDvIsjhtKTdrEIxQDclUWeCwmyZVUGnaAyaFUOynFIQkqOSuROIrEYM’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 6, ‘spi’: 100006, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’GZZcEAyWuROpauZp’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’ZRcNbsttSVDvIsjhtKTdrEIxQDclUWeCwmyZVUGnaAyaFUOynFIQkqOSuROIrEYM’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100007, ‘spi’: 200007, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’FrcDwnhuSabqurHk’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’xcvNKHdYAKvXzvBssJVQNxeaCYAIeDWlfcSoPsKcJzeJJkFbpbjOSTICQfAzOIHG’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 7, ‘spi’: 100007, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’FrcDwnhuSabqurHk’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’xcvNKHdYAKvXzvBssJVQNxeaCYAIeDWlfcSoPsKcJzeJJkFbpbjOSTICQfAzOIHG’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 9, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100006, ‘n_sa_in’: 1, ‘sa_in’: [6]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 10, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100007, ‘n_sa_in’: 1, ‘sa_in’: [7]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=9)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=10)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=9,flags=1)
sw_interface_set_flags(sw_if_index=10,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x06’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 9, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x07’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 10, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

10ge2p1x553-ethip4ipsec8tnlswasync-scheduler-ip4base-int-aes128gcm-ndrpdr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular topology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them, run with IPsec async mode and use crypto sw scheduler engine to schedule crypto work to crypto cores. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG verification: TG finds and reports throughput NDR (Non Drop Rate) with zero packet loss tolerance and throughput PDR (Partial Drop Rate) with non-zero packet loss tolerance (LT) expressed in percentage of packets transmitted. NDR and PDR are discovered for different Ethernet L2 frame sizes using MLRsearch library.

Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to number of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG node interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 64b-1t4c-ethip4ipsec8tnlswasync-scheduler- 
ip4base-int-aes128gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00e’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 1, ‘flags’: 1, ‘mac_address’: ‘ac:1f:6b:57:57:fe’, ‘ip_address’: ‘200.0.0.102’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x06x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x07x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x06x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x07x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’xdzMrRtRwsKVOHbs’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’xdzMrRtRwsKVOHbs’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’ARMTRwdCgpDFpSSQ’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’ARMTRwdCgpDFpSSQ’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 6, ‘spi’: 100006, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’BxeDhwXrnPRkZons’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100006, ‘spi’: 200006, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’BxeDhwXrnPRkZons’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 7, ‘spi’: 100007, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’lAfgkNpHiChixEWV’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100007, ‘spi’: 200007, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’lAfgkNpHiChixEWV’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 1, ‘n_sa_in’: 1, ‘sa_in’: [100001]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 10, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 6, ‘n_sa_in’: 1, ‘sa_in’: [100006]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 11, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 7, ‘n_sa_in’: 1, ‘sa_in’: [100007]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=10)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=11)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=10,flags=1)
sw_interface_set_flags(sw_if_index=11,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x06’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 10, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x07’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 11, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x06x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x07x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’xdzMrRtRwsKVOHbs’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’xdzMrRtRwsKVOHbs’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’ARMTRwdCgpDFpSSQ’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’ARMTRwdCgpDFpSSQ’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100006, ‘spi’: 200006, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’BxeDhwXrnPRkZons’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 6, ‘spi’: 100006, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’BxeDhwXrnPRkZons’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100007, ‘spi’: 200007, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’lAfgkNpHiChixEWV’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 7, ‘spi’: 100007, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’lAfgkNpHiChixEWV’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 9, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100006, ‘n_sa_in’: 1, ‘sa_in’: [6]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 10, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100007, ‘n_sa_in’: 1, ‘sa_in’: [7]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=9)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=10)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=9,flags=1)
sw_interface_set_flags(sw_if_index=10,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x06’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 9, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x07’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 10, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-1t2c-ethip4ipsec8tnlswasync-scheduler- 
ip4base-int-aes128gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00e’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 1, ‘flags’: 1, ‘mac_address’: ‘ac:1f:6b:57:57:fe’, ‘ip_address’: ‘200.0.0.102’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x06x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x07x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x06x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x07x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’SLkeirFgABjtemtU’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’SLkeirFgABjtemtU’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’zLanXMrjDcGmhtxP’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’zLanXMrjDcGmhtxP’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 6, ‘spi’: 100006, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’xEFPDIcNQUDUarRS’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100006, ‘spi’: 200006, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’xEFPDIcNQUDUarRS’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 7, ‘spi’: 100007, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’BwMBohLcWTwxIdNO’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100007, ‘spi’: 200007, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’BwMBohLcWTwxIdNO’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 1, ‘n_sa_in’: 1, ‘sa_in’: [100001]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 10, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 6, ‘n_sa_in’: 1, ‘sa_in’: [100006]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 11, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 7, ‘n_sa_in’: 1, ‘sa_in’: [100007]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=10)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=11)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=10,flags=1)
sw_interface_set_flags(sw_if_index=11,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x06’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 10, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x07’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 11, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x06x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x07x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’SLkeirFgABjtemtU’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’SLkeirFgABjtemtU’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’zLanXMrjDcGmhtxP’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’zLanXMrjDcGmhtxP’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100006, ‘spi’: 200006, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’xEFPDIcNQUDUarRS’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 6, ‘spi’: 100006, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’xEFPDIcNQUDUarRS’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100007, ‘spi’: 200007, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’BwMBohLcWTwxIdNO’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 7, ‘spi’: 100007, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’BwMBohLcWTwxIdNO’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 9, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100006, ‘n_sa_in’: 1, ‘sa_in’: [6]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 10, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100007, ‘n_sa_in’: 1, ‘sa_in’: [7]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=9)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=10)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=9,flags=1)
sw_interface_set_flags(sw_if_index=10,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x06’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 9, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x07’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 10, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-1t4c-ethip4ipsec8tnlswasync-scheduler- 
ip4base-int-aes128gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00e’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 1, ‘flags’: 1, ‘mac_address’: ‘ac:1f:6b:57:57:fe’, ‘ip_address’: ‘200.0.0.102’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x06x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x07x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x06x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x07x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’gxCnFPAkNbSNObPB’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’gxCnFPAkNbSNObPB’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’VjVuRtZlNxKwBnFh’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’VjVuRtZlNxKwBnFh’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 6, ‘spi’: 100006, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’EssXgCUpqMyFyJJT’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100006, ‘spi’: 200006, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’EssXgCUpqMyFyJJT’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 7, ‘spi’: 100007, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’XuOwySLMgmtpWQVS’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100007, ‘spi’: 200007, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’XuOwySLMgmtpWQVS’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 1, ‘n_sa_in’: 1, ‘sa_in’: [100001]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 10, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 6, ‘n_sa_in’: 1, ‘sa_in’: [100006]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 11, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 7, ‘n_sa_in’: 1, ‘sa_in’: [100007]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=10)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=11)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=10,flags=1)
sw_interface_set_flags(sw_if_index=11,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x06’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 10, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x07’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 11, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x06x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x07x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’gxCnFPAkNbSNObPB’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’gxCnFPAkNbSNObPB’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’VjVuRtZlNxKwBnFh’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’VjVuRtZlNxKwBnFh’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100006, ‘spi’: 200006, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’EssXgCUpqMyFyJJT’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 6, ‘spi’: 100006, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’EssXgCUpqMyFyJJT’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100007, ‘spi’: 200007, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’XuOwySLMgmtpWQVS’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 7, ‘spi’: 100007, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’XuOwySLMgmtpWQVS’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 9, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100006, ‘n_sa_in’: 1, ‘sa_in’: [6]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 10, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100007, ‘n_sa_in’: 1, ‘sa_in’: [7]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=9)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=10)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=9,flags=1)
sw_interface_set_flags(sw_if_index=10,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x06’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 9, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x07’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 10, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

10ge2p1x553-ethip4ipsec8tnlswasync-scheduler-ip4base-int-aes256gcm-ndrpdr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular topology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them, run with IPsec async mode and use crypto sw scheduler engine to schedule crypto work to crypto cores. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG verification: TG finds and reports throughput NDR (Non Drop Rate) with zero packet loss tolerance and throughput PDR (Partial Drop Rate) with non-zero packet loss tolerance (LT) expressed in percentage of packets transmitted. NDR and PDR are discovered for different Ethernet L2 frame sizes using MLRsearch library.

Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to number of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG node interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 1518b-1t2c-ethip4ipsec8tnlswasync-scheduler- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00e’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 1, ‘flags’: 1, ‘mac_address’: ‘ac:1f:6b:57:57:fe’, ‘ip_address’: ‘200.0.0.102’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x06x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x07x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x06x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x07x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’MtnAAzEBbvVRmYbqYeMJfxepHaCtUgUj’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’MtnAAzEBbvVRmYbqYeMJfxepHaCtUgUj’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’giXWPGMxsoruSOkJOqEyewtyZrAKmszM’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’giXWPGMxsoruSOkJOqEyewtyZrAKmszM’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 6, ‘spi’: 100006, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’FKXIHAcKIlqUHfXoYZpAPNKqQoRyeEIQ’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100006, ‘spi’: 200006, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’FKXIHAcKIlqUHfXoYZpAPNKqQoRyeEIQ’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 7, ‘spi’: 100007, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’zTqssrjqZiKdnUEPAmLQqkZRvggxPNzn’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100007, ‘spi’: 200007, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’zTqssrjqZiKdnUEPAmLQqkZRvggxPNzn’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 1, ‘n_sa_in’: 1, ‘sa_in’: [100001]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 10, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 6, ‘n_sa_in’: 1, ‘sa_in’: [100006]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 11, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 7, ‘n_sa_in’: 1, ‘sa_in’: [100007]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=10)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=11)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=10,flags=1)
sw_interface_set_flags(sw_if_index=11,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x06’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 10, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x07’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 11, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x06x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x07x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’MtnAAzEBbvVRmYbqYeMJfxepHaCtUgUj’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’MtnAAzEBbvVRmYbqYeMJfxepHaCtUgUj’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’giXWPGMxsoruSOkJOqEyewtyZrAKmszM’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’giXWPGMxsoruSOkJOqEyewtyZrAKmszM’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100006, ‘spi’: 200006, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’FKXIHAcKIlqUHfXoYZpAPNKqQoRyeEIQ’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 6, ‘spi’: 100006, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’FKXIHAcKIlqUHfXoYZpAPNKqQoRyeEIQ’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100007, ‘spi’: 200007, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’zTqssrjqZiKdnUEPAmLQqkZRvggxPNzn’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 7, ‘spi’: 100007, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’zTqssrjqZiKdnUEPAmLQqkZRvggxPNzn’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 9, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100006, ‘n_sa_in’: 1, ‘sa_in’: [6]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 10, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100007, ‘n_sa_in’: 1, ‘sa_in’: [7]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=9)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=10)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=9,flags=1)
sw_interface_set_flags(sw_if_index=10,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x06’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 9, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x07’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 10, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-1t2c-ethip4ipsec8tnlswasync-scheduler- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00e’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 1, ‘flags’: 1, ‘mac_address’: ‘ac:1f:6b:57:57:fe’, ‘ip_address’: ‘200.0.0.102’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x06x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x07x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x06x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x07x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’BhVoUqPUbEkQkMdMnkJfAhMbwDidnBzs’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’BhVoUqPUbEkQkMdMnkJfAhMbwDidnBzs’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’XtpoSTLfpghNxwfIHisusGpakhflYbgv’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’XtpoSTLfpghNxwfIHisusGpakhflYbgv’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 6, ‘spi’: 100006, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’jkGqMZhzjCODzbsaMiUuDLVbyIiJQInX’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100006, ‘spi’: 200006, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’jkGqMZhzjCODzbsaMiUuDLVbyIiJQInX’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 7, ‘spi’: 100007, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’RAmKaZTCfzTTXjtqhXpLHHVBxvQMNwiL’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100007, ‘spi’: 200007, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’RAmKaZTCfzTTXjtqhXpLHHVBxvQMNwiL’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 1, ‘n_sa_in’: 1, ‘sa_in’: [100001]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 10, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 6, ‘n_sa_in’: 1, ‘sa_in’: [100006]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 11, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 7, ‘n_sa_in’: 1, ‘sa_in’: [100007]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=10)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=11)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=10,flags=1)
sw_interface_set_flags(sw_if_index=11,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x06’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 10, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x07’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 11, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x06x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x07x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’BhVoUqPUbEkQkMdMnkJfAhMbwDidnBzs’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’BhVoUqPUbEkQkMdMnkJfAhMbwDidnBzs’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’XtpoSTLfpghNxwfIHisusGpakhflYbgv’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’XtpoSTLfpghNxwfIHisusGpakhflYbgv’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100006, ‘spi’: 200006, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’jkGqMZhzjCODzbsaMiUuDLVbyIiJQInX’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 6, ‘spi’: 100006, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’jkGqMZhzjCODzbsaMiUuDLVbyIiJQInX’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100007, ‘spi’: 200007, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’RAmKaZTCfzTTXjtqhXpLHHVBxvQMNwiL’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 7, ‘spi’: 100007, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’RAmKaZTCfzTTXjtqhXpLHHVBxvQMNwiL’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 9, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100006, ‘n_sa_in’: 1, ‘sa_in’: [6]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 10, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100007, ‘n_sa_in’: 1, ‘sa_in’: [7]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=9)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=10)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=9,flags=1)
sw_interface_set_flags(sw_if_index=10,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x06’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 9, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x07’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 10, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-1t4c-ethip4ipsec8tnlswasync-scheduler- 
ip4base-int-aes256gcm-ndrpdr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:ae:3c’, ‘ip_address’: ‘192.168.10.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nxfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00e’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 1, ‘flags’: 1, ‘mac_address’: ‘ac:1f:6b:57:57:fe’, ‘ip_address’: ‘200.0.0.102’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x06x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x07x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x06x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x07x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’fHGnxBOTNXeviPvqVmeaeGGtbROuAvtE’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’fHGnxBOTNXeviPvqVmeaeGGtbROuAvtE’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’VaFrkAanBGPiyKLSaLIXiPgRNgleQENp’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’VaFrkAanBGPiyKLSaLIXiPgRNgleQENp’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 6, ‘spi’: 100006, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’poAVOhqIHIYOnoFfGblaNyxpJXrkbaWT’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100006, ‘spi’: 200006, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’poAVOhqIHIYOnoFfGblaNyxpJXrkbaWT’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 7, ‘spi’: 100007, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’bSkTEzMOWFBWDwbjxXUScnCXVGhVvGKX’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100007, ‘spi’: 200007, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’bSkTEzMOWFBWDwbjxXUScnCXVGhVvGKX’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 1, ‘n_sa_in’: 1, ‘sa_in’: [100001]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 10, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 6, ‘n_sa_in’: 1, ‘sa_in’: [100006]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 11, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 7, ‘n_sa_in’: 1, ‘sa_in’: [100007]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=10)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=11)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=10,flags=1)
sw_interface_set_flags(sw_if_index=11,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x06’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 10, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x07’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 11, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
DUT2:
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘b4:96:91:46:b2:e4’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x06x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x07x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’fHGnxBOTNXeviPvqVmeaeGGtbROuAvtE’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’fHGnxBOTNXeviPvqVmeaeGGtbROuAvtE’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’VaFrkAanBGPiyKLSaLIXiPgRNgleQENp’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’VaFrkAanBGPiyKLSaLIXiPgRNgleQENp’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100006, ‘spi’: 200006, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’poAVOhqIHIYOnoFfGblaNyxpJXrkbaWT’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 6, ‘spi’: 100006, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’poAVOhqIHIYOnoFfGblaNyxpJXrkbaWT’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100007, ‘spi’: 200007, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’bSkTEzMOWFBWDwbjxXUScnCXVGhVvGKX’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 7, ‘spi’: 100007, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’bSkTEzMOWFBWDwbjxXUScnCXVGhVvGKX’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 9, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100006, ‘n_sa_in’: 1, ‘sa_in’: [6]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 10, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100007, ‘n_sa_in’: 1, ‘sa_in’: [7]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=9)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=10)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=9,flags=1)
sw_interface_set_flags(sw_if_index=10,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x06’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 9, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x07’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 10, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})