2n-tx2-xl710

2n1l-40ge2p1xl710-ethip4ipsec10000tnlsw-ip4base-int-aes128cbc-hmac512sha-udir-mrr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-TG 2-node circular topology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUT1, Eth-IPv4-IPSec on DUT1-TG.

  • [Cfg] DUT configuration: DUT1 is configured with multiple IPsec tunnels between it and TG. DUT gets IPv4 traffic from TG, encrypts it and sends back to TG.

  • [Ver] TG vefication: In MaxReceivedRate tests TG sends traffic at line rate and reports total received packets over trial period. Test packets are generated by TG on links to DUTs. TG traffic profile contains one L3 flow-groups (number of flows per flow-group equals to number of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG node interfaces. Incrementing of IP.dst (IPv4 destination address) field is applied to the stream.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 1518b-1t1c-ethip4ipsec10000tnlsw-ip4base- 
int-aes128cbc-hmac512sha-udir-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx01’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:90’, ‘ip_address’: ‘192.168.10.2’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nx02’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-2t2c-ethip4ipsec10000tnlsw-ip4base- 
int-aes128cbc-hmac512sha-udir-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx01’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:90’, ‘ip_address’: ‘192.168.10.2’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nx02’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-4t4c-ethip4ipsec10000tnlsw-ip4base- 
int-aes128cbc-hmac512sha-udir-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx01’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:90’, ‘ip_address’: ‘192.168.10.2’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nx02’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-1t1c-ethip4ipsec10000tnlsw-ip4base- 
int-aes128cbc-hmac512sha-udir-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx01’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:90’, ‘ip_address’: ‘192.168.10.2’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nx02’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-2t2c-ethip4ipsec10000tnlsw-ip4base- 
int-aes128cbc-hmac512sha-udir-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx01’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:90’, ‘ip_address’: ‘192.168.10.2’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nx02’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-4t4c-ethip4ipsec10000tnlsw-ip4base- 
int-aes128cbc-hmac512sha-udir-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx01’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:90’, ‘ip_address’: ‘192.168.10.2’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nx02’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

2n1l-40ge2p1xl710-ethip4ipsec10000tnlsw-ip4base-int-aes128gcm-udir-mrr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-TG 2-node circular topology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUT1, Eth-IPv4-IPSec on DUT1-TG.

  • [Cfg] DUT configuration: DUT1 is configured with multiple IPsec tunnels between it and TG. DUT gets IPv4 traffic from TG, encrypts it and sends back to TG.

  • [Ver] TG vefication: In MaxReceivedRate tests TG sends traffic at line rate and reports total received packets over trial period. Test packets are generated by TG on links to DUTs. TG traffic profile contains one L3 flow-groups (number of flows per flow-group equals to number of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG node interfaces. Incrementing of IP.dst (IPv4 destination address) field is applied to the stream.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 1518b-1t1c-ethip4ipsec10000tnlsw-ip4base- 
int-aes128gcm-udir-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx01’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:90’, ‘ip_address’: ‘192.168.10.2’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nx02’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-2t2c-ethip4ipsec10000tnlsw-ip4base- 
int-aes128gcm-udir-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx01’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:90’, ‘ip_address’: ‘192.168.10.2’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nx02’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-4t4c-ethip4ipsec10000tnlsw-ip4base- 
int-aes128gcm-udir-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx01’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:90’, ‘ip_address’: ‘192.168.10.2’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nx02’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-1t1c-ethip4ipsec10000tnlsw-ip4base- 
int-aes128gcm-udir-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx01’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:90’, ‘ip_address’: ‘192.168.10.2’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nx02’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-2t2c-ethip4ipsec10000tnlsw-ip4base- 
int-aes128gcm-udir-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx01’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:90’, ‘ip_address’: ‘192.168.10.2’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nx02’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-4t4c-ethip4ipsec10000tnlsw-ip4base- 
int-aes128gcm-udir-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx01’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:90’, ‘ip_address’: ‘192.168.10.2’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nx02’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

2n1l-40ge2p1xl710-ethip4ipsec10000tnlsw-ip4base-int-aes256gcm-udir-mrr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-TG 2-node circular topology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUT1, Eth-IPv4-IPSec on DUT1-TG.

  • [Cfg] DUT configuration: DUT1 is configured with multiple IPsec tunnels between it and TG. DUT gets IPv4 traffic from TG, encrypts it and sends back to TG.

  • [Ver] TG vefication: In MaxReceivedRate tests TG sends traffic at line rate and reports total received packets over trial period. Test packets are generated by TG on links to DUTs. TG traffic profile contains one L3 flow-groups (number of flows per flow-group equals to number of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG node interfaces. Incrementing of IP.dst (IPv4 destination address) field is applied to the stream.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 1518b-1t1c-ethip4ipsec10000tnlsw-ip4base- 
int-aes256gcm-udir-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx01’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:90’, ‘ip_address’: ‘192.168.10.2’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nx02’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-2t2c-ethip4ipsec10000tnlsw-ip4base- 
int-aes256gcm-udir-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx01’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:90’, ‘ip_address’: ‘192.168.10.2’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nx02’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-4t4c-ethip4ipsec10000tnlsw-ip4base- 
int-aes256gcm-udir-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx01’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:90’, ‘ip_address’: ‘192.168.10.2’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nx02’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-1t1c-ethip4ipsec10000tnlsw-ip4base- 
int-aes256gcm-udir-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx01’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:90’, ‘ip_address’: ‘192.168.10.2’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nx02’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-2t2c-ethip4ipsec10000tnlsw-ip4base- 
int-aes256gcm-udir-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx01’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:90’, ‘ip_address’: ‘192.168.10.2’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nx02’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-4t4c-ethip4ipsec10000tnlsw-ip4base- 
int-aes256gcm-udir-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx01’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:90’, ‘ip_address’: ‘192.168.10.2’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nx02’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

2n1l-40ge2p1xl710-ethip4ipsec1000spe-cache-ip4base-policy-outbound-nocrypto-mrr

RFC4301: SPD lookup performance

  • [Top] Network Topologies: TG-DUT1-TG 2-node circular topology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 for IPv4 routing.

  • [Cfg] DUT configuration: DUT1 is configured with IPv4 routing, two static IPv4 /24 route entries, one SPD on each outbound interface in each direction and 1000 SPD entry(ies) in each SPD. Only outbound traffic is matched and only the last rule is the matching rule. SPD flow-cache for IPv4 outbound traffic is enabled. DUT1 is tested with Intel-XL710.

  • [Ver] TG vefication: In MaxReceivedRate tests TG sends traffic at line rate and reports total received packets over trial period. Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, 253 flows per flow-group) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG node interfaces. The DUT does SPD lookup with only the lowest priority rule matching the traffic. The action of the matching rule is BYPASS. No encryption or authentication is done.

  • [Ref] Applicable standard specifications: RFC4301 and RFC2544.

2n1l-40ge2p1xl710-ethip4ipsec1000spe-ip4base-policy-outbound-nocrypto-mrr

RFC4301: SPD lookup performance

  • [Top] Network Topologies: TG-DUT1-TG 2-node circular topology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 for IPv4 routing.

  • [Cfg] DUT configuration: DUT1 is configured with IPv4 routing, two static IPv4 /24 route entries, one SPD on each outbound interface in each direction and 1000 SPD entry(ies) in each SPD. Only outbound traffic is matched and only the last rule is the matching rule. DUT1 tested with Intel-XL710.

  • [Ver] TG vefication: In MaxReceivedRate tests TG sends traffic at line rate and reports total received packets over trial period. Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, 253 flows per flow-group) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG node interfaces. The DUT does SPD lookup with only the lowest priority rule matching the traffic. The action of the matching rule is BYPASS. No encryption or authentication is done.

  • [Ref] Applicable standard specifications: RFC4301 and RFC2544.

2n1l-40ge2p1xl710-ethip4ipsec1000tnlsw-ip4base-int-aes128cbc-hmac512sha-udir-mrr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-TG 2-node circular topology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUT1, Eth-IPv4-IPSec on DUT1-TG.

  • [Cfg] DUT configuration: DUT1 is configured with multiple IPsec tunnels between it and TG. DUT gets IPv4 traffic from TG, encrypts it and sends back to TG.

  • [Ver] TG vefication: In MaxReceivedRate tests TG sends traffic at line rate and reports total received packets over trial period. Test packets are generated by TG on links to DUTs. TG traffic profile contains one L3 flow-groups (number of flows per flow-group equals to number of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG node interfaces. Incrementing of IP.dst (IPv4 destination address) field is applied to the stream.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 1518b-1t1c-ethip4ipsec1000tnlsw-ip4base- 
int-aes128cbc-hmac512sha-udir-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx01’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:90’, ‘ip_address’: ‘192.168.10.2’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nx02’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-2t2c-ethip4ipsec1000tnlsw-ip4base- 
int-aes128cbc-hmac512sha-udir-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx01’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:90’, ‘ip_address’: ‘192.168.10.2’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nx02’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-4t4c-ethip4ipsec1000tnlsw-ip4base- 
int-aes128cbc-hmac512sha-udir-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx01’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:90’, ‘ip_address’: ‘192.168.10.2’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nx02’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-1t1c-ethip4ipsec1000tnlsw-ip4base- 
int-aes128cbc-hmac512sha-udir-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx01’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:90’, ‘ip_address’: ‘192.168.10.2’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nx02’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-2t2c-ethip4ipsec1000tnlsw-ip4base- 
int-aes128cbc-hmac512sha-udir-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx01’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:90’, ‘ip_address’: ‘192.168.10.2’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nx02’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-4t4c-ethip4ipsec1000tnlsw-ip4base- 
int-aes128cbc-hmac512sha-udir-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx01’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:90’, ‘ip_address’: ‘192.168.10.2’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nx02’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

2n1l-40ge2p1xl710-ethip4ipsec1000tnlsw-ip4base-int-aes128gcm-udir-mrr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-TG 2-node circular topology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUT1, Eth-IPv4-IPSec on DUT1-TG.

  • [Cfg] DUT configuration: DUT1 is configured with multiple IPsec tunnels between it and TG. DUT gets IPv4 traffic from TG, encrypts it and sends back to TG.

  • [Ver] TG vefication: In MaxReceivedRate tests TG sends traffic at line rate and reports total received packets over trial period. Test packets are generated by TG on links to DUTs. TG traffic profile contains one L3 flow-groups (number of flows per flow-group equals to number of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG node interfaces. Incrementing of IP.dst (IPv4 destination address) field is applied to the stream.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 1518b-1t1c-ethip4ipsec1000tnlsw-ip4base- 
int-aes128gcm-udir-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx01’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:90’, ‘ip_address’: ‘192.168.10.2’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nx02’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-2t2c-ethip4ipsec1000tnlsw-ip4base- 
int-aes128gcm-udir-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx01’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:90’, ‘ip_address’: ‘192.168.10.2’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nx02’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-4t4c-ethip4ipsec1000tnlsw-ip4base- 
int-aes128gcm-udir-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx01’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:90’, ‘ip_address’: ‘192.168.10.2’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nx02’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-1t1c-ethip4ipsec1000tnlsw-ip4base- 
int-aes128gcm-udir-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx01’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:90’, ‘ip_address’: ‘192.168.10.2’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nx02’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-2t2c-ethip4ipsec1000tnlsw-ip4base- 
int-aes128gcm-udir-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx01’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:90’, ‘ip_address’: ‘192.168.10.2’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nx02’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-4t4c-ethip4ipsec1000tnlsw-ip4base- 
int-aes128gcm-udir-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx01’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:90’, ‘ip_address’: ‘192.168.10.2’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nx02’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

2n1l-40ge2p1xl710-ethip4ipsec1000tnlsw-ip4base-int-aes256gcm-udir-mrr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-TG 2-node circular topology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUT1, Eth-IPv4-IPSec on DUT1-TG.

  • [Cfg] DUT configuration: DUT1 is configured with multiple IPsec tunnels between it and TG. DUT gets IPv4 traffic from TG, encrypts it and sends back to TG.

  • [Ver] TG vefication: In MaxReceivedRate tests TG sends traffic at line rate and reports total received packets over trial period. Test packets are generated by TG on links to DUTs. TG traffic profile contains one L3 flow-groups (number of flows per flow-group equals to number of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG node interfaces. Incrementing of IP.dst (IPv4 destination address) field is applied to the stream.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 1518b-1t1c-ethip4ipsec1000tnlsw-ip4base- 
int-aes256gcm-udir-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx01’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:90’, ‘ip_address’: ‘192.168.10.2’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nx02’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-2t2c-ethip4ipsec1000tnlsw-ip4base- 
int-aes256gcm-udir-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx01’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:90’, ‘ip_address’: ‘192.168.10.2’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nx02’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-4t4c-ethip4ipsec1000tnlsw-ip4base- 
int-aes256gcm-udir-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx01’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:90’, ‘ip_address’: ‘192.168.10.2’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nx02’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-1t1c-ethip4ipsec1000tnlsw-ip4base- 
int-aes256gcm-udir-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx01’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:90’, ‘ip_address’: ‘192.168.10.2’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nx02’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-2t2c-ethip4ipsec1000tnlsw-ip4base- 
int-aes256gcm-udir-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx01’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:90’, ‘ip_address’: ‘192.168.10.2’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nx02’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-4t4c-ethip4ipsec1000tnlsw-ip4base- 
int-aes256gcm-udir-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx01’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:90’, ‘ip_address’: ‘192.168.10.2’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nx02’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

2n1l-40ge2p1xl710-ethip4ipsec1000tnlsw-ip4base-policy-aes256gcm-udir-mrr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-TG 2-node circular topology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUT1, Eth-IPv4-IPSec on DUT1-TG.

  • [Cfg] DUT configuration: DUT1 is configured with multiple IPsec tunnels between it and TG. DUT gets IPv4 traffic from TG, encrypts it and sends back to TG.

  • [Ver] TG vefication: In MaxReceivedRate tests TG sends traffic at line rate and reports total received packets over trial period. Test packets are generated by TG on links to DUTs. TG traffic profile contains one L3 flow-groups (number of flows per flow-group equals to number of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG node interfaces. Incrementing of IP.dst (IPv4 destination address) field is applied to the stream.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

2n1l-40ge2p1xl710-ethip4ipsec100spe-cache-ip4base-policy-outbound-nocrypto-mrr

RFC4301: SPD lookup performance

  • [Top] Network Topologies: TG-DUT1-TG 2-node circular topology

with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 for IPv4 routing.

  • [Cfg] DUT configuration: DUT1 is configured with IPv4 routing, two static IPv4 /24 route entries, one SPD on each outbound interface in each direction and 100 SPD entry(ies) in each SPD. Only outbound traffic is matched and only the last rule is the matching rule. SPD flow-cache for IPv4 outbound traffic is enabled. DUT1 is tested with Intel-XL710.

  • [Ver] TG vefication: In MaxReceivedRate tests TG sends traffic at line rate and reports total received packets over trial period. Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, 253 flows per flow-group) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG node interfaces. The DUT does SPD lookup with only the lowest priority rule matching the traffic. The action of the matching rule is BYPASS. No encryption or authentication is done.

  • [Ref] Applicable standard specifications: RFC4301 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 64b-1t1c-ethip4ipsec100spe-cache- 
ip4base-policy-outbound-nocrypto-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:90’, ‘ip_address’: ‘10.10.10.2’})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:91’, ‘ip_address’: ‘20.20.20.2’})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnx01’}}})
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14x01’}}})
ipsec_spd_add_del(is_add=True,spd_id=1)
ipsec_interface_add_del_spd(is_add=True,sw_if_index=2,spd_id=1)
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 1, ‘is_outbound’: True, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 0, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14xff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnx00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_spd_add_del(is_add=True,spd_id=2)
ipsec_interface_add_del_spd(is_add=True,sw_if_index=1,spd_id=2)
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 2, ‘priority’: 1, ‘is_outbound’: True, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 0, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnx00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnxff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14xff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
exec ipsec policy add spd 1 priority 2 outbound action bypass local-ip-range 10.10.11.0 - 10.10.11.255 remote-ip-range 20.20.21.0 - 20.20.21.255
exec ipsec policy add spd 1 priority 3 outbound action bypass local-ip-range 10.10.12.0 - 10.10.12.255 remote-ip-range 20.20.22.0 - 20.20.22.255
exec ipsec policy add spd 1 priority 4 outbound action bypass local-ip-range 10.10.13.0 - 10.10.13.255 remote-ip-range 20.20.23.0 - 20.20.23.255
exec ipsec policy add spd 1 priority 5 outbound action bypass local-ip-range 10.10.14.0 - 10.10.14.255 remote-ip-range 20.20.24.0 - 20.20.24.255
exec ipsec policy add spd 1 priority 6 outbound action bypass local-ip-range 10.10.15.0 - 10.10.15.255 remote-ip-range 20.20.25.0 - 20.20.25.255
exec ipsec policy add spd 1 priority 7 outbound action bypass local-ip-range 10.10.16.0 - 10.10.16.255 remote-ip-range 20.20.26.0 - 20.20.26.255
exec ipsec policy add spd 1 priority 8 outbound action bypass local-ip-range 10.10.17.0 - 10.10.17.255 remote-ip-range 20.20.27.0 - 20.20.27.255
exec ipsec policy add spd 1 priority 9 outbound action bypass local-ip-range 10.10.18.0 - 10.10.18.255 remote-ip-range 20.20.28.0 - 20.20.28.255
exec ipsec policy add spd 1 priority 10 outbound action bypass local-ip-range 10.10.19.0 - 10.10.19.255 remote-ip-range 20.20.29.0 - 20.20.29.255
exec ipsec policy add spd 1 priority 11 outbound action bypass local-ip-range 10.10.20.0 - 10.10.20.255 remote-ip-range 20.20.30.0 - 20.20.30.255
exec ipsec policy add spd 1 priority 12 outbound action bypass local-ip-range 10.10.21.0 - 10.10.21.255 remote-ip-range 20.20.31.0 - 20.20.31.255
exec ipsec policy add spd 1 priority 13 outbound action bypass local-ip-range 10.10.22.0 - 10.10.22.255 remote-ip-range 20.20.32.0 - 20.20.32.255
exec ipsec policy add spd 1 priority 14 outbound action bypass local-ip-range 10.10.23.0 - 10.10.23.255 remote-ip-range 20.20.33.0 - 20.20.33.255
exec ipsec policy add spd 1 priority 15 outbound action bypass local-ip-range 10.10.24.0 - 10.10.24.255 remote-ip-range 20.20.34.0 - 20.20.34.255
exec ipsec policy add spd 1 priority 16 outbound action bypass local-ip-range 10.10.25.0 - 10.10.25.255 remote-ip-range 20.20.35.0 - 20.20.35.255
exec ipsec policy add spd 1 priority 17 outbound action bypass local-ip-range 10.10.26.0 - 10.10.26.255 remote-ip-range 20.20.36.0 - 20.20.36.255
exec ipsec policy add spd 1 priority 18 outbound action bypass local-ip-range 10.10.27.0 - 10.10.27.255 remote-ip-range 20.20.37.0 - 20.20.37.255
exec ipsec policy add spd 1 priority 19 outbound action bypass local-ip-range 10.10.28.0 - 10.10.28.255 remote-ip-range 20.20.38.0 - 20.20.38.255
exec ipsec policy add spd 1 priority 20 outbound action bypass local-ip-range 10.10.29.0 - 10.10.29.255 remote-ip-range 20.20.39.0 - 20.20.39.255
exec ipsec policy add spd 1 priority 21 outbound action bypass local-ip-range 10.10.30.0 - 10.10.30.255 remote-ip-range 20.20.40.0 - 20.20.40.255
exec ipsec policy add spd 1 priority 22 outbound action bypass local-ip-range 10.10.31.0 - 10.10.31.255 remote-ip-range 20.20.41.0 - 20.20.41.255
exec ipsec policy add spd 1 priority 23 outbound action bypass local-ip-range 10.10.32.0 - 10.10.32.255 remote-ip-range 20.20.42.0 - 20.20.42.255
exec ipsec policy add spd 1 priority 24 outbound action bypass local-ip-range 10.10.33.0 - 10.10.33.255 remote-ip-range 20.20.43.0 - 20.20.43.255
exec ipsec policy add spd 1 priority 25 outbound action bypass local-ip-range 10.10.34.0 - 10.10.34.255 remote-ip-range 20.20.44.0 - 20.20.44.255
exec ipsec policy add spd 1 priority 26 outbound action bypass local-ip-range 10.10.35.0 - 10.10.35.255 remote-ip-range 20.20.45.0 - 20.20.45.255
exec ipsec policy add spd 1 priority 27 outbound action bypass local-ip-range 10.10.36.0 - 10.10.36.255 remote-ip-range 20.20.46.0 - 20.20.46.255
exec ipsec policy add spd 1 priority 28 outbound action bypass local-ip-range 10.10.37.0 - 10.10.37.255 remote-ip-range 20.20.47.0 - 20.20.47.255
exec ipsec policy add spd 1 priority 29 outbound action bypass local-ip-range 10.10.38.0 - 10.10.38.255 remote-ip-range 20.20.48.0 - 20.20.48.255
exec ipsec policy add spd 1 priority 30 outbound action bypass local-ip-range 10.10.39.0 - 10.10.39.255 remote-ip-range 20.20.49.0 - 20.20.49.255
exec ipsec policy add spd 1 priority 31 outbound action bypass local-ip-range 10.10.40.0 - 10.10.40.255 remote-ip-range 20.20.50.0 - 20.20.50.255
exec ipsec policy add spd 1 priority 32 outbound action bypass local-ip-range 10.10.41.0 - 10.10.41.255 remote-ip-range 20.20.51.0 - 20.20.51.255
exec ipsec policy add spd 1 priority 33 outbound action bypass local-ip-range 10.10.42.0 - 10.10.42.255 remote-ip-range 20.20.52.0 - 20.20.52.255
exec ipsec policy add spd 1 priority 34 outbound action bypass local-ip-range 10.10.43.0 - 10.10.43.255 remote-ip-range 20.20.53.0 - 20.20.53.255
exec ipsec policy add spd 1 priority 35 outbound action bypass local-ip-range 10.10.44.0 - 10.10.44.255 remote-ip-range 20.20.54.0 - 20.20.54.255
exec ipsec policy add spd 1 priority 36 outbound action bypass local-ip-range 10.10.45.0 - 10.10.45.255 remote-ip-range 20.20.55.0 - 20.20.55.255
exec ipsec policy add spd 1 priority 37 outbound action bypass local-ip-range 10.10.46.0 - 10.10.46.255 remote-ip-range 20.20.56.0 - 20.20.56.255
exec ipsec policy add spd 1 priority 38 outbound action bypass local-ip-range 10.10.47.0 - 10.10.47.255 remote-ip-range 20.20.57.0 - 20.20.57.255
exec ipsec policy add spd 1 priority 39 outbound action bypass local-ip-range 10.10.48.0 - 10.10.48.255 remote-ip-range 20.20.58.0 - 20.20.58.255
exec ipsec policy add spd 1 priority 40 outbound action bypass local-ip-range 10.10.49.0 - 10.10.49.255 remote-ip-range 20.20.59.0 - 20.20.59.255
exec ipsec policy add spd 1 priority 41 outbound action bypass local-ip-range 10.10.50.0 - 10.10.50.255 remote-ip-range 20.20.60.0 - 20.20.60.255
exec ipsec policy add spd 1 priority 42 outbound action bypass local-ip-range 10.10.51.0 - 10.10.51.255 remote-ip-range 20.20.61.0 - 20.20.61.255
exec ipsec policy add spd 1 priority 43 outbound action bypass local-ip-range 10.10.52.0 - 10.10.52.255 remote-ip-range 20.20.62.0 - 20.20.62.255
exec ipsec policy add spd 1 priority 44 outbound action bypass local-ip-range 10.10.53.0 - 10.10.53.255 remote-ip-range 20.20.63.0 - 20.20.63.255
exec ipsec policy add spd 1 priority 45 outbound action bypass local-ip-range 10.10.54.0 - 10.10.54.255 remote-ip-range 20.20.64.0 - 20.20.64.255
exec ipsec policy add spd 1 priority 46 outbound action bypass local-ip-range 10.10.55.0 - 10.10.55.255 remote-ip-range 20.20.65.0 - 20.20.65.255
exec ipsec policy add spd 1 priority 47 outbound action bypass local-ip-range 10.10.56.0 - 10.10.56.255 remote-ip-range 20.20.66.0 - 20.20.66.255
exec ipsec policy add spd 1 priority 48 outbound action bypass local-ip-range 10.10.57.0 - 10.10.57.255 remote-ip-range 20.20.67.0 - 20.20.67.255
exec ipsec policy add spd 1 priority 49 outbound action bypass local-ip-range 10.10.58.0 - 10.10.58.255 remote-ip-range 20.20.68.0 - 20.20.68.255
exec ipsec policy add spd 1 priority 50 outbound action bypass local-ip-range 10.10.59.0 - 10.10.59.255 remote-ip-range 20.20.69.0 - 20.20.69.255
exec ipsec policy add spd 1 priority 51 outbound action bypass local-ip-range 10.10.60.0 - 10.10.60.255 remote-ip-range 20.20.70.0 - 20.20.70.255
exec ipsec policy add spd 1 priority 52 outbound action bypass local-ip-range 10.10.61.0 - 10.10.61.255 remote-ip-range 20.20.71.0 - 20.20.71.255
exec ipsec policy add spd 1 priority 53 outbound action bypass local-ip-range 10.10.62.0 - 10.10.62.255 remote-ip-range 20.20.72.0 - 20.20.72.255
exec ipsec policy add spd 1 priority 54 outbound action bypass local-ip-range 10.10.63.0 - 10.10.63.255 remote-ip-range 20.20.73.0 - 20.20.73.255
exec ipsec policy add spd 1 priority 55 outbound action bypass local-ip-range 10.10.64.0 - 10.10.64.255 remote-ip-range 20.20.74.0 - 20.20.74.255
exec ipsec policy add spd 1 priority 56 outbound action bypass local-ip-range 10.10.65.0 - 10.10.65.255 remote-ip-range 20.20.75.0 - 20.20.75.255
exec ipsec policy add spd 1 priority 57 outbound action bypass local-ip-range 10.10.66.0 - 10.10.66.255 remote-ip-range 20.20.76.0 - 20.20.76.255
exec ipsec policy add spd 1 priority 58 outbound action bypass local-ip-range 10.10.67.0 - 10.10.67.255 remote-ip-range 20.20.77.0 - 20.20.77.255
exec ipsec policy add spd 1 priority 59 outbound action bypass local-ip-range 10.10.68.0 - 10.10.68.255 remote-ip-range 20.20.78.0 - 20.20.78.255
exec ipsec policy add spd 1 priority 60 outbound action bypass local-ip-range 10.10.69.0 - 10.10.69.255 remote-ip-range 20.20.79.0 - 20.20.79.255
exec ipsec policy add spd 1 priority 61 outbound action bypass local-ip-range 10.10.70.0 - 10.10.70.255 remote-ip-range 20.20.80.0 - 20.20.80.255
exec ipsec policy add spd 1 priority 62 outbound action bypass local-ip-range 10.10.71.0 - 10.10.71.255 remote-ip-range 20.20.81.0 - 20.20.81.255
exec ipsec policy add spd 1 priority 63 outbound action bypass local-ip-range 10.10.72.0 - 10.10.72.255 remote-ip-range 20.20.82.0 - 20.20.82.255
exec ipsec policy add spd 1 priority 64 outbound action bypass local-ip-range 10.10.73.0 - 10.10.73.255 remote-ip-range 20.20.83.0 - 20.20.83.255
exec ipsec policy add spd 1 priority 65 outbound action bypass local-ip-range 10.10.74.0 - 10.10.74.255 remote-ip-range 20.20.84.0 - 20.20.84.255
exec ipsec policy add spd 1 priority 66 outbound action bypass local-ip-range 10.10.75.0 - 10.10.75.255 remote-ip-range 20.20.85.0 - 20.20.85.255
exec ipsec policy add spd 1 priority 67 outbound action bypass local-ip-range 10.10.76.0 - 10.10.76.255 remote-ip-range 20.20.86.0 - 20.20.86.255
exec ipsec policy add spd 1 priority 68 outbound action bypass local-ip-range 10.10.77.0 - 10.10.77.255 remote-ip-range 20.20.87.0 - 20.20.87.255
exec ipsec policy add spd 1 priority 69 outbound action bypass local-ip-range 10.10.78.0 - 10.10.78.255 remote-ip-range 20.20.88.0 - 20.20.88.255
exec ipsec policy add spd 1 priority 70 outbound action bypass local-ip-range 10.10.79.0 - 10.10.79.255 remote-ip-range 20.20.89.0 - 20.20.89.255
exec ipsec policy add spd 1 priority 71 outbound action bypass local-ip-range 10.10.80.0 - 10.10.80.255 remote-ip-range 20.20.90.0 - 20.20.90.255
exec ipsec policy add spd 1 priority 72 outbound action bypass local-ip-range 10.10.81.0 - 10.10.81.255 remote-ip-range 20.20.91.0 - 20.20.91.255
exec ipsec policy add spd 1 priority 73 outbound action bypass local-ip-range 10.10.82.0 - 10.10.82.255 remote-ip-range 20.20.92.0 - 20.20.92.255
exec ipsec policy add spd 1 priority 74 outbound action bypass local-ip-range 10.10.83.0 - 10.10.83.255 remote-ip-range 20.20.93.0 - 20.20.93.255
exec ipsec policy add spd 1 priority 75 outbound action bypass local-ip-range 10.10.84.0 - 10.10.84.255 remote-ip-range 20.20.94.0 - 20.20.94.255
exec ipsec policy add spd 1 priority 76 outbound action bypass local-ip-range 10.10.85.0 - 10.10.85.255 remote-ip-range 20.20.95.0 - 20.20.95.255
exec ipsec policy add spd 1 priority 77 outbound action bypass local-ip-range 10.10.86.0 - 10.10.86.255 remote-ip-range 20.20.96.0 - 20.20.96.255
exec ipsec policy add spd 1 priority 78 outbound action bypass local-ip-range 10.10.87.0 - 10.10.87.255 remote-ip-range 20.20.97.0 - 20.20.97.255
exec ipsec policy add spd 1 priority 79 outbound action bypass local-ip-range 10.10.88.0 - 10.10.88.255 remote-ip-range 20.20.98.0 - 20.20.98.255
exec ipsec policy add spd 1 priority 80 outbound action bypass local-ip-range 10.10.89.0 - 10.10.89.255 remote-ip-range 20.20.99.0 - 20.20.99.255
exec ipsec policy add spd 1 priority 81 outbound action bypass local-ip-range 10.10.90.0 - 10.10.90.255 remote-ip-range 20.20.100.0 - 20.20.100.255
exec ipsec policy add spd 1 priority 82 outbound action bypass local-ip-range 10.10.91.0 - 10.10.91.255 remote-ip-range 20.20.101.0 - 20.20.101.255
exec ipsec policy add spd 1 priority 83 outbound action bypass local-ip-range 10.10.92.0 - 10.10.92.255 remote-ip-range 20.20.102.0 - 20.20.102.255
exec ipsec policy add spd 1 priority 84 outbound action bypass local-ip-range 10.10.93.0 - 10.10.93.255 remote-ip-range 20.20.103.0 - 20.20.103.255
exec ipsec policy add spd 1 priority 85 outbound action bypass local-ip-range 10.10.94.0 - 10.10.94.255 remote-ip-range 20.20.104.0 - 20.20.104.255
exec ipsec policy add spd 1 priority 86 outbound action bypass local-ip-range 10.10.95.0 - 10.10.95.255 remote-ip-range 20.20.105.0 - 20.20.105.255
exec ipsec policy add spd 1 priority 87 outbound action bypass local-ip-range 10.10.96.0 - 10.10.96.255 remote-ip-range 20.20.106.0 - 20.20.106.255
exec ipsec policy add spd 1 priority 88 outbound action bypass local-ip-range 10.10.97.0 - 10.10.97.255 remote-ip-range 20.20.107.0 - 20.20.107.255
exec ipsec policy add spd 1 priority 89 outbound action bypass local-ip-range 10.10.98.0 - 10.10.98.255 remote-ip-range 20.20.108.0 - 20.20.108.255
exec ipsec policy add spd 1 priority 90 outbound action bypass local-ip-range 10.10.99.0 - 10.10.99.255 remote-ip-range 20.20.109.0 - 20.20.109.255
exec ipsec policy add spd 1 priority 91 outbound action bypass local-ip-range 10.10.100.0 - 10.10.100.255 remote-ip-range 20.20.110.0 - 20.20.110.255
exec ipsec policy add spd 1 priority 92 outbound action bypass local-ip-range 10.10.101.0 - 10.10.101.255 remote-ip-range 20.20.111.0 - 20.20.111.255
exec ipsec policy add spd 1 priority 93 outbound action bypass local-ip-range 10.10.102.0 - 10.10.102.255 remote-ip-range 20.20.112.0 - 20.20.112.255
exec ipsec policy add spd 1 priority 94 outbound action bypass local-ip-range 10.10.103.0 - 10.10.103.255 remote-ip-range 20.20.113.0 - 20.20.113.255
exec ipsec policy add spd 1 priority 95 outbound action bypass local-ip-range 10.10.104.0 - 10.10.104.255 remote-ip-range 20.20.114.0 - 20.20.114.255
exec ipsec policy add spd 1 priority 96 outbound action bypass local-ip-range 10.10.105.0 - 10.10.105.255 remote-ip-range 20.20.115.0 - 20.20.115.255
exec ipsec policy add spd 1 priority 97 outbound action bypass local-ip-range 10.10.106.0 - 10.10.106.255 remote-ip-range 20.20.116.0 - 20.20.116.255
exec ipsec policy add spd 1 priority 98 outbound action bypass local-ip-range 10.10.107.0 - 10.10.107.255 remote-ip-range 20.20.117.0 - 20.20.117.255
exec ipsec policy add spd 1 priority 99 outbound action bypass local-ip-range 10.10.108.0 - 10.10.108.255 remote-ip-range 20.20.118.0 - 20.20.118.255
exec ipsec policy add spd 1 priority 100 outbound action bypass local-ip-range 10.10.109.0 - 10.10.109.255 remote-ip-range 20.20.119.0 - 20.20.119.255
exec ipsec policy add spd 2 priority 2 outbound action bypass local-ip-range 20.20.21.0 - 20.20.21.255 remote-ip-range 10.10.11.0 - 10.10.11.255
exec ipsec policy add spd 2 priority 3 outbound action bypass local-ip-range 20.20.22.0 - 20.20.22.255 remote-ip-range 10.10.12.0 - 10.10.12.255
exec ipsec policy add spd 2 priority 4 outbound action bypass local-ip-range 20.20.23.0 - 20.20.23.255 remote-ip-range 10.10.13.0 - 10.10.13.255
exec ipsec policy add spd 2 priority 5 outbound action bypass local-ip-range 20.20.24.0 - 20.20.24.255 remote-ip-range 10.10.14.0 - 10.10.14.255
exec ipsec policy add spd 2 priority 6 outbound action bypass local-ip-range 20.20.25.0 - 20.20.25.255 remote-ip-range 10.10.15.0 - 10.10.15.255
exec ipsec policy add spd 2 priority 7 outbound action bypass local-ip-range 20.20.26.0 - 20.20.26.255 remote-ip-range 10.10.16.0 - 10.10.16.255
exec ipsec policy add spd 2 priority 8 outbound action bypass local-ip-range 20.20.27.0 - 20.20.27.255 remote-ip-range 10.10.17.0 - 10.10.17.255
exec ipsec policy add spd 2 priority 9 outbound action bypass local-ip-range 20.20.28.0 - 20.20.28.255 remote-ip-range 10.10.18.0 - 10.10.18.255
exec ipsec policy add spd 2 priority 10 outbound action bypass local-ip-range 20.20.29.0 - 20.20.29.255 remote-ip-range 10.10.19.0 - 10.10.19.255
exec ipsec policy add spd 2 priority 11 outbound action bypass local-ip-range 20.20.30.0 - 20.20.30.255 remote-ip-range 10.10.20.0 - 10.10.20.255
exec ipsec policy add spd 2 priority 12 outbound action bypass local-ip-range 20.20.31.0 - 20.20.31.255 remote-ip-range 10.10.21.0 - 10.10.21.255
exec ipsec policy add spd 2 priority 13 outbound action bypass local-ip-range 20.20.32.0 - 20.20.32.255 remote-ip-range 10.10.22.0 - 10.10.22.255
exec ipsec policy add spd 2 priority 14 outbound action bypass local-ip-range 20.20.33.0 - 20.20.33.255 remote-ip-range 10.10.23.0 - 10.10.23.255
exec ipsec policy add spd 2 priority 15 outbound action bypass local-ip-range 20.20.34.0 - 20.20.34.255 remote-ip-range 10.10.24.0 - 10.10.24.255
exec ipsec policy add spd 2 priority 16 outbound action bypass local-ip-range 20.20.35.0 - 20.20.35.255 remote-ip-range 10.10.25.0 - 10.10.25.255
exec ipsec policy add spd 2 priority 17 outbound action bypass local-ip-range 20.20.36.0 - 20.20.36.255 remote-ip-range 10.10.26.0 - 10.10.26.255
exec ipsec policy add spd 2 priority 18 outbound action bypass local-ip-range 20.20.37.0 - 20.20.37.255 remote-ip-range 10.10.27.0 - 10.10.27.255
exec ipsec policy add spd 2 priority 19 outbound action bypass local-ip-range 20.20.38.0 - 20.20.38.255 remote-ip-range 10.10.28.0 - 10.10.28.255
exec ipsec policy add spd 2 priority 20 outbound action bypass local-ip-range 20.20.39.0 - 20.20.39.255 remote-ip-range 10.10.29.0 - 10.10.29.255
exec ipsec policy add spd 2 priority 21 outbound action bypass local-ip-range 20.20.40.0 - 20.20.40.255 remote-ip-range 10.10.30.0 - 10.10.30.255
exec ipsec policy add spd 2 priority 22 outbound action bypass local-ip-range 20.20.41.0 - 20.20.41.255 remote-ip-range 10.10.31.0 - 10.10.31.255
exec ipsec policy add spd 2 priority 23 outbound action bypass local-ip-range 20.20.42.0 - 20.20.42.255 remote-ip-range 10.10.32.0 - 10.10.32.255
exec ipsec policy add spd 2 priority 24 outbound action bypass local-ip-range 20.20.43.0 - 20.20.43.255 remote-ip-range 10.10.33.0 - 10.10.33.255
exec ipsec policy add spd 2 priority 25 outbound action bypass local-ip-range 20.20.44.0 - 20.20.44.255 remote-ip-range 10.10.34.0 - 10.10.34.255
exec ipsec policy add spd 2 priority 26 outbound action bypass local-ip-range 20.20.45.0 - 20.20.45.255 remote-ip-range 10.10.35.0 - 10.10.35.255
exec ipsec policy add spd 2 priority 27 outbound action bypass local-ip-range 20.20.46.0 - 20.20.46.255 remote-ip-range 10.10.36.0 - 10.10.36.255
exec ipsec policy add spd 2 priority 28 outbound action bypass local-ip-range 20.20.47.0 - 20.20.47.255 remote-ip-range 10.10.37.0 - 10.10.37.255
exec ipsec policy add spd 2 priority 29 outbound action bypass local-ip-range 20.20.48.0 - 20.20.48.255 remote-ip-range 10.10.38.0 - 10.10.38.255
exec ipsec policy add spd 2 priority 30 outbound action bypass local-ip-range 20.20.49.0 - 20.20.49.255 remote-ip-range 10.10.39.0 - 10.10.39.255
exec ipsec policy add spd 2 priority 31 outbound action bypass local-ip-range 20.20.50.0 - 20.20.50.255 remote-ip-range 10.10.40.0 - 10.10.40.255
exec ipsec policy add spd 2 priority 32 outbound action bypass local-ip-range 20.20.51.0 - 20.20.51.255 remote-ip-range 10.10.41.0 - 10.10.41.255
exec ipsec policy add spd 2 priority 33 outbound action bypass local-ip-range 20.20.52.0 - 20.20.52.255 remote-ip-range 10.10.42.0 - 10.10.42.255
exec ipsec policy add spd 2 priority 34 outbound action bypass local-ip-range 20.20.53.0 - 20.20.53.255 remote-ip-range 10.10.43.0 - 10.10.43.255
exec ipsec policy add spd 2 priority 35 outbound action bypass local-ip-range 20.20.54.0 - 20.20.54.255 remote-ip-range 10.10.44.0 - 10.10.44.255
exec ipsec policy add spd 2 priority 36 outbound action bypass local-ip-range 20.20.55.0 - 20.20.55.255 remote-ip-range 10.10.45.0 - 10.10.45.255
exec ipsec policy add spd 2 priority 37 outbound action bypass local-ip-range 20.20.56.0 - 20.20.56.255 remote-ip-range 10.10.46.0 - 10.10.46.255
exec ipsec policy add spd 2 priority 38 outbound action bypass local-ip-range 20.20.57.0 - 20.20.57.255 remote-ip-range 10.10.47.0 - 10.10.47.255
exec ipsec policy add spd 2 priority 39 outbound action bypass local-ip-range 20.20.58.0 - 20.20.58.255 remote-ip-range 10.10.48.0 - 10.10.48.255
exec ipsec policy add spd 2 priority 40 outbound action bypass local-ip-range 20.20.59.0 - 20.20.59.255 remote-ip-range 10.10.49.0 - 10.10.49.255
exec ipsec policy add spd 2 priority 41 outbound action bypass local-ip-range 20.20.60.0 - 20.20.60.255 remote-ip-range 10.10.50.0 - 10.10.50.255
exec ipsec policy add spd 2 priority 42 outbound action bypass local-ip-range 20.20.61.0 - 20.20.61.255 remote-ip-range 10.10.51.0 - 10.10.51.255
exec ipsec policy add spd 2 priority 43 outbound action bypass local-ip-range 20.20.62.0 - 20.20.62.255 remote-ip-range 10.10.52.0 - 10.10.52.255
exec ipsec policy add spd 2 priority 44 outbound action bypass local-ip-range 20.20.63.0 - 20.20.63.255 remote-ip-range 10.10.53.0 - 10.10.53.255
exec ipsec policy add spd 2 priority 45 outbound action bypass local-ip-range 20.20.64.0 - 20.20.64.255 remote-ip-range 10.10.54.0 - 10.10.54.255
exec ipsec policy add spd 2 priority 46 outbound action bypass local-ip-range 20.20.65.0 - 20.20.65.255 remote-ip-range 10.10.55.0 - 10.10.55.255
exec ipsec policy add spd 2 priority 47 outbound action bypass local-ip-range 20.20.66.0 - 20.20.66.255 remote-ip-range 10.10.56.0 - 10.10.56.255
exec ipsec policy add spd 2 priority 48 outbound action bypass local-ip-range 20.20.67.0 - 20.20.67.255 remote-ip-range 10.10.57.0 - 10.10.57.255
exec ipsec policy add spd 2 priority 49 outbound action bypass local-ip-range 20.20.68.0 - 20.20.68.255 remote-ip-range 10.10.58.0 - 10.10.58.255
exec ipsec policy add spd 2 priority 50 outbound action bypass local-ip-range 20.20.69.0 - 20.20.69.255 remote-ip-range 10.10.59.0 - 10.10.59.255
exec ipsec policy add spd 2 priority 51 outbound action bypass local-ip-range 20.20.70.0 - 20.20.70.255 remote-ip-range 10.10.60.0 - 10.10.60.255
exec ipsec policy add spd 2 priority 52 outbound action bypass local-ip-range 20.20.71.0 - 20.20.71.255 remote-ip-range 10.10.61.0 - 10.10.61.255
exec ipsec policy add spd 2 priority 53 outbound action bypass local-ip-range 20.20.72.0 - 20.20.72.255 remote-ip-range 10.10.62.0 - 10.10.62.255
exec ipsec policy add spd 2 priority 54 outbound action bypass local-ip-range 20.20.73.0 - 20.20.73.255 remote-ip-range 10.10.63.0 - 10.10.63.255
exec ipsec policy add spd 2 priority 55 outbound action bypass local-ip-range 20.20.74.0 - 20.20.74.255 remote-ip-range 10.10.64.0 - 10.10.64.255
exec ipsec policy add spd 2 priority 56 outbound action bypass local-ip-range 20.20.75.0 - 20.20.75.255 remote-ip-range 10.10.65.0 - 10.10.65.255
exec ipsec policy add spd 2 priority 57 outbound action bypass local-ip-range 20.20.76.0 - 20.20.76.255 remote-ip-range 10.10.66.0 - 10.10.66.255
exec ipsec policy add spd 2 priority 58 outbound action bypass local-ip-range 20.20.77.0 - 20.20.77.255 remote-ip-range 10.10.67.0 - 10.10.67.255
exec ipsec policy add spd 2 priority 59 outbound action bypass local-ip-range 20.20.78.0 - 20.20.78.255 remote-ip-range 10.10.68.0 - 10.10.68.255
exec ipsec policy add spd 2 priority 60 outbound action bypass local-ip-range 20.20.79.0 - 20.20.79.255 remote-ip-range 10.10.69.0 - 10.10.69.255
exec ipsec policy add spd 2 priority 61 outbound action bypass local-ip-range 20.20.80.0 - 20.20.80.255 remote-ip-range 10.10.70.0 - 10.10.70.255
exec ipsec policy add spd 2 priority 62 outbound action bypass local-ip-range 20.20.81.0 - 20.20.81.255 remote-ip-range 10.10.71.0 - 10.10.71.255
exec ipsec policy add spd 2 priority 63 outbound action bypass local-ip-range 20.20.82.0 - 20.20.82.255 remote-ip-range 10.10.72.0 - 10.10.72.255
exec ipsec policy add spd 2 priority 64 outbound action bypass local-ip-range 20.20.83.0 - 20.20.83.255 remote-ip-range 10.10.73.0 - 10.10.73.255
exec ipsec policy add spd 2 priority 65 outbound action bypass local-ip-range 20.20.84.0 - 20.20.84.255 remote-ip-range 10.10.74.0 - 10.10.74.255
exec ipsec policy add spd 2 priority 66 outbound action bypass local-ip-range 20.20.85.0 - 20.20.85.255 remote-ip-range 10.10.75.0 - 10.10.75.255
exec ipsec policy add spd 2 priority 67 outbound action bypass local-ip-range 20.20.86.0 - 20.20.86.255 remote-ip-range 10.10.76.0 - 10.10.76.255
exec ipsec policy add spd 2 priority 68 outbound action bypass local-ip-range 20.20.87.0 - 20.20.87.255 remote-ip-range 10.10.77.0 - 10.10.77.255
exec ipsec policy add spd 2 priority 69 outbound action bypass local-ip-range 20.20.88.0 - 20.20.88.255 remote-ip-range 10.10.78.0 - 10.10.78.255
exec ipsec policy add spd 2 priority 70 outbound action bypass local-ip-range 20.20.89.0 - 20.20.89.255 remote-ip-range 10.10.79.0 - 10.10.79.255
exec ipsec policy add spd 2 priority 71 outbound action bypass local-ip-range 20.20.90.0 - 20.20.90.255 remote-ip-range 10.10.80.0 - 10.10.80.255
exec ipsec policy add spd 2 priority 72 outbound action bypass local-ip-range 20.20.91.0 - 20.20.91.255 remote-ip-range 10.10.81.0 - 10.10.81.255
exec ipsec policy add spd 2 priority 73 outbound action bypass local-ip-range 20.20.92.0 - 20.20.92.255 remote-ip-range 10.10.82.0 - 10.10.82.255
exec ipsec policy add spd 2 priority 74 outbound action bypass local-ip-range 20.20.93.0 - 20.20.93.255 remote-ip-range 10.10.83.0 - 10.10.83.255
exec ipsec policy add spd 2 priority 75 outbound action bypass local-ip-range 20.20.94.0 - 20.20.94.255 remote-ip-range 10.10.84.0 - 10.10.84.255
exec ipsec policy add spd 2 priority 76 outbound action bypass local-ip-range 20.20.95.0 - 20.20.95.255 remote-ip-range 10.10.85.0 - 10.10.85.255
exec ipsec policy add spd 2 priority 77 outbound action bypass local-ip-range 20.20.96.0 - 20.20.96.255 remote-ip-range 10.10.86.0 - 10.10.86.255
exec ipsec policy add spd 2 priority 78 outbound action bypass local-ip-range 20.20.97.0 - 20.20.97.255 remote-ip-range 10.10.87.0 - 10.10.87.255
exec ipsec policy add spd 2 priority 79 outbound action bypass local-ip-range 20.20.98.0 - 20.20.98.255 remote-ip-range 10.10.88.0 - 10.10.88.255
exec ipsec policy add spd 2 priority 80 outbound action bypass local-ip-range 20.20.99.0 - 20.20.99.255 remote-ip-range 10.10.89.0 - 10.10.89.255
exec ipsec policy add spd 2 priority 81 outbound action bypass local-ip-range 20.20.100.0 - 20.20.100.255 remote-ip-range 10.10.90.0 - 10.10.90.255
exec ipsec policy add spd 2 priority 82 outbound action bypass local-ip-range 20.20.101.0 - 20.20.101.255 remote-ip-range 10.10.91.0 - 10.10.91.255
exec ipsec policy add spd 2 priority 83 outbound action bypass local-ip-range 20.20.102.0 - 20.20.102.255 remote-ip-range 10.10.92.0 - 10.10.92.255
exec ipsec policy add spd 2 priority 84 outbound action bypass local-ip-range 20.20.103.0 - 20.20.103.255 remote-ip-range 10.10.93.0 - 10.10.93.255
exec ipsec policy add spd 2 priority 85 outbound action bypass local-ip-range 20.20.104.0 - 20.20.104.255 remote-ip-range 10.10.94.0 - 10.10.94.255
exec ipsec policy add spd 2 priority 86 outbound action bypass local-ip-range 20.20.105.0 - 20.20.105.255 remote-ip-range 10.10.95.0 - 10.10.95.255
exec ipsec policy add spd 2 priority 87 outbound action bypass local-ip-range 20.20.106.0 - 20.20.106.255 remote-ip-range 10.10.96.0 - 10.10.96.255
exec ipsec policy add spd 2 priority 88 outbound action bypass local-ip-range 20.20.107.0 - 20.20.107.255 remote-ip-range 10.10.97.0 - 10.10.97.255
exec ipsec policy add spd 2 priority 89 outbound action bypass local-ip-range 20.20.108.0 - 20.20.108.255 remote-ip-range 10.10.98.0 - 10.10.98.255
exec ipsec policy add spd 2 priority 90 outbound action bypass local-ip-range 20.20.109.0 - 20.20.109.255 remote-ip-range 10.10.99.0 - 10.10.99.255
exec ipsec policy add spd 2 priority 91 outbound action bypass local-ip-range 20.20.110.0 - 20.20.110.255 remote-ip-range 10.10.100.0 - 10.10.100.255
exec ipsec policy add spd 2 priority 92 outbound action bypass local-ip-range 20.20.111.0 - 20.20.111.255 remote-ip-range 10.10.101.0 - 10.10.101.255
exec ipsec policy add spd 2 priority 93 outbound action bypass local-ip-range 20.20.112.0 - 20.20.112.255 remote-ip-range 10.10.102.0 - 10.10.102.255
exec ipsec policy add spd 2 priority 94 outbound action bypass local-ip-range 20.20.113.0 - 20.20.113.255 remote-ip-range 10.10.103.0 - 10.10.103.255
exec ipsec policy add spd 2 priority 95 outbound action bypass local-ip-range 20.20.114.0 - 20.20.114.255 remote-ip-range 10.10.104.0 - 10.10.104.255
exec ipsec policy add spd 2 priority 96 outbound action bypass local-ip-range 20.20.115.0 - 20.20.115.255 remote-ip-range 10.10.105.0 - 10.10.105.255
exec ipsec policy add spd 2 priority 97 outbound action bypass local-ip-range 20.20.116.0 - 20.20.116.255 remote-ip-range 10.10.106.0 - 10.10.106.255
exec ipsec policy add spd 2 priority 98 outbound action bypass local-ip-range 20.20.117.0 - 20.20.117.255 remote-ip-range 10.10.107.0 - 10.10.107.255
exec ipsec policy add spd 2 priority 99 outbound action bypass local-ip-range 20.20.118.0 - 20.20.118.255 remote-ip-range 10.10.108.0 - 10.10.108.255
exec ipsec policy add spd 2 priority 100 outbound action bypass local-ip-range 20.20.119.0 - 20.20.119.255 remote-ip-range 10.10.109.0 - 10.10.109.255
cli_inband(cmd=’show ipsec all’)

 64b-2t2c-ethip4ipsec100spe-cache- 
ip4base-policy-outbound-nocrypto-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:90’, ‘ip_address’: ‘10.10.10.2’})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:91’, ‘ip_address’: ‘20.20.20.2’})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnx01’}}})
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14x01’}}})
ipsec_spd_add_del(is_add=True,spd_id=1)
ipsec_interface_add_del_spd(is_add=True,sw_if_index=2,spd_id=1)
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 1, ‘is_outbound’: True, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 0, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14xff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnx00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_spd_add_del(is_add=True,spd_id=2)
ipsec_interface_add_del_spd(is_add=True,sw_if_index=1,spd_id=2)
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 2, ‘priority’: 1, ‘is_outbound’: True, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 0, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnx00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnxff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14xff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
exec ipsec policy add spd 1 priority 2 outbound action bypass local-ip-range 10.10.11.0 - 10.10.11.255 remote-ip-range 20.20.21.0 - 20.20.21.255
exec ipsec policy add spd 1 priority 3 outbound action bypass local-ip-range 10.10.12.0 - 10.10.12.255 remote-ip-range 20.20.22.0 - 20.20.22.255
exec ipsec policy add spd 1 priority 4 outbound action bypass local-ip-range 10.10.13.0 - 10.10.13.255 remote-ip-range 20.20.23.0 - 20.20.23.255
exec ipsec policy add spd 1 priority 5 outbound action bypass local-ip-range 10.10.14.0 - 10.10.14.255 remote-ip-range 20.20.24.0 - 20.20.24.255
exec ipsec policy add spd 1 priority 6 outbound action bypass local-ip-range 10.10.15.0 - 10.10.15.255 remote-ip-range 20.20.25.0 - 20.20.25.255
exec ipsec policy add spd 1 priority 7 outbound action bypass local-ip-range 10.10.16.0 - 10.10.16.255 remote-ip-range 20.20.26.0 - 20.20.26.255
exec ipsec policy add spd 1 priority 8 outbound action bypass local-ip-range 10.10.17.0 - 10.10.17.255 remote-ip-range 20.20.27.0 - 20.20.27.255
exec ipsec policy add spd 1 priority 9 outbound action bypass local-ip-range 10.10.18.0 - 10.10.18.255 remote-ip-range 20.20.28.0 - 20.20.28.255
exec ipsec policy add spd 1 priority 10 outbound action bypass local-ip-range 10.10.19.0 - 10.10.19.255 remote-ip-range 20.20.29.0 - 20.20.29.255
exec ipsec policy add spd 1 priority 11 outbound action bypass local-ip-range 10.10.20.0 - 10.10.20.255 remote-ip-range 20.20.30.0 - 20.20.30.255
exec ipsec policy add spd 1 priority 12 outbound action bypass local-ip-range 10.10.21.0 - 10.10.21.255 remote-ip-range 20.20.31.0 - 20.20.31.255
exec ipsec policy add spd 1 priority 13 outbound action bypass local-ip-range 10.10.22.0 - 10.10.22.255 remote-ip-range 20.20.32.0 - 20.20.32.255
exec ipsec policy add spd 1 priority 14 outbound action bypass local-ip-range 10.10.23.0 - 10.10.23.255 remote-ip-range 20.20.33.0 - 20.20.33.255
exec ipsec policy add spd 1 priority 15 outbound action bypass local-ip-range 10.10.24.0 - 10.10.24.255 remote-ip-range 20.20.34.0 - 20.20.34.255
exec ipsec policy add spd 1 priority 16 outbound action bypass local-ip-range 10.10.25.0 - 10.10.25.255 remote-ip-range 20.20.35.0 - 20.20.35.255
exec ipsec policy add spd 1 priority 17 outbound action bypass local-ip-range 10.10.26.0 - 10.10.26.255 remote-ip-range 20.20.36.0 - 20.20.36.255
exec ipsec policy add spd 1 priority 18 outbound action bypass local-ip-range 10.10.27.0 - 10.10.27.255 remote-ip-range 20.20.37.0 - 20.20.37.255
exec ipsec policy add spd 1 priority 19 outbound action bypass local-ip-range 10.10.28.0 - 10.10.28.255 remote-ip-range 20.20.38.0 - 20.20.38.255
exec ipsec policy add spd 1 priority 20 outbound action bypass local-ip-range 10.10.29.0 - 10.10.29.255 remote-ip-range 20.20.39.0 - 20.20.39.255
exec ipsec policy add spd 1 priority 21 outbound action bypass local-ip-range 10.10.30.0 - 10.10.30.255 remote-ip-range 20.20.40.0 - 20.20.40.255
exec ipsec policy add spd 1 priority 22 outbound action bypass local-ip-range 10.10.31.0 - 10.10.31.255 remote-ip-range 20.20.41.0 - 20.20.41.255
exec ipsec policy add spd 1 priority 23 outbound action bypass local-ip-range 10.10.32.0 - 10.10.32.255 remote-ip-range 20.20.42.0 - 20.20.42.255
exec ipsec policy add spd 1 priority 24 outbound action bypass local-ip-range 10.10.33.0 - 10.10.33.255 remote-ip-range 20.20.43.0 - 20.20.43.255
exec ipsec policy add spd 1 priority 25 outbound action bypass local-ip-range 10.10.34.0 - 10.10.34.255 remote-ip-range 20.20.44.0 - 20.20.44.255
exec ipsec policy add spd 1 priority 26 outbound action bypass local-ip-range 10.10.35.0 - 10.10.35.255 remote-ip-range 20.20.45.0 - 20.20.45.255
exec ipsec policy add spd 1 priority 27 outbound action bypass local-ip-range 10.10.36.0 - 10.10.36.255 remote-ip-range 20.20.46.0 - 20.20.46.255
exec ipsec policy add spd 1 priority 28 outbound action bypass local-ip-range 10.10.37.0 - 10.10.37.255 remote-ip-range 20.20.47.0 - 20.20.47.255
exec ipsec policy add spd 1 priority 29 outbound action bypass local-ip-range 10.10.38.0 - 10.10.38.255 remote-ip-range 20.20.48.0 - 20.20.48.255
exec ipsec policy add spd 1 priority 30 outbound action bypass local-ip-range 10.10.39.0 - 10.10.39.255 remote-ip-range 20.20.49.0 - 20.20.49.255
exec ipsec policy add spd 1 priority 31 outbound action bypass local-ip-range 10.10.40.0 - 10.10.40.255 remote-ip-range 20.20.50.0 - 20.20.50.255
exec ipsec policy add spd 1 priority 32 outbound action bypass local-ip-range 10.10.41.0 - 10.10.41.255 remote-ip-range 20.20.51.0 - 20.20.51.255
exec ipsec policy add spd 1 priority 33 outbound action bypass local-ip-range 10.10.42.0 - 10.10.42.255 remote-ip-range 20.20.52.0 - 20.20.52.255
exec ipsec policy add spd 1 priority 34 outbound action bypass local-ip-range 10.10.43.0 - 10.10.43.255 remote-ip-range 20.20.53.0 - 20.20.53.255
exec ipsec policy add spd 1 priority 35 outbound action bypass local-ip-range 10.10.44.0 - 10.10.44.255 remote-ip-range 20.20.54.0 - 20.20.54.255
exec ipsec policy add spd 1 priority 36 outbound action bypass local-ip-range 10.10.45.0 - 10.10.45.255 remote-ip-range 20.20.55.0 - 20.20.55.255
exec ipsec policy add spd 1 priority 37 outbound action bypass local-ip-range 10.10.46.0 - 10.10.46.255 remote-ip-range 20.20.56.0 - 20.20.56.255
exec ipsec policy add spd 1 priority 38 outbound action bypass local-ip-range 10.10.47.0 - 10.10.47.255 remote-ip-range 20.20.57.0 - 20.20.57.255
exec ipsec policy add spd 1 priority 39 outbound action bypass local-ip-range 10.10.48.0 - 10.10.48.255 remote-ip-range 20.20.58.0 - 20.20.58.255
exec ipsec policy add spd 1 priority 40 outbound action bypass local-ip-range 10.10.49.0 - 10.10.49.255 remote-ip-range 20.20.59.0 - 20.20.59.255
exec ipsec policy add spd 1 priority 41 outbound action bypass local-ip-range 10.10.50.0 - 10.10.50.255 remote-ip-range 20.20.60.0 - 20.20.60.255
exec ipsec policy add spd 1 priority 42 outbound action bypass local-ip-range 10.10.51.0 - 10.10.51.255 remote-ip-range 20.20.61.0 - 20.20.61.255
exec ipsec policy add spd 1 priority 43 outbound action bypass local-ip-range 10.10.52.0 - 10.10.52.255 remote-ip-range 20.20.62.0 - 20.20.62.255
exec ipsec policy add spd 1 priority 44 outbound action bypass local-ip-range 10.10.53.0 - 10.10.53.255 remote-ip-range 20.20.63.0 - 20.20.63.255
exec ipsec policy add spd 1 priority 45 outbound action bypass local-ip-range 10.10.54.0 - 10.10.54.255 remote-ip-range 20.20.64.0 - 20.20.64.255
exec ipsec policy add spd 1 priority 46 outbound action bypass local-ip-range 10.10.55.0 - 10.10.55.255 remote-ip-range 20.20.65.0 - 20.20.65.255
exec ipsec policy add spd 1 priority 47 outbound action bypass local-ip-range 10.10.56.0 - 10.10.56.255 remote-ip-range 20.20.66.0 - 20.20.66.255
exec ipsec policy add spd 1 priority 48 outbound action bypass local-ip-range 10.10.57.0 - 10.10.57.255 remote-ip-range 20.20.67.0 - 20.20.67.255
exec ipsec policy add spd 1 priority 49 outbound action bypass local-ip-range 10.10.58.0 - 10.10.58.255 remote-ip-range 20.20.68.0 - 20.20.68.255
exec ipsec policy add spd 1 priority 50 outbound action bypass local-ip-range 10.10.59.0 - 10.10.59.255 remote-ip-range 20.20.69.0 - 20.20.69.255
exec ipsec policy add spd 1 priority 51 outbound action bypass local-ip-range 10.10.60.0 - 10.10.60.255 remote-ip-range 20.20.70.0 - 20.20.70.255
exec ipsec policy add spd 1 priority 52 outbound action bypass local-ip-range 10.10.61.0 - 10.10.61.255 remote-ip-range 20.20.71.0 - 20.20.71.255
exec ipsec policy add spd 1 priority 53 outbound action bypass local-ip-range 10.10.62.0 - 10.10.62.255 remote-ip-range 20.20.72.0 - 20.20.72.255
exec ipsec policy add spd 1 priority 54 outbound action bypass local-ip-range 10.10.63.0 - 10.10.63.255 remote-ip-range 20.20.73.0 - 20.20.73.255
exec ipsec policy add spd 1 priority 55 outbound action bypass local-ip-range 10.10.64.0 - 10.10.64.255 remote-ip-range 20.20.74.0 - 20.20.74.255
exec ipsec policy add spd 1 priority 56 outbound action bypass local-ip-range 10.10.65.0 - 10.10.65.255 remote-ip-range 20.20.75.0 - 20.20.75.255
exec ipsec policy add spd 1 priority 57 outbound action bypass local-ip-range 10.10.66.0 - 10.10.66.255 remote-ip-range 20.20.76.0 - 20.20.76.255
exec ipsec policy add spd 1 priority 58 outbound action bypass local-ip-range 10.10.67.0 - 10.10.67.255 remote-ip-range 20.20.77.0 - 20.20.77.255
exec ipsec policy add spd 1 priority 59 outbound action bypass local-ip-range 10.10.68.0 - 10.10.68.255 remote-ip-range 20.20.78.0 - 20.20.78.255
exec ipsec policy add spd 1 priority 60 outbound action bypass local-ip-range 10.10.69.0 - 10.10.69.255 remote-ip-range 20.20.79.0 - 20.20.79.255
exec ipsec policy add spd 1 priority 61 outbound action bypass local-ip-range 10.10.70.0 - 10.10.70.255 remote-ip-range 20.20.80.0 - 20.20.80.255
exec ipsec policy add spd 1 priority 62 outbound action bypass local-ip-range 10.10.71.0 - 10.10.71.255 remote-ip-range 20.20.81.0 - 20.20.81.255
exec ipsec policy add spd 1 priority 63 outbound action bypass local-ip-range 10.10.72.0 - 10.10.72.255 remote-ip-range 20.20.82.0 - 20.20.82.255
exec ipsec policy add spd 1 priority 64 outbound action bypass local-ip-range 10.10.73.0 - 10.10.73.255 remote-ip-range 20.20.83.0 - 20.20.83.255
exec ipsec policy add spd 1 priority 65 outbound action bypass local-ip-range 10.10.74.0 - 10.10.74.255 remote-ip-range 20.20.84.0 - 20.20.84.255
exec ipsec policy add spd 1 priority 66 outbound action bypass local-ip-range 10.10.75.0 - 10.10.75.255 remote-ip-range 20.20.85.0 - 20.20.85.255
exec ipsec policy add spd 1 priority 67 outbound action bypass local-ip-range 10.10.76.0 - 10.10.76.255 remote-ip-range 20.20.86.0 - 20.20.86.255
exec ipsec policy add spd 1 priority 68 outbound action bypass local-ip-range 10.10.77.0 - 10.10.77.255 remote-ip-range 20.20.87.0 - 20.20.87.255
exec ipsec policy add spd 1 priority 69 outbound action bypass local-ip-range 10.10.78.0 - 10.10.78.255 remote-ip-range 20.20.88.0 - 20.20.88.255
exec ipsec policy add spd 1 priority 70 outbound action bypass local-ip-range 10.10.79.0 - 10.10.79.255 remote-ip-range 20.20.89.0 - 20.20.89.255
exec ipsec policy add spd 1 priority 71 outbound action bypass local-ip-range 10.10.80.0 - 10.10.80.255 remote-ip-range 20.20.90.0 - 20.20.90.255
exec ipsec policy add spd 1 priority 72 outbound action bypass local-ip-range 10.10.81.0 - 10.10.81.255 remote-ip-range 20.20.91.0 - 20.20.91.255
exec ipsec policy add spd 1 priority 73 outbound action bypass local-ip-range 10.10.82.0 - 10.10.82.255 remote-ip-range 20.20.92.0 - 20.20.92.255
exec ipsec policy add spd 1 priority 74 outbound action bypass local-ip-range 10.10.83.0 - 10.10.83.255 remote-ip-range 20.20.93.0 - 20.20.93.255
exec ipsec policy add spd 1 priority 75 outbound action bypass local-ip-range 10.10.84.0 - 10.10.84.255 remote-ip-range 20.20.94.0 - 20.20.94.255
exec ipsec policy add spd 1 priority 76 outbound action bypass local-ip-range 10.10.85.0 - 10.10.85.255 remote-ip-range 20.20.95.0 - 20.20.95.255
exec ipsec policy add spd 1 priority 77 outbound action bypass local-ip-range 10.10.86.0 - 10.10.86.255 remote-ip-range 20.20.96.0 - 20.20.96.255
exec ipsec policy add spd 1 priority 78 outbound action bypass local-ip-range 10.10.87.0 - 10.10.87.255 remote-ip-range 20.20.97.0 - 20.20.97.255
exec ipsec policy add spd 1 priority 79 outbound action bypass local-ip-range 10.10.88.0 - 10.10.88.255 remote-ip-range 20.20.98.0 - 20.20.98.255
exec ipsec policy add spd 1 priority 80 outbound action bypass local-ip-range 10.10.89.0 - 10.10.89.255 remote-ip-range 20.20.99.0 - 20.20.99.255
exec ipsec policy add spd 1 priority 81 outbound action bypass local-ip-range 10.10.90.0 - 10.10.90.255 remote-ip-range 20.20.100.0 - 20.20.100.255
exec ipsec policy add spd 1 priority 82 outbound action bypass local-ip-range 10.10.91.0 - 10.10.91.255 remote-ip-range 20.20.101.0 - 20.20.101.255
exec ipsec policy add spd 1 priority 83 outbound action bypass local-ip-range 10.10.92.0 - 10.10.92.255 remote-ip-range 20.20.102.0 - 20.20.102.255
exec ipsec policy add spd 1 priority 84 outbound action bypass local-ip-range 10.10.93.0 - 10.10.93.255 remote-ip-range 20.20.103.0 - 20.20.103.255
exec ipsec policy add spd 1 priority 85 outbound action bypass local-ip-range 10.10.94.0 - 10.10.94.255 remote-ip-range 20.20.104.0 - 20.20.104.255
exec ipsec policy add spd 1 priority 86 outbound action bypass local-ip-range 10.10.95.0 - 10.10.95.255 remote-ip-range 20.20.105.0 - 20.20.105.255
exec ipsec policy add spd 1 priority 87 outbound action bypass local-ip-range 10.10.96.0 - 10.10.96.255 remote-ip-range 20.20.106.0 - 20.20.106.255
exec ipsec policy add spd 1 priority 88 outbound action bypass local-ip-range 10.10.97.0 - 10.10.97.255 remote-ip-range 20.20.107.0 - 20.20.107.255
exec ipsec policy add spd 1 priority 89 outbound action bypass local-ip-range 10.10.98.0 - 10.10.98.255 remote-ip-range 20.20.108.0 - 20.20.108.255
exec ipsec policy add spd 1 priority 90 outbound action bypass local-ip-range 10.10.99.0 - 10.10.99.255 remote-ip-range 20.20.109.0 - 20.20.109.255
exec ipsec policy add spd 1 priority 91 outbound action bypass local-ip-range 10.10.100.0 - 10.10.100.255 remote-ip-range 20.20.110.0 - 20.20.110.255
exec ipsec policy add spd 1 priority 92 outbound action bypass local-ip-range 10.10.101.0 - 10.10.101.255 remote-ip-range 20.20.111.0 - 20.20.111.255
exec ipsec policy add spd 1 priority 93 outbound action bypass local-ip-range 10.10.102.0 - 10.10.102.255 remote-ip-range 20.20.112.0 - 20.20.112.255
exec ipsec policy add spd 1 priority 94 outbound action bypass local-ip-range 10.10.103.0 - 10.10.103.255 remote-ip-range 20.20.113.0 - 20.20.113.255
exec ipsec policy add spd 1 priority 95 outbound action bypass local-ip-range 10.10.104.0 - 10.10.104.255 remote-ip-range 20.20.114.0 - 20.20.114.255
exec ipsec policy add spd 1 priority 96 outbound action bypass local-ip-range 10.10.105.0 - 10.10.105.255 remote-ip-range 20.20.115.0 - 20.20.115.255
exec ipsec policy add spd 1 priority 97 outbound action bypass local-ip-range 10.10.106.0 - 10.10.106.255 remote-ip-range 20.20.116.0 - 20.20.116.255
exec ipsec policy add spd 1 priority 98 outbound action bypass local-ip-range 10.10.107.0 - 10.10.107.255 remote-ip-range 20.20.117.0 - 20.20.117.255
exec ipsec policy add spd 1 priority 99 outbound action bypass local-ip-range 10.10.108.0 - 10.10.108.255 remote-ip-range 20.20.118.0 - 20.20.118.255
exec ipsec policy add spd 1 priority 100 outbound action bypass local-ip-range 10.10.109.0 - 10.10.109.255 remote-ip-range 20.20.119.0 - 20.20.119.255
exec ipsec policy add spd 2 priority 2 outbound action bypass local-ip-range 20.20.21.0 - 20.20.21.255 remote-ip-range 10.10.11.0 - 10.10.11.255
exec ipsec policy add spd 2 priority 3 outbound action bypass local-ip-range 20.20.22.0 - 20.20.22.255 remote-ip-range 10.10.12.0 - 10.10.12.255
exec ipsec policy add spd 2 priority 4 outbound action bypass local-ip-range 20.20.23.0 - 20.20.23.255 remote-ip-range 10.10.13.0 - 10.10.13.255
exec ipsec policy add spd 2 priority 5 outbound action bypass local-ip-range 20.20.24.0 - 20.20.24.255 remote-ip-range 10.10.14.0 - 10.10.14.255
exec ipsec policy add spd 2 priority 6 outbound action bypass local-ip-range 20.20.25.0 - 20.20.25.255 remote-ip-range 10.10.15.0 - 10.10.15.255
exec ipsec policy add spd 2 priority 7 outbound action bypass local-ip-range 20.20.26.0 - 20.20.26.255 remote-ip-range 10.10.16.0 - 10.10.16.255
exec ipsec policy add spd 2 priority 8 outbound action bypass local-ip-range 20.20.27.0 - 20.20.27.255 remote-ip-range 10.10.17.0 - 10.10.17.255
exec ipsec policy add spd 2 priority 9 outbound action bypass local-ip-range 20.20.28.0 - 20.20.28.255 remote-ip-range 10.10.18.0 - 10.10.18.255
exec ipsec policy add spd 2 priority 10 outbound action bypass local-ip-range 20.20.29.0 - 20.20.29.255 remote-ip-range 10.10.19.0 - 10.10.19.255
exec ipsec policy add spd 2 priority 11 outbound action bypass local-ip-range 20.20.30.0 - 20.20.30.255 remote-ip-range 10.10.20.0 - 10.10.20.255
exec ipsec policy add spd 2 priority 12 outbound action bypass local-ip-range 20.20.31.0 - 20.20.31.255 remote-ip-range 10.10.21.0 - 10.10.21.255
exec ipsec policy add spd 2 priority 13 outbound action bypass local-ip-range 20.20.32.0 - 20.20.32.255 remote-ip-range 10.10.22.0 - 10.10.22.255
exec ipsec policy add spd 2 priority 14 outbound action bypass local-ip-range 20.20.33.0 - 20.20.33.255 remote-ip-range 10.10.23.0 - 10.10.23.255
exec ipsec policy add spd 2 priority 15 outbound action bypass local-ip-range 20.20.34.0 - 20.20.34.255 remote-ip-range 10.10.24.0 - 10.10.24.255
exec ipsec policy add spd 2 priority 16 outbound action bypass local-ip-range 20.20.35.0 - 20.20.35.255 remote-ip-range 10.10.25.0 - 10.10.25.255
exec ipsec policy add spd 2 priority 17 outbound action bypass local-ip-range 20.20.36.0 - 20.20.36.255 remote-ip-range 10.10.26.0 - 10.10.26.255
exec ipsec policy add spd 2 priority 18 outbound action bypass local-ip-range 20.20.37.0 - 20.20.37.255 remote-ip-range 10.10.27.0 - 10.10.27.255
exec ipsec policy add spd 2 priority 19 outbound action bypass local-ip-range 20.20.38.0 - 20.20.38.255 remote-ip-range 10.10.28.0 - 10.10.28.255
exec ipsec policy add spd 2 priority 20 outbound action bypass local-ip-range 20.20.39.0 - 20.20.39.255 remote-ip-range 10.10.29.0 - 10.10.29.255
exec ipsec policy add spd 2 priority 21 outbound action bypass local-ip-range 20.20.40.0 - 20.20.40.255 remote-ip-range 10.10.30.0 - 10.10.30.255
exec ipsec policy add spd 2 priority 22 outbound action bypass local-ip-range 20.20.41.0 - 20.20.41.255 remote-ip-range 10.10.31.0 - 10.10.31.255
exec ipsec policy add spd 2 priority 23 outbound action bypass local-ip-range 20.20.42.0 - 20.20.42.255 remote-ip-range 10.10.32.0 - 10.10.32.255
exec ipsec policy add spd 2 priority 24 outbound action bypass local-ip-range 20.20.43.0 - 20.20.43.255 remote-ip-range 10.10.33.0 - 10.10.33.255
exec ipsec policy add spd 2 priority 25 outbound action bypass local-ip-range 20.20.44.0 - 20.20.44.255 remote-ip-range 10.10.34.0 - 10.10.34.255
exec ipsec policy add spd 2 priority 26 outbound action bypass local-ip-range 20.20.45.0 - 20.20.45.255 remote-ip-range 10.10.35.0 - 10.10.35.255
exec ipsec policy add spd 2 priority 27 outbound action bypass local-ip-range 20.20.46.0 - 20.20.46.255 remote-ip-range 10.10.36.0 - 10.10.36.255
exec ipsec policy add spd 2 priority 28 outbound action bypass local-ip-range 20.20.47.0 - 20.20.47.255 remote-ip-range 10.10.37.0 - 10.10.37.255
exec ipsec policy add spd 2 priority 29 outbound action bypass local-ip-range 20.20.48.0 - 20.20.48.255 remote-ip-range 10.10.38.0 - 10.10.38.255
exec ipsec policy add spd 2 priority 30 outbound action bypass local-ip-range 20.20.49.0 - 20.20.49.255 remote-ip-range 10.10.39.0 - 10.10.39.255
exec ipsec policy add spd 2 priority 31 outbound action bypass local-ip-range 20.20.50.0 - 20.20.50.255 remote-ip-range 10.10.40.0 - 10.10.40.255
exec ipsec policy add spd 2 priority 32 outbound action bypass local-ip-range 20.20.51.0 - 20.20.51.255 remote-ip-range 10.10.41.0 - 10.10.41.255
exec ipsec policy add spd 2 priority 33 outbound action bypass local-ip-range 20.20.52.0 - 20.20.52.255 remote-ip-range 10.10.42.0 - 10.10.42.255
exec ipsec policy add spd 2 priority 34 outbound action bypass local-ip-range 20.20.53.0 - 20.20.53.255 remote-ip-range 10.10.43.0 - 10.10.43.255
exec ipsec policy add spd 2 priority 35 outbound action bypass local-ip-range 20.20.54.0 - 20.20.54.255 remote-ip-range 10.10.44.0 - 10.10.44.255
exec ipsec policy add spd 2 priority 36 outbound action bypass local-ip-range 20.20.55.0 - 20.20.55.255 remote-ip-range 10.10.45.0 - 10.10.45.255
exec ipsec policy add spd 2 priority 37 outbound action bypass local-ip-range 20.20.56.0 - 20.20.56.255 remote-ip-range 10.10.46.0 - 10.10.46.255
exec ipsec policy add spd 2 priority 38 outbound action bypass local-ip-range 20.20.57.0 - 20.20.57.255 remote-ip-range 10.10.47.0 - 10.10.47.255
exec ipsec policy add spd 2 priority 39 outbound action bypass local-ip-range 20.20.58.0 - 20.20.58.255 remote-ip-range 10.10.48.0 - 10.10.48.255
exec ipsec policy add spd 2 priority 40 outbound action bypass local-ip-range 20.20.59.0 - 20.20.59.255 remote-ip-range 10.10.49.0 - 10.10.49.255
exec ipsec policy add spd 2 priority 41 outbound action bypass local-ip-range 20.20.60.0 - 20.20.60.255 remote-ip-range 10.10.50.0 - 10.10.50.255
exec ipsec policy add spd 2 priority 42 outbound action bypass local-ip-range 20.20.61.0 - 20.20.61.255 remote-ip-range 10.10.51.0 - 10.10.51.255
exec ipsec policy add spd 2 priority 43 outbound action bypass local-ip-range 20.20.62.0 - 20.20.62.255 remote-ip-range 10.10.52.0 - 10.10.52.255
exec ipsec policy add spd 2 priority 44 outbound action bypass local-ip-range 20.20.63.0 - 20.20.63.255 remote-ip-range 10.10.53.0 - 10.10.53.255
exec ipsec policy add spd 2 priority 45 outbound action bypass local-ip-range 20.20.64.0 - 20.20.64.255 remote-ip-range 10.10.54.0 - 10.10.54.255
exec ipsec policy add spd 2 priority 46 outbound action bypass local-ip-range 20.20.65.0 - 20.20.65.255 remote-ip-range 10.10.55.0 - 10.10.55.255
exec ipsec policy add spd 2 priority 47 outbound action bypass local-ip-range 20.20.66.0 - 20.20.66.255 remote-ip-range 10.10.56.0 - 10.10.56.255
exec ipsec policy add spd 2 priority 48 outbound action bypass local-ip-range 20.20.67.0 - 20.20.67.255 remote-ip-range 10.10.57.0 - 10.10.57.255
exec ipsec policy add spd 2 priority 49 outbound action bypass local-ip-range 20.20.68.0 - 20.20.68.255 remote-ip-range 10.10.58.0 - 10.10.58.255
exec ipsec policy add spd 2 priority 50 outbound action bypass local-ip-range 20.20.69.0 - 20.20.69.255 remote-ip-range 10.10.59.0 - 10.10.59.255
exec ipsec policy add spd 2 priority 51 outbound action bypass local-ip-range 20.20.70.0 - 20.20.70.255 remote-ip-range 10.10.60.0 - 10.10.60.255
exec ipsec policy add spd 2 priority 52 outbound action bypass local-ip-range 20.20.71.0 - 20.20.71.255 remote-ip-range 10.10.61.0 - 10.10.61.255
exec ipsec policy add spd 2 priority 53 outbound action bypass local-ip-range 20.20.72.0 - 20.20.72.255 remote-ip-range 10.10.62.0 - 10.10.62.255
exec ipsec policy add spd 2 priority 54 outbound action bypass local-ip-range 20.20.73.0 - 20.20.73.255 remote-ip-range 10.10.63.0 - 10.10.63.255
exec ipsec policy add spd 2 priority 55 outbound action bypass local-ip-range 20.20.74.0 - 20.20.74.255 remote-ip-range 10.10.64.0 - 10.10.64.255
exec ipsec policy add spd 2 priority 56 outbound action bypass local-ip-range 20.20.75.0 - 20.20.75.255 remote-ip-range 10.10.65.0 - 10.10.65.255
exec ipsec policy add spd 2 priority 57 outbound action bypass local-ip-range 20.20.76.0 - 20.20.76.255 remote-ip-range 10.10.66.0 - 10.10.66.255
exec ipsec policy add spd 2 priority 58 outbound action bypass local-ip-range 20.20.77.0 - 20.20.77.255 remote-ip-range 10.10.67.0 - 10.10.67.255
exec ipsec policy add spd 2 priority 59 outbound action bypass local-ip-range 20.20.78.0 - 20.20.78.255 remote-ip-range 10.10.68.0 - 10.10.68.255
exec ipsec policy add spd 2 priority 60 outbound action bypass local-ip-range 20.20.79.0 - 20.20.79.255 remote-ip-range 10.10.69.0 - 10.10.69.255
exec ipsec policy add spd 2 priority 61 outbound action bypass local-ip-range 20.20.80.0 - 20.20.80.255 remote-ip-range 10.10.70.0 - 10.10.70.255
exec ipsec policy add spd 2 priority 62 outbound action bypass local-ip-range 20.20.81.0 - 20.20.81.255 remote-ip-range 10.10.71.0 - 10.10.71.255
exec ipsec policy add spd 2 priority 63 outbound action bypass local-ip-range 20.20.82.0 - 20.20.82.255 remote-ip-range 10.10.72.0 - 10.10.72.255
exec ipsec policy add spd 2 priority 64 outbound action bypass local-ip-range 20.20.83.0 - 20.20.83.255 remote-ip-range 10.10.73.0 - 10.10.73.255
exec ipsec policy add spd 2 priority 65 outbound action bypass local-ip-range 20.20.84.0 - 20.20.84.255 remote-ip-range 10.10.74.0 - 10.10.74.255
exec ipsec policy add spd 2 priority 66 outbound action bypass local-ip-range 20.20.85.0 - 20.20.85.255 remote-ip-range 10.10.75.0 - 10.10.75.255
exec ipsec policy add spd 2 priority 67 outbound action bypass local-ip-range 20.20.86.0 - 20.20.86.255 remote-ip-range 10.10.76.0 - 10.10.76.255
exec ipsec policy add spd 2 priority 68 outbound action bypass local-ip-range 20.20.87.0 - 20.20.87.255 remote-ip-range 10.10.77.0 - 10.10.77.255
exec ipsec policy add spd 2 priority 69 outbound action bypass local-ip-range 20.20.88.0 - 20.20.88.255 remote-ip-range 10.10.78.0 - 10.10.78.255
exec ipsec policy add spd 2 priority 70 outbound action bypass local-ip-range 20.20.89.0 - 20.20.89.255 remote-ip-range 10.10.79.0 - 10.10.79.255
exec ipsec policy add spd 2 priority 71 outbound action bypass local-ip-range 20.20.90.0 - 20.20.90.255 remote-ip-range 10.10.80.0 - 10.10.80.255
exec ipsec policy add spd 2 priority 72 outbound action bypass local-ip-range 20.20.91.0 - 20.20.91.255 remote-ip-range 10.10.81.0 - 10.10.81.255
exec ipsec policy add spd 2 priority 73 outbound action bypass local-ip-range 20.20.92.0 - 20.20.92.255 remote-ip-range 10.10.82.0 - 10.10.82.255
exec ipsec policy add spd 2 priority 74 outbound action bypass local-ip-range 20.20.93.0 - 20.20.93.255 remote-ip-range 10.10.83.0 - 10.10.83.255
exec ipsec policy add spd 2 priority 75 outbound action bypass local-ip-range 20.20.94.0 - 20.20.94.255 remote-ip-range 10.10.84.0 - 10.10.84.255
exec ipsec policy add spd 2 priority 76 outbound action bypass local-ip-range 20.20.95.0 - 20.20.95.255 remote-ip-range 10.10.85.0 - 10.10.85.255
exec ipsec policy add spd 2 priority 77 outbound action bypass local-ip-range 20.20.96.0 - 20.20.96.255 remote-ip-range 10.10.86.0 - 10.10.86.255
exec ipsec policy add spd 2 priority 78 outbound action bypass local-ip-range 20.20.97.0 - 20.20.97.255 remote-ip-range 10.10.87.0 - 10.10.87.255
exec ipsec policy add spd 2 priority 79 outbound action bypass local-ip-range 20.20.98.0 - 20.20.98.255 remote-ip-range 10.10.88.0 - 10.10.88.255
exec ipsec policy add spd 2 priority 80 outbound action bypass local-ip-range 20.20.99.0 - 20.20.99.255 remote-ip-range 10.10.89.0 - 10.10.89.255
exec ipsec policy add spd 2 priority 81 outbound action bypass local-ip-range 20.20.100.0 - 20.20.100.255 remote-ip-range 10.10.90.0 - 10.10.90.255
exec ipsec policy add spd 2 priority 82 outbound action bypass local-ip-range 20.20.101.0 - 20.20.101.255 remote-ip-range 10.10.91.0 - 10.10.91.255
exec ipsec policy add spd 2 priority 83 outbound action bypass local-ip-range 20.20.102.0 - 20.20.102.255 remote-ip-range 10.10.92.0 - 10.10.92.255
exec ipsec policy add spd 2 priority 84 outbound action bypass local-ip-range 20.20.103.0 - 20.20.103.255 remote-ip-range 10.10.93.0 - 10.10.93.255
exec ipsec policy add spd 2 priority 85 outbound action bypass local-ip-range 20.20.104.0 - 20.20.104.255 remote-ip-range 10.10.94.0 - 10.10.94.255
exec ipsec policy add spd 2 priority 86 outbound action bypass local-ip-range 20.20.105.0 - 20.20.105.255 remote-ip-range 10.10.95.0 - 10.10.95.255
exec ipsec policy add spd 2 priority 87 outbound action bypass local-ip-range 20.20.106.0 - 20.20.106.255 remote-ip-range 10.10.96.0 - 10.10.96.255
exec ipsec policy add spd 2 priority 88 outbound action bypass local-ip-range 20.20.107.0 - 20.20.107.255 remote-ip-range 10.10.97.0 - 10.10.97.255
exec ipsec policy add spd 2 priority 89 outbound action bypass local-ip-range 20.20.108.0 - 20.20.108.255 remote-ip-range 10.10.98.0 - 10.10.98.255
exec ipsec policy add spd 2 priority 90 outbound action bypass local-ip-range 20.20.109.0 - 20.20.109.255 remote-ip-range 10.10.99.0 - 10.10.99.255
exec ipsec policy add spd 2 priority 91 outbound action bypass local-ip-range 20.20.110.0 - 20.20.110.255 remote-ip-range 10.10.100.0 - 10.10.100.255
exec ipsec policy add spd 2 priority 92 outbound action bypass local-ip-range 20.20.111.0 - 20.20.111.255 remote-ip-range 10.10.101.0 - 10.10.101.255
exec ipsec policy add spd 2 priority 93 outbound action bypass local-ip-range 20.20.112.0 - 20.20.112.255 remote-ip-range 10.10.102.0 - 10.10.102.255
exec ipsec policy add spd 2 priority 94 outbound action bypass local-ip-range 20.20.113.0 - 20.20.113.255 remote-ip-range 10.10.103.0 - 10.10.103.255
exec ipsec policy add spd 2 priority 95 outbound action bypass local-ip-range 20.20.114.0 - 20.20.114.255 remote-ip-range 10.10.104.0 - 10.10.104.255
exec ipsec policy add spd 2 priority 96 outbound action bypass local-ip-range 20.20.115.0 - 20.20.115.255 remote-ip-range 10.10.105.0 - 10.10.105.255
exec ipsec policy add spd 2 priority 97 outbound action bypass local-ip-range 20.20.116.0 - 20.20.116.255 remote-ip-range 10.10.106.0 - 10.10.106.255
exec ipsec policy add spd 2 priority 98 outbound action bypass local-ip-range 20.20.117.0 - 20.20.117.255 remote-ip-range 10.10.107.0 - 10.10.107.255
exec ipsec policy add spd 2 priority 99 outbound action bypass local-ip-range 20.20.118.0 - 20.20.118.255 remote-ip-range 10.10.108.0 - 10.10.108.255
exec ipsec policy add spd 2 priority 100 outbound action bypass local-ip-range 20.20.119.0 - 20.20.119.255 remote-ip-range 10.10.109.0 - 10.10.109.255
cli_inband(cmd=’show ipsec all’)

 64b-4t4c-ethip4ipsec100spe-cache- 
ip4base-policy-outbound-nocrypto-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:90’, ‘ip_address’: ‘10.10.10.2’})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:91’, ‘ip_address’: ‘20.20.20.2’})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnx01’}}})
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14x01’}}})
ipsec_spd_add_del(is_add=True,spd_id=1)
ipsec_interface_add_del_spd(is_add=True,sw_if_index=2,spd_id=1)
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 1, ‘is_outbound’: True, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 0, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14xff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnx00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_spd_add_del(is_add=True,spd_id=2)
ipsec_interface_add_del_spd(is_add=True,sw_if_index=1,spd_id=2)
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 2, ‘priority’: 1, ‘is_outbound’: True, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 0, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnx00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnxff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14xff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
exec ipsec policy add spd 1 priority 2 outbound action bypass local-ip-range 10.10.11.0 - 10.10.11.255 remote-ip-range 20.20.21.0 - 20.20.21.255
exec ipsec policy add spd 1 priority 3 outbound action bypass local-ip-range 10.10.12.0 - 10.10.12.255 remote-ip-range 20.20.22.0 - 20.20.22.255
exec ipsec policy add spd 1 priority 4 outbound action bypass local-ip-range 10.10.13.0 - 10.10.13.255 remote-ip-range 20.20.23.0 - 20.20.23.255
exec ipsec policy add spd 1 priority 5 outbound action bypass local-ip-range 10.10.14.0 - 10.10.14.255 remote-ip-range 20.20.24.0 - 20.20.24.255
exec ipsec policy add spd 1 priority 6 outbound action bypass local-ip-range 10.10.15.0 - 10.10.15.255 remote-ip-range 20.20.25.0 - 20.20.25.255
exec ipsec policy add spd 1 priority 7 outbound action bypass local-ip-range 10.10.16.0 - 10.10.16.255 remote-ip-range 20.20.26.0 - 20.20.26.255
exec ipsec policy add spd 1 priority 8 outbound action bypass local-ip-range 10.10.17.0 - 10.10.17.255 remote-ip-range 20.20.27.0 - 20.20.27.255
exec ipsec policy add spd 1 priority 9 outbound action bypass local-ip-range 10.10.18.0 - 10.10.18.255 remote-ip-range 20.20.28.0 - 20.20.28.255
exec ipsec policy add spd 1 priority 10 outbound action bypass local-ip-range 10.10.19.0 - 10.10.19.255 remote-ip-range 20.20.29.0 - 20.20.29.255
exec ipsec policy add spd 1 priority 11 outbound action bypass local-ip-range 10.10.20.0 - 10.10.20.255 remote-ip-range 20.20.30.0 - 20.20.30.255
exec ipsec policy add spd 1 priority 12 outbound action bypass local-ip-range 10.10.21.0 - 10.10.21.255 remote-ip-range 20.20.31.0 - 20.20.31.255
exec ipsec policy add spd 1 priority 13 outbound action bypass local-ip-range 10.10.22.0 - 10.10.22.255 remote-ip-range 20.20.32.0 - 20.20.32.255
exec ipsec policy add spd 1 priority 14 outbound action bypass local-ip-range 10.10.23.0 - 10.10.23.255 remote-ip-range 20.20.33.0 - 20.20.33.255
exec ipsec policy add spd 1 priority 15 outbound action bypass local-ip-range 10.10.24.0 - 10.10.24.255 remote-ip-range 20.20.34.0 - 20.20.34.255
exec ipsec policy add spd 1 priority 16 outbound action bypass local-ip-range 10.10.25.0 - 10.10.25.255 remote-ip-range 20.20.35.0 - 20.20.35.255
exec ipsec policy add spd 1 priority 17 outbound action bypass local-ip-range 10.10.26.0 - 10.10.26.255 remote-ip-range 20.20.36.0 - 20.20.36.255
exec ipsec policy add spd 1 priority 18 outbound action bypass local-ip-range 10.10.27.0 - 10.10.27.255 remote-ip-range 20.20.37.0 - 20.20.37.255
exec ipsec policy add spd 1 priority 19 outbound action bypass local-ip-range 10.10.28.0 - 10.10.28.255 remote-ip-range 20.20.38.0 - 20.20.38.255
exec ipsec policy add spd 1 priority 20 outbound action bypass local-ip-range 10.10.29.0 - 10.10.29.255 remote-ip-range 20.20.39.0 - 20.20.39.255
exec ipsec policy add spd 1 priority 21 outbound action bypass local-ip-range 10.10.30.0 - 10.10.30.255 remote-ip-range 20.20.40.0 - 20.20.40.255
exec ipsec policy add spd 1 priority 22 outbound action bypass local-ip-range 10.10.31.0 - 10.10.31.255 remote-ip-range 20.20.41.0 - 20.20.41.255
exec ipsec policy add spd 1 priority 23 outbound action bypass local-ip-range 10.10.32.0 - 10.10.32.255 remote-ip-range 20.20.42.0 - 20.20.42.255
exec ipsec policy add spd 1 priority 24 outbound action bypass local-ip-range 10.10.33.0 - 10.10.33.255 remote-ip-range 20.20.43.0 - 20.20.43.255
exec ipsec policy add spd 1 priority 25 outbound action bypass local-ip-range 10.10.34.0 - 10.10.34.255 remote-ip-range 20.20.44.0 - 20.20.44.255
exec ipsec policy add spd 1 priority 26 outbound action bypass local-ip-range 10.10.35.0 - 10.10.35.255 remote-ip-range 20.20.45.0 - 20.20.45.255
exec ipsec policy add spd 1 priority 27 outbound action bypass local-ip-range 10.10.36.0 - 10.10.36.255 remote-ip-range 20.20.46.0 - 20.20.46.255
exec ipsec policy add spd 1 priority 28 outbound action bypass local-ip-range 10.10.37.0 - 10.10.37.255 remote-ip-range 20.20.47.0 - 20.20.47.255
exec ipsec policy add spd 1 priority 29 outbound action bypass local-ip-range 10.10.38.0 - 10.10.38.255 remote-ip-range 20.20.48.0 - 20.20.48.255
exec ipsec policy add spd 1 priority 30 outbound action bypass local-ip-range 10.10.39.0 - 10.10.39.255 remote-ip-range 20.20.49.0 - 20.20.49.255
exec ipsec policy add spd 1 priority 31 outbound action bypass local-ip-range 10.10.40.0 - 10.10.40.255 remote-ip-range 20.20.50.0 - 20.20.50.255
exec ipsec policy add spd 1 priority 32 outbound action bypass local-ip-range 10.10.41.0 - 10.10.41.255 remote-ip-range 20.20.51.0 - 20.20.51.255
exec ipsec policy add spd 1 priority 33 outbound action bypass local-ip-range 10.10.42.0 - 10.10.42.255 remote-ip-range 20.20.52.0 - 20.20.52.255
exec ipsec policy add spd 1 priority 34 outbound action bypass local-ip-range 10.10.43.0 - 10.10.43.255 remote-ip-range 20.20.53.0 - 20.20.53.255
exec ipsec policy add spd 1 priority 35 outbound action bypass local-ip-range 10.10.44.0 - 10.10.44.255 remote-ip-range 20.20.54.0 - 20.20.54.255
exec ipsec policy add spd 1 priority 36 outbound action bypass local-ip-range 10.10.45.0 - 10.10.45.255 remote-ip-range 20.20.55.0 - 20.20.55.255
exec ipsec policy add spd 1 priority 37 outbound action bypass local-ip-range 10.10.46.0 - 10.10.46.255 remote-ip-range 20.20.56.0 - 20.20.56.255
exec ipsec policy add spd 1 priority 38 outbound action bypass local-ip-range 10.10.47.0 - 10.10.47.255 remote-ip-range 20.20.57.0 - 20.20.57.255
exec ipsec policy add spd 1 priority 39 outbound action bypass local-ip-range 10.10.48.0 - 10.10.48.255 remote-ip-range 20.20.58.0 - 20.20.58.255
exec ipsec policy add spd 1 priority 40 outbound action bypass local-ip-range 10.10.49.0 - 10.10.49.255 remote-ip-range 20.20.59.0 - 20.20.59.255
exec ipsec policy add spd 1 priority 41 outbound action bypass local-ip-range 10.10.50.0 - 10.10.50.255 remote-ip-range 20.20.60.0 - 20.20.60.255
exec ipsec policy add spd 1 priority 42 outbound action bypass local-ip-range 10.10.51.0 - 10.10.51.255 remote-ip-range 20.20.61.0 - 20.20.61.255
exec ipsec policy add spd 1 priority 43 outbound action bypass local-ip-range 10.10.52.0 - 10.10.52.255 remote-ip-range 20.20.62.0 - 20.20.62.255
exec ipsec policy add spd 1 priority 44 outbound action bypass local-ip-range 10.10.53.0 - 10.10.53.255 remote-ip-range 20.20.63.0 - 20.20.63.255
exec ipsec policy add spd 1 priority 45 outbound action bypass local-ip-range 10.10.54.0 - 10.10.54.255 remote-ip-range 20.20.64.0 - 20.20.64.255
exec ipsec policy add spd 1 priority 46 outbound action bypass local-ip-range 10.10.55.0 - 10.10.55.255 remote-ip-range 20.20.65.0 - 20.20.65.255
exec ipsec policy add spd 1 priority 47 outbound action bypass local-ip-range 10.10.56.0 - 10.10.56.255 remote-ip-range 20.20.66.0 - 20.20.66.255
exec ipsec policy add spd 1 priority 48 outbound action bypass local-ip-range 10.10.57.0 - 10.10.57.255 remote-ip-range 20.20.67.0 - 20.20.67.255
exec ipsec policy add spd 1 priority 49 outbound action bypass local-ip-range 10.10.58.0 - 10.10.58.255 remote-ip-range 20.20.68.0 - 20.20.68.255
exec ipsec policy add spd 1 priority 50 outbound action bypass local-ip-range 10.10.59.0 - 10.10.59.255 remote-ip-range 20.20.69.0 - 20.20.69.255
exec ipsec policy add spd 1 priority 51 outbound action bypass local-ip-range 10.10.60.0 - 10.10.60.255 remote-ip-range 20.20.70.0 - 20.20.70.255
exec ipsec policy add spd 1 priority 52 outbound action bypass local-ip-range 10.10.61.0 - 10.10.61.255 remote-ip-range 20.20.71.0 - 20.20.71.255
exec ipsec policy add spd 1 priority 53 outbound action bypass local-ip-range 10.10.62.0 - 10.10.62.255 remote-ip-range 20.20.72.0 - 20.20.72.255
exec ipsec policy add spd 1 priority 54 outbound action bypass local-ip-range 10.10.63.0 - 10.10.63.255 remote-ip-range 20.20.73.0 - 20.20.73.255
exec ipsec policy add spd 1 priority 55 outbound action bypass local-ip-range 10.10.64.0 - 10.10.64.255 remote-ip-range 20.20.74.0 - 20.20.74.255
exec ipsec policy add spd 1 priority 56 outbound action bypass local-ip-range 10.10.65.0 - 10.10.65.255 remote-ip-range 20.20.75.0 - 20.20.75.255
exec ipsec policy add spd 1 priority 57 outbound action bypass local-ip-range 10.10.66.0 - 10.10.66.255 remote-ip-range 20.20.76.0 - 20.20.76.255
exec ipsec policy add spd 1 priority 58 outbound action bypass local-ip-range 10.10.67.0 - 10.10.67.255 remote-ip-range 20.20.77.0 - 20.20.77.255
exec ipsec policy add spd 1 priority 59 outbound action bypass local-ip-range 10.10.68.0 - 10.10.68.255 remote-ip-range 20.20.78.0 - 20.20.78.255
exec ipsec policy add spd 1 priority 60 outbound action bypass local-ip-range 10.10.69.0 - 10.10.69.255 remote-ip-range 20.20.79.0 - 20.20.79.255
exec ipsec policy add spd 1 priority 61 outbound action bypass local-ip-range 10.10.70.0 - 10.10.70.255 remote-ip-range 20.20.80.0 - 20.20.80.255
exec ipsec policy add spd 1 priority 62 outbound action bypass local-ip-range 10.10.71.0 - 10.10.71.255 remote-ip-range 20.20.81.0 - 20.20.81.255
exec ipsec policy add spd 1 priority 63 outbound action bypass local-ip-range 10.10.72.0 - 10.10.72.255 remote-ip-range 20.20.82.0 - 20.20.82.255
exec ipsec policy add spd 1 priority 64 outbound action bypass local-ip-range 10.10.73.0 - 10.10.73.255 remote-ip-range 20.20.83.0 - 20.20.83.255
exec ipsec policy add spd 1 priority 65 outbound action bypass local-ip-range 10.10.74.0 - 10.10.74.255 remote-ip-range 20.20.84.0 - 20.20.84.255
exec ipsec policy add spd 1 priority 66 outbound action bypass local-ip-range 10.10.75.0 - 10.10.75.255 remote-ip-range 20.20.85.0 - 20.20.85.255
exec ipsec policy add spd 1 priority 67 outbound action bypass local-ip-range 10.10.76.0 - 10.10.76.255 remote-ip-range 20.20.86.0 - 20.20.86.255
exec ipsec policy add spd 1 priority 68 outbound action bypass local-ip-range 10.10.77.0 - 10.10.77.255 remote-ip-range 20.20.87.0 - 20.20.87.255
exec ipsec policy add spd 1 priority 69 outbound action bypass local-ip-range 10.10.78.0 - 10.10.78.255 remote-ip-range 20.20.88.0 - 20.20.88.255
exec ipsec policy add spd 1 priority 70 outbound action bypass local-ip-range 10.10.79.0 - 10.10.79.255 remote-ip-range 20.20.89.0 - 20.20.89.255
exec ipsec policy add spd 1 priority 71 outbound action bypass local-ip-range 10.10.80.0 - 10.10.80.255 remote-ip-range 20.20.90.0 - 20.20.90.255
exec ipsec policy add spd 1 priority 72 outbound action bypass local-ip-range 10.10.81.0 - 10.10.81.255 remote-ip-range 20.20.91.0 - 20.20.91.255
exec ipsec policy add spd 1 priority 73 outbound action bypass local-ip-range 10.10.82.0 - 10.10.82.255 remote-ip-range 20.20.92.0 - 20.20.92.255
exec ipsec policy add spd 1 priority 74 outbound action bypass local-ip-range 10.10.83.0 - 10.10.83.255 remote-ip-range 20.20.93.0 - 20.20.93.255
exec ipsec policy add spd 1 priority 75 outbound action bypass local-ip-range 10.10.84.0 - 10.10.84.255 remote-ip-range 20.20.94.0 - 20.20.94.255
exec ipsec policy add spd 1 priority 76 outbound action bypass local-ip-range 10.10.85.0 - 10.10.85.255 remote-ip-range 20.20.95.0 - 20.20.95.255
exec ipsec policy add spd 1 priority 77 outbound action bypass local-ip-range 10.10.86.0 - 10.10.86.255 remote-ip-range 20.20.96.0 - 20.20.96.255
exec ipsec policy add spd 1 priority 78 outbound action bypass local-ip-range 10.10.87.0 - 10.10.87.255 remote-ip-range 20.20.97.0 - 20.20.97.255
exec ipsec policy add spd 1 priority 79 outbound action bypass local-ip-range 10.10.88.0 - 10.10.88.255 remote-ip-range 20.20.98.0 - 20.20.98.255
exec ipsec policy add spd 1 priority 80 outbound action bypass local-ip-range 10.10.89.0 - 10.10.89.255 remote-ip-range 20.20.99.0 - 20.20.99.255
exec ipsec policy add spd 1 priority 81 outbound action bypass local-ip-range 10.10.90.0 - 10.10.90.255 remote-ip-range 20.20.100.0 - 20.20.100.255
exec ipsec policy add spd 1 priority 82 outbound action bypass local-ip-range 10.10.91.0 - 10.10.91.255 remote-ip-range 20.20.101.0 - 20.20.101.255
exec ipsec policy add spd 1 priority 83 outbound action bypass local-ip-range 10.10.92.0 - 10.10.92.255 remote-ip-range 20.20.102.0 - 20.20.102.255
exec ipsec policy add spd 1 priority 84 outbound action bypass local-ip-range 10.10.93.0 - 10.10.93.255 remote-ip-range 20.20.103.0 - 20.20.103.255
exec ipsec policy add spd 1 priority 85 outbound action bypass local-ip-range 10.10.94.0 - 10.10.94.255 remote-ip-range 20.20.104.0 - 20.20.104.255
exec ipsec policy add spd 1 priority 86 outbound action bypass local-ip-range 10.10.95.0 - 10.10.95.255 remote-ip-range 20.20.105.0 - 20.20.105.255
exec ipsec policy add spd 1 priority 87 outbound action bypass local-ip-range 10.10.96.0 - 10.10.96.255 remote-ip-range 20.20.106.0 - 20.20.106.255
exec ipsec policy add spd 1 priority 88 outbound action bypass local-ip-range 10.10.97.0 - 10.10.97.255 remote-ip-range 20.20.107.0 - 20.20.107.255
exec ipsec policy add spd 1 priority 89 outbound action bypass local-ip-range 10.10.98.0 - 10.10.98.255 remote-ip-range 20.20.108.0 - 20.20.108.255
exec ipsec policy add spd 1 priority 90 outbound action bypass local-ip-range 10.10.99.0 - 10.10.99.255 remote-ip-range 20.20.109.0 - 20.20.109.255
exec ipsec policy add spd 1 priority 91 outbound action bypass local-ip-range 10.10.100.0 - 10.10.100.255 remote-ip-range 20.20.110.0 - 20.20.110.255
exec ipsec policy add spd 1 priority 92 outbound action bypass local-ip-range 10.10.101.0 - 10.10.101.255 remote-ip-range 20.20.111.0 - 20.20.111.255
exec ipsec policy add spd 1 priority 93 outbound action bypass local-ip-range 10.10.102.0 - 10.10.102.255 remote-ip-range 20.20.112.0 - 20.20.112.255
exec ipsec policy add spd 1 priority 94 outbound action bypass local-ip-range 10.10.103.0 - 10.10.103.255 remote-ip-range 20.20.113.0 - 20.20.113.255
exec ipsec policy add spd 1 priority 95 outbound action bypass local-ip-range 10.10.104.0 - 10.10.104.255 remote-ip-range 20.20.114.0 - 20.20.114.255
exec ipsec policy add spd 1 priority 96 outbound action bypass local-ip-range 10.10.105.0 - 10.10.105.255 remote-ip-range 20.20.115.0 - 20.20.115.255
exec ipsec policy add spd 1 priority 97 outbound action bypass local-ip-range 10.10.106.0 - 10.10.106.255 remote-ip-range 20.20.116.0 - 20.20.116.255
exec ipsec policy add spd 1 priority 98 outbound action bypass local-ip-range 10.10.107.0 - 10.10.107.255 remote-ip-range 20.20.117.0 - 20.20.117.255
exec ipsec policy add spd 1 priority 99 outbound action bypass local-ip-range 10.10.108.0 - 10.10.108.255 remote-ip-range 20.20.118.0 - 20.20.118.255
exec ipsec policy add spd 1 priority 100 outbound action bypass local-ip-range 10.10.109.0 - 10.10.109.255 remote-ip-range 20.20.119.0 - 20.20.119.255
exec ipsec policy add spd 2 priority 2 outbound action bypass local-ip-range 20.20.21.0 - 20.20.21.255 remote-ip-range 10.10.11.0 - 10.10.11.255
exec ipsec policy add spd 2 priority 3 outbound action bypass local-ip-range 20.20.22.0 - 20.20.22.255 remote-ip-range 10.10.12.0 - 10.10.12.255
exec ipsec policy add spd 2 priority 4 outbound action bypass local-ip-range 20.20.23.0 - 20.20.23.255 remote-ip-range 10.10.13.0 - 10.10.13.255
exec ipsec policy add spd 2 priority 5 outbound action bypass local-ip-range 20.20.24.0 - 20.20.24.255 remote-ip-range 10.10.14.0 - 10.10.14.255
exec ipsec policy add spd 2 priority 6 outbound action bypass local-ip-range 20.20.25.0 - 20.20.25.255 remote-ip-range 10.10.15.0 - 10.10.15.255
exec ipsec policy add spd 2 priority 7 outbound action bypass local-ip-range 20.20.26.0 - 20.20.26.255 remote-ip-range 10.10.16.0 - 10.10.16.255
exec ipsec policy add spd 2 priority 8 outbound action bypass local-ip-range 20.20.27.0 - 20.20.27.255 remote-ip-range 10.10.17.0 - 10.10.17.255
exec ipsec policy add spd 2 priority 9 outbound action bypass local-ip-range 20.20.28.0 - 20.20.28.255 remote-ip-range 10.10.18.0 - 10.10.18.255
exec ipsec policy add spd 2 priority 10 outbound action bypass local-ip-range 20.20.29.0 - 20.20.29.255 remote-ip-range 10.10.19.0 - 10.10.19.255
exec ipsec policy add spd 2 priority 11 outbound action bypass local-ip-range 20.20.30.0 - 20.20.30.255 remote-ip-range 10.10.20.0 - 10.10.20.255
exec ipsec policy add spd 2 priority 12 outbound action bypass local-ip-range 20.20.31.0 - 20.20.31.255 remote-ip-range 10.10.21.0 - 10.10.21.255
exec ipsec policy add spd 2 priority 13 outbound action bypass local-ip-range 20.20.32.0 - 20.20.32.255 remote-ip-range 10.10.22.0 - 10.10.22.255
exec ipsec policy add spd 2 priority 14 outbound action bypass local-ip-range 20.20.33.0 - 20.20.33.255 remote-ip-range 10.10.23.0 - 10.10.23.255
exec ipsec policy add spd 2 priority 15 outbound action bypass local-ip-range 20.20.34.0 - 20.20.34.255 remote-ip-range 10.10.24.0 - 10.10.24.255
exec ipsec policy add spd 2 priority 16 outbound action bypass local-ip-range 20.20.35.0 - 20.20.35.255 remote-ip-range 10.10.25.0 - 10.10.25.255
exec ipsec policy add spd 2 priority 17 outbound action bypass local-ip-range 20.20.36.0 - 20.20.36.255 remote-ip-range 10.10.26.0 - 10.10.26.255
exec ipsec policy add spd 2 priority 18 outbound action bypass local-ip-range 20.20.37.0 - 20.20.37.255 remote-ip-range 10.10.27.0 - 10.10.27.255
exec ipsec policy add spd 2 priority 19 outbound action bypass local-ip-range 20.20.38.0 - 20.20.38.255 remote-ip-range 10.10.28.0 - 10.10.28.255
exec ipsec policy add spd 2 priority 20 outbound action bypass local-ip-range 20.20.39.0 - 20.20.39.255 remote-ip-range 10.10.29.0 - 10.10.29.255
exec ipsec policy add spd 2 priority 21 outbound action bypass local-ip-range 20.20.40.0 - 20.20.40.255 remote-ip-range 10.10.30.0 - 10.10.30.255
exec ipsec policy add spd 2 priority 22 outbound action bypass local-ip-range 20.20.41.0 - 20.20.41.255 remote-ip-range 10.10.31.0 - 10.10.31.255
exec ipsec policy add spd 2 priority 23 outbound action bypass local-ip-range 20.20.42.0 - 20.20.42.255 remote-ip-range 10.10.32.0 - 10.10.32.255
exec ipsec policy add spd 2 priority 24 outbound action bypass local-ip-range 20.20.43.0 - 20.20.43.255 remote-ip-range 10.10.33.0 - 10.10.33.255
exec ipsec policy add spd 2 priority 25 outbound action bypass local-ip-range 20.20.44.0 - 20.20.44.255 remote-ip-range 10.10.34.0 - 10.10.34.255
exec ipsec policy add spd 2 priority 26 outbound action bypass local-ip-range 20.20.45.0 - 20.20.45.255 remote-ip-range 10.10.35.0 - 10.10.35.255
exec ipsec policy add spd 2 priority 27 outbound action bypass local-ip-range 20.20.46.0 - 20.20.46.255 remote-ip-range 10.10.36.0 - 10.10.36.255
exec ipsec policy add spd 2 priority 28 outbound action bypass local-ip-range 20.20.47.0 - 20.20.47.255 remote-ip-range 10.10.37.0 - 10.10.37.255
exec ipsec policy add spd 2 priority 29 outbound action bypass local-ip-range 20.20.48.0 - 20.20.48.255 remote-ip-range 10.10.38.0 - 10.10.38.255
exec ipsec policy add spd 2 priority 30 outbound action bypass local-ip-range 20.20.49.0 - 20.20.49.255 remote-ip-range 10.10.39.0 - 10.10.39.255
exec ipsec policy add spd 2 priority 31 outbound action bypass local-ip-range 20.20.50.0 - 20.20.50.255 remote-ip-range 10.10.40.0 - 10.10.40.255
exec ipsec policy add spd 2 priority 32 outbound action bypass local-ip-range 20.20.51.0 - 20.20.51.255 remote-ip-range 10.10.41.0 - 10.10.41.255
exec ipsec policy add spd 2 priority 33 outbound action bypass local-ip-range 20.20.52.0 - 20.20.52.255 remote-ip-range 10.10.42.0 - 10.10.42.255
exec ipsec policy add spd 2 priority 34 outbound action bypass local-ip-range 20.20.53.0 - 20.20.53.255 remote-ip-range 10.10.43.0 - 10.10.43.255
exec ipsec policy add spd 2 priority 35 outbound action bypass local-ip-range 20.20.54.0 - 20.20.54.255 remote-ip-range 10.10.44.0 - 10.10.44.255
exec ipsec policy add spd 2 priority 36 outbound action bypass local-ip-range 20.20.55.0 - 20.20.55.255 remote-ip-range 10.10.45.0 - 10.10.45.255
exec ipsec policy add spd 2 priority 37 outbound action bypass local-ip-range 20.20.56.0 - 20.20.56.255 remote-ip-range 10.10.46.0 - 10.10.46.255
exec ipsec policy add spd 2 priority 38 outbound action bypass local-ip-range 20.20.57.0 - 20.20.57.255 remote-ip-range 10.10.47.0 - 10.10.47.255
exec ipsec policy add spd 2 priority 39 outbound action bypass local-ip-range 20.20.58.0 - 20.20.58.255 remote-ip-range 10.10.48.0 - 10.10.48.255
exec ipsec policy add spd 2 priority 40 outbound action bypass local-ip-range 20.20.59.0 - 20.20.59.255 remote-ip-range 10.10.49.0 - 10.10.49.255
exec ipsec policy add spd 2 priority 41 outbound action bypass local-ip-range 20.20.60.0 - 20.20.60.255 remote-ip-range 10.10.50.0 - 10.10.50.255
exec ipsec policy add spd 2 priority 42 outbound action bypass local-ip-range 20.20.61.0 - 20.20.61.255 remote-ip-range 10.10.51.0 - 10.10.51.255
exec ipsec policy add spd 2 priority 43 outbound action bypass local-ip-range 20.20.62.0 - 20.20.62.255 remote-ip-range 10.10.52.0 - 10.10.52.255
exec ipsec policy add spd 2 priority 44 outbound action bypass local-ip-range 20.20.63.0 - 20.20.63.255 remote-ip-range 10.10.53.0 - 10.10.53.255
exec ipsec policy add spd 2 priority 45 outbound action bypass local-ip-range 20.20.64.0 - 20.20.64.255 remote-ip-range 10.10.54.0 - 10.10.54.255
exec ipsec policy add spd 2 priority 46 outbound action bypass local-ip-range 20.20.65.0 - 20.20.65.255 remote-ip-range 10.10.55.0 - 10.10.55.255
exec ipsec policy add spd 2 priority 47 outbound action bypass local-ip-range 20.20.66.0 - 20.20.66.255 remote-ip-range 10.10.56.0 - 10.10.56.255
exec ipsec policy add spd 2 priority 48 outbound action bypass local-ip-range 20.20.67.0 - 20.20.67.255 remote-ip-range 10.10.57.0 - 10.10.57.255
exec ipsec policy add spd 2 priority 49 outbound action bypass local-ip-range 20.20.68.0 - 20.20.68.255 remote-ip-range 10.10.58.0 - 10.10.58.255
exec ipsec policy add spd 2 priority 50 outbound action bypass local-ip-range 20.20.69.0 - 20.20.69.255 remote-ip-range 10.10.59.0 - 10.10.59.255
exec ipsec policy add spd 2 priority 51 outbound action bypass local-ip-range 20.20.70.0 - 20.20.70.255 remote-ip-range 10.10.60.0 - 10.10.60.255
exec ipsec policy add spd 2 priority 52 outbound action bypass local-ip-range 20.20.71.0 - 20.20.71.255 remote-ip-range 10.10.61.0 - 10.10.61.255
exec ipsec policy add spd 2 priority 53 outbound action bypass local-ip-range 20.20.72.0 - 20.20.72.255 remote-ip-range 10.10.62.0 - 10.10.62.255
exec ipsec policy add spd 2 priority 54 outbound action bypass local-ip-range 20.20.73.0 - 20.20.73.255 remote-ip-range 10.10.63.0 - 10.10.63.255
exec ipsec policy add spd 2 priority 55 outbound action bypass local-ip-range 20.20.74.0 - 20.20.74.255 remote-ip-range 10.10.64.0 - 10.10.64.255
exec ipsec policy add spd 2 priority 56 outbound action bypass local-ip-range 20.20.75.0 - 20.20.75.255 remote-ip-range 10.10.65.0 - 10.10.65.255
exec ipsec policy add spd 2 priority 57 outbound action bypass local-ip-range 20.20.76.0 - 20.20.76.255 remote-ip-range 10.10.66.0 - 10.10.66.255
exec ipsec policy add spd 2 priority 58 outbound action bypass local-ip-range 20.20.77.0 - 20.20.77.255 remote-ip-range 10.10.67.0 - 10.10.67.255
exec ipsec policy add spd 2 priority 59 outbound action bypass local-ip-range 20.20.78.0 - 20.20.78.255 remote-ip-range 10.10.68.0 - 10.10.68.255
exec ipsec policy add spd 2 priority 60 outbound action bypass local-ip-range 20.20.79.0 - 20.20.79.255 remote-ip-range 10.10.69.0 - 10.10.69.255
exec ipsec policy add spd 2 priority 61 outbound action bypass local-ip-range 20.20.80.0 - 20.20.80.255 remote-ip-range 10.10.70.0 - 10.10.70.255
exec ipsec policy add spd 2 priority 62 outbound action bypass local-ip-range 20.20.81.0 - 20.20.81.255 remote-ip-range 10.10.71.0 - 10.10.71.255
exec ipsec policy add spd 2 priority 63 outbound action bypass local-ip-range 20.20.82.0 - 20.20.82.255 remote-ip-range 10.10.72.0 - 10.10.72.255
exec ipsec policy add spd 2 priority 64 outbound action bypass local-ip-range 20.20.83.0 - 20.20.83.255 remote-ip-range 10.10.73.0 - 10.10.73.255
exec ipsec policy add spd 2 priority 65 outbound action bypass local-ip-range 20.20.84.0 - 20.20.84.255 remote-ip-range 10.10.74.0 - 10.10.74.255
exec ipsec policy add spd 2 priority 66 outbound action bypass local-ip-range 20.20.85.0 - 20.20.85.255 remote-ip-range 10.10.75.0 - 10.10.75.255
exec ipsec policy add spd 2 priority 67 outbound action bypass local-ip-range 20.20.86.0 - 20.20.86.255 remote-ip-range 10.10.76.0 - 10.10.76.255
exec ipsec policy add spd 2 priority 68 outbound action bypass local-ip-range 20.20.87.0 - 20.20.87.255 remote-ip-range 10.10.77.0 - 10.10.77.255
exec ipsec policy add spd 2 priority 69 outbound action bypass local-ip-range 20.20.88.0 - 20.20.88.255 remote-ip-range 10.10.78.0 - 10.10.78.255
exec ipsec policy add spd 2 priority 70 outbound action bypass local-ip-range 20.20.89.0 - 20.20.89.255 remote-ip-range 10.10.79.0 - 10.10.79.255
exec ipsec policy add spd 2 priority 71 outbound action bypass local-ip-range 20.20.90.0 - 20.20.90.255 remote-ip-range 10.10.80.0 - 10.10.80.255
exec ipsec policy add spd 2 priority 72 outbound action bypass local-ip-range 20.20.91.0 - 20.20.91.255 remote-ip-range 10.10.81.0 - 10.10.81.255
exec ipsec policy add spd 2 priority 73 outbound action bypass local-ip-range 20.20.92.0 - 20.20.92.255 remote-ip-range 10.10.82.0 - 10.10.82.255
exec ipsec policy add spd 2 priority 74 outbound action bypass local-ip-range 20.20.93.0 - 20.20.93.255 remote-ip-range 10.10.83.0 - 10.10.83.255
exec ipsec policy add spd 2 priority 75 outbound action bypass local-ip-range 20.20.94.0 - 20.20.94.255 remote-ip-range 10.10.84.0 - 10.10.84.255
exec ipsec policy add spd 2 priority 76 outbound action bypass local-ip-range 20.20.95.0 - 20.20.95.255 remote-ip-range 10.10.85.0 - 10.10.85.255
exec ipsec policy add spd 2 priority 77 outbound action bypass local-ip-range 20.20.96.0 - 20.20.96.255 remote-ip-range 10.10.86.0 - 10.10.86.255
exec ipsec policy add spd 2 priority 78 outbound action bypass local-ip-range 20.20.97.0 - 20.20.97.255 remote-ip-range 10.10.87.0 - 10.10.87.255
exec ipsec policy add spd 2 priority 79 outbound action bypass local-ip-range 20.20.98.0 - 20.20.98.255 remote-ip-range 10.10.88.0 - 10.10.88.255
exec ipsec policy add spd 2 priority 80 outbound action bypass local-ip-range 20.20.99.0 - 20.20.99.255 remote-ip-range 10.10.89.0 - 10.10.89.255
exec ipsec policy add spd 2 priority 81 outbound action bypass local-ip-range 20.20.100.0 - 20.20.100.255 remote-ip-range 10.10.90.0 - 10.10.90.255
exec ipsec policy add spd 2 priority 82 outbound action bypass local-ip-range 20.20.101.0 - 20.20.101.255 remote-ip-range 10.10.91.0 - 10.10.91.255
exec ipsec policy add spd 2 priority 83 outbound action bypass local-ip-range 20.20.102.0 - 20.20.102.255 remote-ip-range 10.10.92.0 - 10.10.92.255
exec ipsec policy add spd 2 priority 84 outbound action bypass local-ip-range 20.20.103.0 - 20.20.103.255 remote-ip-range 10.10.93.0 - 10.10.93.255
exec ipsec policy add spd 2 priority 85 outbound action bypass local-ip-range 20.20.104.0 - 20.20.104.255 remote-ip-range 10.10.94.0 - 10.10.94.255
exec ipsec policy add spd 2 priority 86 outbound action bypass local-ip-range 20.20.105.0 - 20.20.105.255 remote-ip-range 10.10.95.0 - 10.10.95.255
exec ipsec policy add spd 2 priority 87 outbound action bypass local-ip-range 20.20.106.0 - 20.20.106.255 remote-ip-range 10.10.96.0 - 10.10.96.255
exec ipsec policy add spd 2 priority 88 outbound action bypass local-ip-range 20.20.107.0 - 20.20.107.255 remote-ip-range 10.10.97.0 - 10.10.97.255
exec ipsec policy add spd 2 priority 89 outbound action bypass local-ip-range 20.20.108.0 - 20.20.108.255 remote-ip-range 10.10.98.0 - 10.10.98.255
exec ipsec policy add spd 2 priority 90 outbound action bypass local-ip-range 20.20.109.0 - 20.20.109.255 remote-ip-range 10.10.99.0 - 10.10.99.255
exec ipsec policy add spd 2 priority 91 outbound action bypass local-ip-range 20.20.110.0 - 20.20.110.255 remote-ip-range 10.10.100.0 - 10.10.100.255
exec ipsec policy add spd 2 priority 92 outbound action bypass local-ip-range 20.20.111.0 - 20.20.111.255 remote-ip-range 10.10.101.0 - 10.10.101.255
exec ipsec policy add spd 2 priority 93 outbound action bypass local-ip-range 20.20.112.0 - 20.20.112.255 remote-ip-range 10.10.102.0 - 10.10.102.255
exec ipsec policy add spd 2 priority 94 outbound action bypass local-ip-range 20.20.113.0 - 20.20.113.255 remote-ip-range 10.10.103.0 - 10.10.103.255
exec ipsec policy add spd 2 priority 95 outbound action bypass local-ip-range 20.20.114.0 - 20.20.114.255 remote-ip-range 10.10.104.0 - 10.10.104.255
exec ipsec policy add spd 2 priority 96 outbound action bypass local-ip-range 20.20.115.0 - 20.20.115.255 remote-ip-range 10.10.105.0 - 10.10.105.255
exec ipsec policy add spd 2 priority 97 outbound action bypass local-ip-range 20.20.116.0 - 20.20.116.255 remote-ip-range 10.10.106.0 - 10.10.106.255
exec ipsec policy add spd 2 priority 98 outbound action bypass local-ip-range 20.20.117.0 - 20.20.117.255 remote-ip-range 10.10.107.0 - 10.10.107.255
exec ipsec policy add spd 2 priority 99 outbound action bypass local-ip-range 20.20.118.0 - 20.20.118.255 remote-ip-range 10.10.108.0 - 10.10.108.255
exec ipsec policy add spd 2 priority 100 outbound action bypass local-ip-range 20.20.119.0 - 20.20.119.255 remote-ip-range 10.10.109.0 - 10.10.109.255
cli_inband(cmd=’show ipsec all’)

2n1l-40ge2p1xl710-ethip4ipsec100spe-ip4base-policy-outbound-nocrypto-mrr

RFC4301: SPD lookup performance

  • [Top] Network Topologies: TG-DUT1-TG 2-node circular topology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 for IPv4 routing.

  • [Cfg] DUT configuration: DUT1 is configured with IPv4 routing, two static IPv4 /24 route entries, one SPD on each outbound interface in each direction and 100 SPD entry(ies) in each SPD. Only outbound traffic is matched and only the last rule is the matching rule. DUT1 tested with Intel-XL710.

  • [Ver] TG vefication: In MaxReceivedRate tests TG sends traffic at line rate and reports total received packets over trial period. Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, 253 flows per flow-group) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG node interfaces. The DUT does SPD lookup with only the lowest priority rule matching the traffic. The action of the matching rule is BYPASS. No encryption or authentication is done.

  • [Ref] Applicable standard specifications: RFC4301 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 64b-1t1c-ethip4ipsec100spe-ip4base- 
policy-outbound-nocrypto-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:90’, ‘ip_address’: ‘10.10.10.2’})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:91’, ‘ip_address’: ‘20.20.20.2’})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnx01’}}})
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14x01’}}})
ipsec_spd_add_del(is_add=True,spd_id=1)
ipsec_interface_add_del_spd(is_add=True,sw_if_index=2,spd_id=1)
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 1, ‘is_outbound’: True, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 0, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14xff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnx00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_spd_add_del(is_add=True,spd_id=2)
ipsec_interface_add_del_spd(is_add=True,sw_if_index=1,spd_id=2)
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 2, ‘priority’: 1, ‘is_outbound’: True, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 0, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnx00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnxff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14xff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
exec ipsec policy add spd 1 priority 2 outbound action bypass local-ip-range 10.10.11.0 - 10.10.11.255 remote-ip-range 20.20.21.0 - 20.20.21.255
exec ipsec policy add spd 1 priority 3 outbound action bypass local-ip-range 10.10.12.0 - 10.10.12.255 remote-ip-range 20.20.22.0 - 20.20.22.255
exec ipsec policy add spd 1 priority 4 outbound action bypass local-ip-range 10.10.13.0 - 10.10.13.255 remote-ip-range 20.20.23.0 - 20.20.23.255
exec ipsec policy add spd 1 priority 5 outbound action bypass local-ip-range 10.10.14.0 - 10.10.14.255 remote-ip-range 20.20.24.0 - 20.20.24.255
exec ipsec policy add spd 1 priority 6 outbound action bypass local-ip-range 10.10.15.0 - 10.10.15.255 remote-ip-range 20.20.25.0 - 20.20.25.255
exec ipsec policy add spd 1 priority 7 outbound action bypass local-ip-range 10.10.16.0 - 10.10.16.255 remote-ip-range 20.20.26.0 - 20.20.26.255
exec ipsec policy add spd 1 priority 8 outbound action bypass local-ip-range 10.10.17.0 - 10.10.17.255 remote-ip-range 20.20.27.0 - 20.20.27.255
exec ipsec policy add spd 1 priority 9 outbound action bypass local-ip-range 10.10.18.0 - 10.10.18.255 remote-ip-range 20.20.28.0 - 20.20.28.255
exec ipsec policy add spd 1 priority 10 outbound action bypass local-ip-range 10.10.19.0 - 10.10.19.255 remote-ip-range 20.20.29.0 - 20.20.29.255
exec ipsec policy add spd 1 priority 11 outbound action bypass local-ip-range 10.10.20.0 - 10.10.20.255 remote-ip-range 20.20.30.0 - 20.20.30.255
exec ipsec policy add spd 1 priority 12 outbound action bypass local-ip-range 10.10.21.0 - 10.10.21.255 remote-ip-range 20.20.31.0 - 20.20.31.255
exec ipsec policy add spd 1 priority 13 outbound action bypass local-ip-range 10.10.22.0 - 10.10.22.255 remote-ip-range 20.20.32.0 - 20.20.32.255
exec ipsec policy add spd 1 priority 14 outbound action bypass local-ip-range 10.10.23.0 - 10.10.23.255 remote-ip-range 20.20.33.0 - 20.20.33.255
exec ipsec policy add spd 1 priority 15 outbound action bypass local-ip-range 10.10.24.0 - 10.10.24.255 remote-ip-range 20.20.34.0 - 20.20.34.255
exec ipsec policy add spd 1 priority 16 outbound action bypass local-ip-range 10.10.25.0 - 10.10.25.255 remote-ip-range 20.20.35.0 - 20.20.35.255
exec ipsec policy add spd 1 priority 17 outbound action bypass local-ip-range 10.10.26.0 - 10.10.26.255 remote-ip-range 20.20.36.0 - 20.20.36.255
exec ipsec policy add spd 1 priority 18 outbound action bypass local-ip-range 10.10.27.0 - 10.10.27.255 remote-ip-range 20.20.37.0 - 20.20.37.255
exec ipsec policy add spd 1 priority 19 outbound action bypass local-ip-range 10.10.28.0 - 10.10.28.255 remote-ip-range 20.20.38.0 - 20.20.38.255
exec ipsec policy add spd 1 priority 20 outbound action bypass local-ip-range 10.10.29.0 - 10.10.29.255 remote-ip-range 20.20.39.0 - 20.20.39.255
exec ipsec policy add spd 1 priority 21 outbound action bypass local-ip-range 10.10.30.0 - 10.10.30.255 remote-ip-range 20.20.40.0 - 20.20.40.255
exec ipsec policy add spd 1 priority 22 outbound action bypass local-ip-range 10.10.31.0 - 10.10.31.255 remote-ip-range 20.20.41.0 - 20.20.41.255
exec ipsec policy add spd 1 priority 23 outbound action bypass local-ip-range 10.10.32.0 - 10.10.32.255 remote-ip-range 20.20.42.0 - 20.20.42.255
exec ipsec policy add spd 1 priority 24 outbound action bypass local-ip-range 10.10.33.0 - 10.10.33.255 remote-ip-range 20.20.43.0 - 20.20.43.255
exec ipsec policy add spd 1 priority 25 outbound action bypass local-ip-range 10.10.34.0 - 10.10.34.255 remote-ip-range 20.20.44.0 - 20.20.44.255
exec ipsec policy add spd 1 priority 26 outbound action bypass local-ip-range 10.10.35.0 - 10.10.35.255 remote-ip-range 20.20.45.0 - 20.20.45.255
exec ipsec policy add spd 1 priority 27 outbound action bypass local-ip-range 10.10.36.0 - 10.10.36.255 remote-ip-range 20.20.46.0 - 20.20.46.255
exec ipsec policy add spd 1 priority 28 outbound action bypass local-ip-range 10.10.37.0 - 10.10.37.255 remote-ip-range 20.20.47.0 - 20.20.47.255
exec ipsec policy add spd 1 priority 29 outbound action bypass local-ip-range 10.10.38.0 - 10.10.38.255 remote-ip-range 20.20.48.0 - 20.20.48.255
exec ipsec policy add spd 1 priority 30 outbound action bypass local-ip-range 10.10.39.0 - 10.10.39.255 remote-ip-range 20.20.49.0 - 20.20.49.255
exec ipsec policy add spd 1 priority 31 outbound action bypass local-ip-range 10.10.40.0 - 10.10.40.255 remote-ip-range 20.20.50.0 - 20.20.50.255
exec ipsec policy add spd 1 priority 32 outbound action bypass local-ip-range 10.10.41.0 - 10.10.41.255 remote-ip-range 20.20.51.0 - 20.20.51.255
exec ipsec policy add spd 1 priority 33 outbound action bypass local-ip-range 10.10.42.0 - 10.10.42.255 remote-ip-range 20.20.52.0 - 20.20.52.255
exec ipsec policy add spd 1 priority 34 outbound action bypass local-ip-range 10.10.43.0 - 10.10.43.255 remote-ip-range 20.20.53.0 - 20.20.53.255
exec ipsec policy add spd 1 priority 35 outbound action bypass local-ip-range 10.10.44.0 - 10.10.44.255 remote-ip-range 20.20.54.0 - 20.20.54.255
exec ipsec policy add spd 1 priority 36 outbound action bypass local-ip-range 10.10.45.0 - 10.10.45.255 remote-ip-range 20.20.55.0 - 20.20.55.255
exec ipsec policy add spd 1 priority 37 outbound action bypass local-ip-range 10.10.46.0 - 10.10.46.255 remote-ip-range 20.20.56.0 - 20.20.56.255
exec ipsec policy add spd 1 priority 38 outbound action bypass local-ip-range 10.10.47.0 - 10.10.47.255 remote-ip-range 20.20.57.0 - 20.20.57.255
exec ipsec policy add spd 1 priority 39 outbound action bypass local-ip-range 10.10.48.0 - 10.10.48.255 remote-ip-range 20.20.58.0 - 20.20.58.255
exec ipsec policy add spd 1 priority 40 outbound action bypass local-ip-range 10.10.49.0 - 10.10.49.255 remote-ip-range 20.20.59.0 - 20.20.59.255
exec ipsec policy add spd 1 priority 41 outbound action bypass local-ip-range 10.10.50.0 - 10.10.50.255 remote-ip-range 20.20.60.0 - 20.20.60.255
exec ipsec policy add spd 1 priority 42 outbound action bypass local-ip-range 10.10.51.0 - 10.10.51.255 remote-ip-range 20.20.61.0 - 20.20.61.255
exec ipsec policy add spd 1 priority 43 outbound action bypass local-ip-range 10.10.52.0 - 10.10.52.255 remote-ip-range 20.20.62.0 - 20.20.62.255
exec ipsec policy add spd 1 priority 44 outbound action bypass local-ip-range 10.10.53.0 - 10.10.53.255 remote-ip-range 20.20.63.0 - 20.20.63.255
exec ipsec policy add spd 1 priority 45 outbound action bypass local-ip-range 10.10.54.0 - 10.10.54.255 remote-ip-range 20.20.64.0 - 20.20.64.255
exec ipsec policy add spd 1 priority 46 outbound action bypass local-ip-range 10.10.55.0 - 10.10.55.255 remote-ip-range 20.20.65.0 - 20.20.65.255
exec ipsec policy add spd 1 priority 47 outbound action bypass local-ip-range 10.10.56.0 - 10.10.56.255 remote-ip-range 20.20.66.0 - 20.20.66.255
exec ipsec policy add spd 1 priority 48 outbound action bypass local-ip-range 10.10.57.0 - 10.10.57.255 remote-ip-range 20.20.67.0 - 20.20.67.255
exec ipsec policy add spd 1 priority 49 outbound action bypass local-ip-range 10.10.58.0 - 10.10.58.255 remote-ip-range 20.20.68.0 - 20.20.68.255
exec ipsec policy add spd 1 priority 50 outbound action bypass local-ip-range 10.10.59.0 - 10.10.59.255 remote-ip-range 20.20.69.0 - 20.20.69.255
exec ipsec policy add spd 1 priority 51 outbound action bypass local-ip-range 10.10.60.0 - 10.10.60.255 remote-ip-range 20.20.70.0 - 20.20.70.255
exec ipsec policy add spd 1 priority 52 outbound action bypass local-ip-range 10.10.61.0 - 10.10.61.255 remote-ip-range 20.20.71.0 - 20.20.71.255
exec ipsec policy add spd 1 priority 53 outbound action bypass local-ip-range 10.10.62.0 - 10.10.62.255 remote-ip-range 20.20.72.0 - 20.20.72.255
exec ipsec policy add spd 1 priority 54 outbound action bypass local-ip-range 10.10.63.0 - 10.10.63.255 remote-ip-range 20.20.73.0 - 20.20.73.255
exec ipsec policy add spd 1 priority 55 outbound action bypass local-ip-range 10.10.64.0 - 10.10.64.255 remote-ip-range 20.20.74.0 - 20.20.74.255
exec ipsec policy add spd 1 priority 56 outbound action bypass local-ip-range 10.10.65.0 - 10.10.65.255 remote-ip-range 20.20.75.0 - 20.20.75.255
exec ipsec policy add spd 1 priority 57 outbound action bypass local-ip-range 10.10.66.0 - 10.10.66.255 remote-ip-range 20.20.76.0 - 20.20.76.255
exec ipsec policy add spd 1 priority 58 outbound action bypass local-ip-range 10.10.67.0 - 10.10.67.255 remote-ip-range 20.20.77.0 - 20.20.77.255
exec ipsec policy add spd 1 priority 59 outbound action bypass local-ip-range 10.10.68.0 - 10.10.68.255 remote-ip-range 20.20.78.0 - 20.20.78.255
exec ipsec policy add spd 1 priority 60 outbound action bypass local-ip-range 10.10.69.0 - 10.10.69.255 remote-ip-range 20.20.79.0 - 20.20.79.255
exec ipsec policy add spd 1 priority 61 outbound action bypass local-ip-range 10.10.70.0 - 10.10.70.255 remote-ip-range 20.20.80.0 - 20.20.80.255
exec ipsec policy add spd 1 priority 62 outbound action bypass local-ip-range 10.10.71.0 - 10.10.71.255 remote-ip-range 20.20.81.0 - 20.20.81.255
exec ipsec policy add spd 1 priority 63 outbound action bypass local-ip-range 10.10.72.0 - 10.10.72.255 remote-ip-range 20.20.82.0 - 20.20.82.255
exec ipsec policy add spd 1 priority 64 outbound action bypass local-ip-range 10.10.73.0 - 10.10.73.255 remote-ip-range 20.20.83.0 - 20.20.83.255
exec ipsec policy add spd 1 priority 65 outbound action bypass local-ip-range 10.10.74.0 - 10.10.74.255 remote-ip-range 20.20.84.0 - 20.20.84.255
exec ipsec policy add spd 1 priority 66 outbound action bypass local-ip-range 10.10.75.0 - 10.10.75.255 remote-ip-range 20.20.85.0 - 20.20.85.255
exec ipsec policy add spd 1 priority 67 outbound action bypass local-ip-range 10.10.76.0 - 10.10.76.255 remote-ip-range 20.20.86.0 - 20.20.86.255
exec ipsec policy add spd 1 priority 68 outbound action bypass local-ip-range 10.10.77.0 - 10.10.77.255 remote-ip-range 20.20.87.0 - 20.20.87.255
exec ipsec policy add spd 1 priority 69 outbound action bypass local-ip-range 10.10.78.0 - 10.10.78.255 remote-ip-range 20.20.88.0 - 20.20.88.255
exec ipsec policy add spd 1 priority 70 outbound action bypass local-ip-range 10.10.79.0 - 10.10.79.255 remote-ip-range 20.20.89.0 - 20.20.89.255
exec ipsec policy add spd 1 priority 71 outbound action bypass local-ip-range 10.10.80.0 - 10.10.80.255 remote-ip-range 20.20.90.0 - 20.20.90.255
exec ipsec policy add spd 1 priority 72 outbound action bypass local-ip-range 10.10.81.0 - 10.10.81.255 remote-ip-range 20.20.91.0 - 20.20.91.255
exec ipsec policy add spd 1 priority 73 outbound action bypass local-ip-range 10.10.82.0 - 10.10.82.255 remote-ip-range 20.20.92.0 - 20.20.92.255
exec ipsec policy add spd 1 priority 74 outbound action bypass local-ip-range 10.10.83.0 - 10.10.83.255 remote-ip-range 20.20.93.0 - 20.20.93.255
exec ipsec policy add spd 1 priority 75 outbound action bypass local-ip-range 10.10.84.0 - 10.10.84.255 remote-ip-range 20.20.94.0 - 20.20.94.255
exec ipsec policy add spd 1 priority 76 outbound action bypass local-ip-range 10.10.85.0 - 10.10.85.255 remote-ip-range 20.20.95.0 - 20.20.95.255
exec ipsec policy add spd 1 priority 77 outbound action bypass local-ip-range 10.10.86.0 - 10.10.86.255 remote-ip-range 20.20.96.0 - 20.20.96.255
exec ipsec policy add spd 1 priority 78 outbound action bypass local-ip-range 10.10.87.0 - 10.10.87.255 remote-ip-range 20.20.97.0 - 20.20.97.255
exec ipsec policy add spd 1 priority 79 outbound action bypass local-ip-range 10.10.88.0 - 10.10.88.255 remote-ip-range 20.20.98.0 - 20.20.98.255
exec ipsec policy add spd 1 priority 80 outbound action bypass local-ip-range 10.10.89.0 - 10.10.89.255 remote-ip-range 20.20.99.0 - 20.20.99.255
exec ipsec policy add spd 1 priority 81 outbound action bypass local-ip-range 10.10.90.0 - 10.10.90.255 remote-ip-range 20.20.100.0 - 20.20.100.255
exec ipsec policy add spd 1 priority 82 outbound action bypass local-ip-range 10.10.91.0 - 10.10.91.255 remote-ip-range 20.20.101.0 - 20.20.101.255
exec ipsec policy add spd 1 priority 83 outbound action bypass local-ip-range 10.10.92.0 - 10.10.92.255 remote-ip-range 20.20.102.0 - 20.20.102.255
exec ipsec policy add spd 1 priority 84 outbound action bypass local-ip-range 10.10.93.0 - 10.10.93.255 remote-ip-range 20.20.103.0 - 20.20.103.255
exec ipsec policy add spd 1 priority 85 outbound action bypass local-ip-range 10.10.94.0 - 10.10.94.255 remote-ip-range 20.20.104.0 - 20.20.104.255
exec ipsec policy add spd 1 priority 86 outbound action bypass local-ip-range 10.10.95.0 - 10.10.95.255 remote-ip-range 20.20.105.0 - 20.20.105.255
exec ipsec policy add spd 1 priority 87 outbound action bypass local-ip-range 10.10.96.0 - 10.10.96.255 remote-ip-range 20.20.106.0 - 20.20.106.255
exec ipsec policy add spd 1 priority 88 outbound action bypass local-ip-range 10.10.97.0 - 10.10.97.255 remote-ip-range 20.20.107.0 - 20.20.107.255
exec ipsec policy add spd 1 priority 89 outbound action bypass local-ip-range 10.10.98.0 - 10.10.98.255 remote-ip-range 20.20.108.0 - 20.20.108.255
exec ipsec policy add spd 1 priority 90 outbound action bypass local-ip-range 10.10.99.0 - 10.10.99.255 remote-ip-range 20.20.109.0 - 20.20.109.255
exec ipsec policy add spd 1 priority 91 outbound action bypass local-ip-range 10.10.100.0 - 10.10.100.255 remote-ip-range 20.20.110.0 - 20.20.110.255
exec ipsec policy add spd 1 priority 92 outbound action bypass local-ip-range 10.10.101.0 - 10.10.101.255 remote-ip-range 20.20.111.0 - 20.20.111.255
exec ipsec policy add spd 1 priority 93 outbound action bypass local-ip-range 10.10.102.0 - 10.10.102.255 remote-ip-range 20.20.112.0 - 20.20.112.255
exec ipsec policy add spd 1 priority 94 outbound action bypass local-ip-range 10.10.103.0 - 10.10.103.255 remote-ip-range 20.20.113.0 - 20.20.113.255
exec ipsec policy add spd 1 priority 95 outbound action bypass local-ip-range 10.10.104.0 - 10.10.104.255 remote-ip-range 20.20.114.0 - 20.20.114.255
exec ipsec policy add spd 1 priority 96 outbound action bypass local-ip-range 10.10.105.0 - 10.10.105.255 remote-ip-range 20.20.115.0 - 20.20.115.255
exec ipsec policy add spd 1 priority 97 outbound action bypass local-ip-range 10.10.106.0 - 10.10.106.255 remote-ip-range 20.20.116.0 - 20.20.116.255
exec ipsec policy add spd 1 priority 98 outbound action bypass local-ip-range 10.10.107.0 - 10.10.107.255 remote-ip-range 20.20.117.0 - 20.20.117.255
exec ipsec policy add spd 1 priority 99 outbound action bypass local-ip-range 10.10.108.0 - 10.10.108.255 remote-ip-range 20.20.118.0 - 20.20.118.255
exec ipsec policy add spd 1 priority 100 outbound action bypass local-ip-range 10.10.109.0 - 10.10.109.255 remote-ip-range 20.20.119.0 - 20.20.119.255
exec ipsec policy add spd 2 priority 2 outbound action bypass local-ip-range 20.20.21.0 - 20.20.21.255 remote-ip-range 10.10.11.0 - 10.10.11.255
exec ipsec policy add spd 2 priority 3 outbound action bypass local-ip-range 20.20.22.0 - 20.20.22.255 remote-ip-range 10.10.12.0 - 10.10.12.255
exec ipsec policy add spd 2 priority 4 outbound action bypass local-ip-range 20.20.23.0 - 20.20.23.255 remote-ip-range 10.10.13.0 - 10.10.13.255
exec ipsec policy add spd 2 priority 5 outbound action bypass local-ip-range 20.20.24.0 - 20.20.24.255 remote-ip-range 10.10.14.0 - 10.10.14.255
exec ipsec policy add spd 2 priority 6 outbound action bypass local-ip-range 20.20.25.0 - 20.20.25.255 remote-ip-range 10.10.15.0 - 10.10.15.255
exec ipsec policy add spd 2 priority 7 outbound action bypass local-ip-range 20.20.26.0 - 20.20.26.255 remote-ip-range 10.10.16.0 - 10.10.16.255
exec ipsec policy add spd 2 priority 8 outbound action bypass local-ip-range 20.20.27.0 - 20.20.27.255 remote-ip-range 10.10.17.0 - 10.10.17.255
exec ipsec policy add spd 2 priority 9 outbound action bypass local-ip-range 20.20.28.0 - 20.20.28.255 remote-ip-range 10.10.18.0 - 10.10.18.255
exec ipsec policy add spd 2 priority 10 outbound action bypass local-ip-range 20.20.29.0 - 20.20.29.255 remote-ip-range 10.10.19.0 - 10.10.19.255
exec ipsec policy add spd 2 priority 11 outbound action bypass local-ip-range 20.20.30.0 - 20.20.30.255 remote-ip-range 10.10.20.0 - 10.10.20.255
exec ipsec policy add spd 2 priority 12 outbound action bypass local-ip-range 20.20.31.0 - 20.20.31.255 remote-ip-range 10.10.21.0 - 10.10.21.255
exec ipsec policy add spd 2 priority 13 outbound action bypass local-ip-range 20.20.32.0 - 20.20.32.255 remote-ip-range 10.10.22.0 - 10.10.22.255
exec ipsec policy add spd 2 priority 14 outbound action bypass local-ip-range 20.20.33.0 - 20.20.33.255 remote-ip-range 10.10.23.0 - 10.10.23.255
exec ipsec policy add spd 2 priority 15 outbound action bypass local-ip-range 20.20.34.0 - 20.20.34.255 remote-ip-range 10.10.24.0 - 10.10.24.255
exec ipsec policy add spd 2 priority 16 outbound action bypass local-ip-range 20.20.35.0 - 20.20.35.255 remote-ip-range 10.10.25.0 - 10.10.25.255
exec ipsec policy add spd 2 priority 17 outbound action bypass local-ip-range 20.20.36.0 - 20.20.36.255 remote-ip-range 10.10.26.0 - 10.10.26.255
exec ipsec policy add spd 2 priority 18 outbound action bypass local-ip-range 20.20.37.0 - 20.20.37.255 remote-ip-range 10.10.27.0 - 10.10.27.255
exec ipsec policy add spd 2 priority 19 outbound action bypass local-ip-range 20.20.38.0 - 20.20.38.255 remote-ip-range 10.10.28.0 - 10.10.28.255
exec ipsec policy add spd 2 priority 20 outbound action bypass local-ip-range 20.20.39.0 - 20.20.39.255 remote-ip-range 10.10.29.0 - 10.10.29.255
exec ipsec policy add spd 2 priority 21 outbound action bypass local-ip-range 20.20.40.0 - 20.20.40.255 remote-ip-range 10.10.30.0 - 10.10.30.255
exec ipsec policy add spd 2 priority 22 outbound action bypass local-ip-range 20.20.41.0 - 20.20.41.255 remote-ip-range 10.10.31.0 - 10.10.31.255
exec ipsec policy add spd 2 priority 23 outbound action bypass local-ip-range 20.20.42.0 - 20.20.42.255 remote-ip-range 10.10.32.0 - 10.10.32.255
exec ipsec policy add spd 2 priority 24 outbound action bypass local-ip-range 20.20.43.0 - 20.20.43.255 remote-ip-range 10.10.33.0 - 10.10.33.255
exec ipsec policy add spd 2 priority 25 outbound action bypass local-ip-range 20.20.44.0 - 20.20.44.255 remote-ip-range 10.10.34.0 - 10.10.34.255
exec ipsec policy add spd 2 priority 26 outbound action bypass local-ip-range 20.20.45.0 - 20.20.45.255 remote-ip-range 10.10.35.0 - 10.10.35.255
exec ipsec policy add spd 2 priority 27 outbound action bypass local-ip-range 20.20.46.0 - 20.20.46.255 remote-ip-range 10.10.36.0 - 10.10.36.255
exec ipsec policy add spd 2 priority 28 outbound action bypass local-ip-range 20.20.47.0 - 20.20.47.255 remote-ip-range 10.10.37.0 - 10.10.37.255
exec ipsec policy add spd 2 priority 29 outbound action bypass local-ip-range 20.20.48.0 - 20.20.48.255 remote-ip-range 10.10.38.0 - 10.10.38.255
exec ipsec policy add spd 2 priority 30 outbound action bypass local-ip-range 20.20.49.0 - 20.20.49.255 remote-ip-range 10.10.39.0 - 10.10.39.255
exec ipsec policy add spd 2 priority 31 outbound action bypass local-ip-range 20.20.50.0 - 20.20.50.255 remote-ip-range 10.10.40.0 - 10.10.40.255
exec ipsec policy add spd 2 priority 32 outbound action bypass local-ip-range 20.20.51.0 - 20.20.51.255 remote-ip-range 10.10.41.0 - 10.10.41.255
exec ipsec policy add spd 2 priority 33 outbound action bypass local-ip-range 20.20.52.0 - 20.20.52.255 remote-ip-range 10.10.42.0 - 10.10.42.255
exec ipsec policy add spd 2 priority 34 outbound action bypass local-ip-range 20.20.53.0 - 20.20.53.255 remote-ip-range 10.10.43.0 - 10.10.43.255
exec ipsec policy add spd 2 priority 35 outbound action bypass local-ip-range 20.20.54.0 - 20.20.54.255 remote-ip-range 10.10.44.0 - 10.10.44.255
exec ipsec policy add spd 2 priority 36 outbound action bypass local-ip-range 20.20.55.0 - 20.20.55.255 remote-ip-range 10.10.45.0 - 10.10.45.255
exec ipsec policy add spd 2 priority 37 outbound action bypass local-ip-range 20.20.56.0 - 20.20.56.255 remote-ip-range 10.10.46.0 - 10.10.46.255
exec ipsec policy add spd 2 priority 38 outbound action bypass local-ip-range 20.20.57.0 - 20.20.57.255 remote-ip-range 10.10.47.0 - 10.10.47.255
exec ipsec policy add spd 2 priority 39 outbound action bypass local-ip-range 20.20.58.0 - 20.20.58.255 remote-ip-range 10.10.48.0 - 10.10.48.255
exec ipsec policy add spd 2 priority 40 outbound action bypass local-ip-range 20.20.59.0 - 20.20.59.255 remote-ip-range 10.10.49.0 - 10.10.49.255
exec ipsec policy add spd 2 priority 41 outbound action bypass local-ip-range 20.20.60.0 - 20.20.60.255 remote-ip-range 10.10.50.0 - 10.10.50.255
exec ipsec policy add spd 2 priority 42 outbound action bypass local-ip-range 20.20.61.0 - 20.20.61.255 remote-ip-range 10.10.51.0 - 10.10.51.255
exec ipsec policy add spd 2 priority 43 outbound action bypass local-ip-range 20.20.62.0 - 20.20.62.255 remote-ip-range 10.10.52.0 - 10.10.52.255
exec ipsec policy add spd 2 priority 44 outbound action bypass local-ip-range 20.20.63.0 - 20.20.63.255 remote-ip-range 10.10.53.0 - 10.10.53.255
exec ipsec policy add spd 2 priority 45 outbound action bypass local-ip-range 20.20.64.0 - 20.20.64.255 remote-ip-range 10.10.54.0 - 10.10.54.255
exec ipsec policy add spd 2 priority 46 outbound action bypass local-ip-range 20.20.65.0 - 20.20.65.255 remote-ip-range 10.10.55.0 - 10.10.55.255
exec ipsec policy add spd 2 priority 47 outbound action bypass local-ip-range 20.20.66.0 - 20.20.66.255 remote-ip-range 10.10.56.0 - 10.10.56.255
exec ipsec policy add spd 2 priority 48 outbound action bypass local-ip-range 20.20.67.0 - 20.20.67.255 remote-ip-range 10.10.57.0 - 10.10.57.255
exec ipsec policy add spd 2 priority 49 outbound action bypass local-ip-range 20.20.68.0 - 20.20.68.255 remote-ip-range 10.10.58.0 - 10.10.58.255
exec ipsec policy add spd 2 priority 50 outbound action bypass local-ip-range 20.20.69.0 - 20.20.69.255 remote-ip-range 10.10.59.0 - 10.10.59.255
exec ipsec policy add spd 2 priority 51 outbound action bypass local-ip-range 20.20.70.0 - 20.20.70.255 remote-ip-range 10.10.60.0 - 10.10.60.255
exec ipsec policy add spd 2 priority 52 outbound action bypass local-ip-range 20.20.71.0 - 20.20.71.255 remote-ip-range 10.10.61.0 - 10.10.61.255
exec ipsec policy add spd 2 priority 53 outbound action bypass local-ip-range 20.20.72.0 - 20.20.72.255 remote-ip-range 10.10.62.0 - 10.10.62.255
exec ipsec policy add spd 2 priority 54 outbound action bypass local-ip-range 20.20.73.0 - 20.20.73.255 remote-ip-range 10.10.63.0 - 10.10.63.255
exec ipsec policy add spd 2 priority 55 outbound action bypass local-ip-range 20.20.74.0 - 20.20.74.255 remote-ip-range 10.10.64.0 - 10.10.64.255
exec ipsec policy add spd 2 priority 56 outbound action bypass local-ip-range 20.20.75.0 - 20.20.75.255 remote-ip-range 10.10.65.0 - 10.10.65.255
exec ipsec policy add spd 2 priority 57 outbound action bypass local-ip-range 20.20.76.0 - 20.20.76.255 remote-ip-range 10.10.66.0 - 10.10.66.255
exec ipsec policy add spd 2 priority 58 outbound action bypass local-ip-range 20.20.77.0 - 20.20.77.255 remote-ip-range 10.10.67.0 - 10.10.67.255
exec ipsec policy add spd 2 priority 59 outbound action bypass local-ip-range 20.20.78.0 - 20.20.78.255 remote-ip-range 10.10.68.0 - 10.10.68.255
exec ipsec policy add spd 2 priority 60 outbound action bypass local-ip-range 20.20.79.0 - 20.20.79.255 remote-ip-range 10.10.69.0 - 10.10.69.255
exec ipsec policy add spd 2 priority 61 outbound action bypass local-ip-range 20.20.80.0 - 20.20.80.255 remote-ip-range 10.10.70.0 - 10.10.70.255
exec ipsec policy add spd 2 priority 62 outbound action bypass local-ip-range 20.20.81.0 - 20.20.81.255 remote-ip-range 10.10.71.0 - 10.10.71.255
exec ipsec policy add spd 2 priority 63 outbound action bypass local-ip-range 20.20.82.0 - 20.20.82.255 remote-ip-range 10.10.72.0 - 10.10.72.255
exec ipsec policy add spd 2 priority 64 outbound action bypass local-ip-range 20.20.83.0 - 20.20.83.255 remote-ip-range 10.10.73.0 - 10.10.73.255
exec ipsec policy add spd 2 priority 65 outbound action bypass local-ip-range 20.20.84.0 - 20.20.84.255 remote-ip-range 10.10.74.0 - 10.10.74.255
exec ipsec policy add spd 2 priority 66 outbound action bypass local-ip-range 20.20.85.0 - 20.20.85.255 remote-ip-range 10.10.75.0 - 10.10.75.255
exec ipsec policy add spd 2 priority 67 outbound action bypass local-ip-range 20.20.86.0 - 20.20.86.255 remote-ip-range 10.10.76.0 - 10.10.76.255
exec ipsec policy add spd 2 priority 68 outbound action bypass local-ip-range 20.20.87.0 - 20.20.87.255 remote-ip-range 10.10.77.0 - 10.10.77.255
exec ipsec policy add spd 2 priority 69 outbound action bypass local-ip-range 20.20.88.0 - 20.20.88.255 remote-ip-range 10.10.78.0 - 10.10.78.255
exec ipsec policy add spd 2 priority 70 outbound action bypass local-ip-range 20.20.89.0 - 20.20.89.255 remote-ip-range 10.10.79.0 - 10.10.79.255
exec ipsec policy add spd 2 priority 71 outbound action bypass local-ip-range 20.20.90.0 - 20.20.90.255 remote-ip-range 10.10.80.0 - 10.10.80.255
exec ipsec policy add spd 2 priority 72 outbound action bypass local-ip-range 20.20.91.0 - 20.20.91.255 remote-ip-range 10.10.81.0 - 10.10.81.255
exec ipsec policy add spd 2 priority 73 outbound action bypass local-ip-range 20.20.92.0 - 20.20.92.255 remote-ip-range 10.10.82.0 - 10.10.82.255
exec ipsec policy add spd 2 priority 74 outbound action bypass local-ip-range 20.20.93.0 - 20.20.93.255 remote-ip-range 10.10.83.0 - 10.10.83.255
exec ipsec policy add spd 2 priority 75 outbound action bypass local-ip-range 20.20.94.0 - 20.20.94.255 remote-ip-range 10.10.84.0 - 10.10.84.255
exec ipsec policy add spd 2 priority 76 outbound action bypass local-ip-range 20.20.95.0 - 20.20.95.255 remote-ip-range 10.10.85.0 - 10.10.85.255
exec ipsec policy add spd 2 priority 77 outbound action bypass local-ip-range 20.20.96.0 - 20.20.96.255 remote-ip-range 10.10.86.0 - 10.10.86.255
exec ipsec policy add spd 2 priority 78 outbound action bypass local-ip-range 20.20.97.0 - 20.20.97.255 remote-ip-range 10.10.87.0 - 10.10.87.255
exec ipsec policy add spd 2 priority 79 outbound action bypass local-ip-range 20.20.98.0 - 20.20.98.255 remote-ip-range 10.10.88.0 - 10.10.88.255
exec ipsec policy add spd 2 priority 80 outbound action bypass local-ip-range 20.20.99.0 - 20.20.99.255 remote-ip-range 10.10.89.0 - 10.10.89.255
exec ipsec policy add spd 2 priority 81 outbound action bypass local-ip-range 20.20.100.0 - 20.20.100.255 remote-ip-range 10.10.90.0 - 10.10.90.255
exec ipsec policy add spd 2 priority 82 outbound action bypass local-ip-range 20.20.101.0 - 20.20.101.255 remote-ip-range 10.10.91.0 - 10.10.91.255
exec ipsec policy add spd 2 priority 83 outbound action bypass local-ip-range 20.20.102.0 - 20.20.102.255 remote-ip-range 10.10.92.0 - 10.10.92.255
exec ipsec policy add spd 2 priority 84 outbound action bypass local-ip-range 20.20.103.0 - 20.20.103.255 remote-ip-range 10.10.93.0 - 10.10.93.255
exec ipsec policy add spd 2 priority 85 outbound action bypass local-ip-range 20.20.104.0 - 20.20.104.255 remote-ip-range 10.10.94.0 - 10.10.94.255
exec ipsec policy add spd 2 priority 86 outbound action bypass local-ip-range 20.20.105.0 - 20.20.105.255 remote-ip-range 10.10.95.0 - 10.10.95.255
exec ipsec policy add spd 2 priority 87 outbound action bypass local-ip-range 20.20.106.0 - 20.20.106.255 remote-ip-range 10.10.96.0 - 10.10.96.255
exec ipsec policy add spd 2 priority 88 outbound action bypass local-ip-range 20.20.107.0 - 20.20.107.255 remote-ip-range 10.10.97.0 - 10.10.97.255
exec ipsec policy add spd 2 priority 89 outbound action bypass local-ip-range 20.20.108.0 - 20.20.108.255 remote-ip-range 10.10.98.0 - 10.10.98.255
exec ipsec policy add spd 2 priority 90 outbound action bypass local-ip-range 20.20.109.0 - 20.20.109.255 remote-ip-range 10.10.99.0 - 10.10.99.255
exec ipsec policy add spd 2 priority 91 outbound action bypass local-ip-range 20.20.110.0 - 20.20.110.255 remote-ip-range 10.10.100.0 - 10.10.100.255
exec ipsec policy add spd 2 priority 92 outbound action bypass local-ip-range 20.20.111.0 - 20.20.111.255 remote-ip-range 10.10.101.0 - 10.10.101.255
exec ipsec policy add spd 2 priority 93 outbound action bypass local-ip-range 20.20.112.0 - 20.20.112.255 remote-ip-range 10.10.102.0 - 10.10.102.255
exec ipsec policy add spd 2 priority 94 outbound action bypass local-ip-range 20.20.113.0 - 20.20.113.255 remote-ip-range 10.10.103.0 - 10.10.103.255
exec ipsec policy add spd 2 priority 95 outbound action bypass local-ip-range 20.20.114.0 - 20.20.114.255 remote-ip-range 10.10.104.0 - 10.10.104.255
exec ipsec policy add spd 2 priority 96 outbound action bypass local-ip-range 20.20.115.0 - 20.20.115.255 remote-ip-range 10.10.105.0 - 10.10.105.255
exec ipsec policy add spd 2 priority 97 outbound action bypass local-ip-range 20.20.116.0 - 20.20.116.255 remote-ip-range 10.10.106.0 - 10.10.106.255
exec ipsec policy add spd 2 priority 98 outbound action bypass local-ip-range 20.20.117.0 - 20.20.117.255 remote-ip-range 10.10.107.0 - 10.10.107.255
exec ipsec policy add spd 2 priority 99 outbound action bypass local-ip-range 20.20.118.0 - 20.20.118.255 remote-ip-range 10.10.108.0 - 10.10.108.255
exec ipsec policy add spd 2 priority 100 outbound action bypass local-ip-range 20.20.119.0 - 20.20.119.255 remote-ip-range 10.10.109.0 - 10.10.109.255
cli_inband(cmd=’show ipsec all’)

 64b-2t2c-ethip4ipsec100spe-ip4base- 
policy-outbound-nocrypto-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:90’, ‘ip_address’: ‘10.10.10.2’})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:91’, ‘ip_address’: ‘20.20.20.2’})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnx01’}}})
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14x01’}}})
ipsec_spd_add_del(is_add=True,spd_id=1)
ipsec_interface_add_del_spd(is_add=True,sw_if_index=2,spd_id=1)
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 1, ‘is_outbound’: True, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 0, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14xff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnx00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_spd_add_del(is_add=True,spd_id=2)
ipsec_interface_add_del_spd(is_add=True,sw_if_index=1,spd_id=2)
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 2, ‘priority’: 1, ‘is_outbound’: True, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 0, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnx00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnxff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14xff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
exec ipsec policy add spd 1 priority 2 outbound action bypass local-ip-range 10.10.11.0 - 10.10.11.255 remote-ip-range 20.20.21.0 - 20.20.21.255
exec ipsec policy add spd 1 priority 3 outbound action bypass local-ip-range 10.10.12.0 - 10.10.12.255 remote-ip-range 20.20.22.0 - 20.20.22.255
exec ipsec policy add spd 1 priority 4 outbound action bypass local-ip-range 10.10.13.0 - 10.10.13.255 remote-ip-range 20.20.23.0 - 20.20.23.255
exec ipsec policy add spd 1 priority 5 outbound action bypass local-ip-range 10.10.14.0 - 10.10.14.255 remote-ip-range 20.20.24.0 - 20.20.24.255
exec ipsec policy add spd 1 priority 6 outbound action bypass local-ip-range 10.10.15.0 - 10.10.15.255 remote-ip-range 20.20.25.0 - 20.20.25.255
exec ipsec policy add spd 1 priority 7 outbound action bypass local-ip-range 10.10.16.0 - 10.10.16.255 remote-ip-range 20.20.26.0 - 20.20.26.255
exec ipsec policy add spd 1 priority 8 outbound action bypass local-ip-range 10.10.17.0 - 10.10.17.255 remote-ip-range 20.20.27.0 - 20.20.27.255
exec ipsec policy add spd 1 priority 9 outbound action bypass local-ip-range 10.10.18.0 - 10.10.18.255 remote-ip-range 20.20.28.0 - 20.20.28.255
exec ipsec policy add spd 1 priority 10 outbound action bypass local-ip-range 10.10.19.0 - 10.10.19.255 remote-ip-range 20.20.29.0 - 20.20.29.255
exec ipsec policy add spd 1 priority 11 outbound action bypass local-ip-range 10.10.20.0 - 10.10.20.255 remote-ip-range 20.20.30.0 - 20.20.30.255
exec ipsec policy add spd 1 priority 12 outbound action bypass local-ip-range 10.10.21.0 - 10.10.21.255 remote-ip-range 20.20.31.0 - 20.20.31.255
exec ipsec policy add spd 1 priority 13 outbound action bypass local-ip-range 10.10.22.0 - 10.10.22.255 remote-ip-range 20.20.32.0 - 20.20.32.255
exec ipsec policy add spd 1 priority 14 outbound action bypass local-ip-range 10.10.23.0 - 10.10.23.255 remote-ip-range 20.20.33.0 - 20.20.33.255
exec ipsec policy add spd 1 priority 15 outbound action bypass local-ip-range 10.10.24.0 - 10.10.24.255 remote-ip-range 20.20.34.0 - 20.20.34.255
exec ipsec policy add spd 1 priority 16 outbound action bypass local-ip-range 10.10.25.0 - 10.10.25.255 remote-ip-range 20.20.35.0 - 20.20.35.255
exec ipsec policy add spd 1 priority 17 outbound action bypass local-ip-range 10.10.26.0 - 10.10.26.255 remote-ip-range 20.20.36.0 - 20.20.36.255
exec ipsec policy add spd 1 priority 18 outbound action bypass local-ip-range 10.10.27.0 - 10.10.27.255 remote-ip-range 20.20.37.0 - 20.20.37.255
exec ipsec policy add spd 1 priority 19 outbound action bypass local-ip-range 10.10.28.0 - 10.10.28.255 remote-ip-range 20.20.38.0 - 20.20.38.255
exec ipsec policy add spd 1 priority 20 outbound action bypass local-ip-range 10.10.29.0 - 10.10.29.255 remote-ip-range 20.20.39.0 - 20.20.39.255
exec ipsec policy add spd 1 priority 21 outbound action bypass local-ip-range 10.10.30.0 - 10.10.30.255 remote-ip-range 20.20.40.0 - 20.20.40.255
exec ipsec policy add spd 1 priority 22 outbound action bypass local-ip-range 10.10.31.0 - 10.10.31.255 remote-ip-range 20.20.41.0 - 20.20.41.255
exec ipsec policy add spd 1 priority 23 outbound action bypass local-ip-range 10.10.32.0 - 10.10.32.255 remote-ip-range 20.20.42.0 - 20.20.42.255
exec ipsec policy add spd 1 priority 24 outbound action bypass local-ip-range 10.10.33.0 - 10.10.33.255 remote-ip-range 20.20.43.0 - 20.20.43.255
exec ipsec policy add spd 1 priority 25 outbound action bypass local-ip-range 10.10.34.0 - 10.10.34.255 remote-ip-range 20.20.44.0 - 20.20.44.255
exec ipsec policy add spd 1 priority 26 outbound action bypass local-ip-range 10.10.35.0 - 10.10.35.255 remote-ip-range 20.20.45.0 - 20.20.45.255
exec ipsec policy add spd 1 priority 27 outbound action bypass local-ip-range 10.10.36.0 - 10.10.36.255 remote-ip-range 20.20.46.0 - 20.20.46.255
exec ipsec policy add spd 1 priority 28 outbound action bypass local-ip-range 10.10.37.0 - 10.10.37.255 remote-ip-range 20.20.47.0 - 20.20.47.255
exec ipsec policy add spd 1 priority 29 outbound action bypass local-ip-range 10.10.38.0 - 10.10.38.255 remote-ip-range 20.20.48.0 - 20.20.48.255
exec ipsec policy add spd 1 priority 30 outbound action bypass local-ip-range 10.10.39.0 - 10.10.39.255 remote-ip-range 20.20.49.0 - 20.20.49.255
exec ipsec policy add spd 1 priority 31 outbound action bypass local-ip-range 10.10.40.0 - 10.10.40.255 remote-ip-range 20.20.50.0 - 20.20.50.255
exec ipsec policy add spd 1 priority 32 outbound action bypass local-ip-range 10.10.41.0 - 10.10.41.255 remote-ip-range 20.20.51.0 - 20.20.51.255
exec ipsec policy add spd 1 priority 33 outbound action bypass local-ip-range 10.10.42.0 - 10.10.42.255 remote-ip-range 20.20.52.0 - 20.20.52.255
exec ipsec policy add spd 1 priority 34 outbound action bypass local-ip-range 10.10.43.0 - 10.10.43.255 remote-ip-range 20.20.53.0 - 20.20.53.255
exec ipsec policy add spd 1 priority 35 outbound action bypass local-ip-range 10.10.44.0 - 10.10.44.255 remote-ip-range 20.20.54.0 - 20.20.54.255
exec ipsec policy add spd 1 priority 36 outbound action bypass local-ip-range 10.10.45.0 - 10.10.45.255 remote-ip-range 20.20.55.0 - 20.20.55.255
exec ipsec policy add spd 1 priority 37 outbound action bypass local-ip-range 10.10.46.0 - 10.10.46.255 remote-ip-range 20.20.56.0 - 20.20.56.255
exec ipsec policy add spd 1 priority 38 outbound action bypass local-ip-range 10.10.47.0 - 10.10.47.255 remote-ip-range 20.20.57.0 - 20.20.57.255
exec ipsec policy add spd 1 priority 39 outbound action bypass local-ip-range 10.10.48.0 - 10.10.48.255 remote-ip-range 20.20.58.0 - 20.20.58.255
exec ipsec policy add spd 1 priority 40 outbound action bypass local-ip-range 10.10.49.0 - 10.10.49.255 remote-ip-range 20.20.59.0 - 20.20.59.255
exec ipsec policy add spd 1 priority 41 outbound action bypass local-ip-range 10.10.50.0 - 10.10.50.255 remote-ip-range 20.20.60.0 - 20.20.60.255
exec ipsec policy add spd 1 priority 42 outbound action bypass local-ip-range 10.10.51.0 - 10.10.51.255 remote-ip-range 20.20.61.0 - 20.20.61.255
exec ipsec policy add spd 1 priority 43 outbound action bypass local-ip-range 10.10.52.0 - 10.10.52.255 remote-ip-range 20.20.62.0 - 20.20.62.255
exec ipsec policy add spd 1 priority 44 outbound action bypass local-ip-range 10.10.53.0 - 10.10.53.255 remote-ip-range 20.20.63.0 - 20.20.63.255
exec ipsec policy add spd 1 priority 45 outbound action bypass local-ip-range 10.10.54.0 - 10.10.54.255 remote-ip-range 20.20.64.0 - 20.20.64.255
exec ipsec policy add spd 1 priority 46 outbound action bypass local-ip-range 10.10.55.0 - 10.10.55.255 remote-ip-range 20.20.65.0 - 20.20.65.255
exec ipsec policy add spd 1 priority 47 outbound action bypass local-ip-range 10.10.56.0 - 10.10.56.255 remote-ip-range 20.20.66.0 - 20.20.66.255
exec ipsec policy add spd 1 priority 48 outbound action bypass local-ip-range 10.10.57.0 - 10.10.57.255 remote-ip-range 20.20.67.0 - 20.20.67.255
exec ipsec policy add spd 1 priority 49 outbound action bypass local-ip-range 10.10.58.0 - 10.10.58.255 remote-ip-range 20.20.68.0 - 20.20.68.255
exec ipsec policy add spd 1 priority 50 outbound action bypass local-ip-range 10.10.59.0 - 10.10.59.255 remote-ip-range 20.20.69.0 - 20.20.69.255
exec ipsec policy add spd 1 priority 51 outbound action bypass local-ip-range 10.10.60.0 - 10.10.60.255 remote-ip-range 20.20.70.0 - 20.20.70.255
exec ipsec policy add spd 1 priority 52 outbound action bypass local-ip-range 10.10.61.0 - 10.10.61.255 remote-ip-range 20.20.71.0 - 20.20.71.255
exec ipsec policy add spd 1 priority 53 outbound action bypass local-ip-range 10.10.62.0 - 10.10.62.255 remote-ip-range 20.20.72.0 - 20.20.72.255
exec ipsec policy add spd 1 priority 54 outbound action bypass local-ip-range 10.10.63.0 - 10.10.63.255 remote-ip-range 20.20.73.0 - 20.20.73.255
exec ipsec policy add spd 1 priority 55 outbound action bypass local-ip-range 10.10.64.0 - 10.10.64.255 remote-ip-range 20.20.74.0 - 20.20.74.255
exec ipsec policy add spd 1 priority 56 outbound action bypass local-ip-range 10.10.65.0 - 10.10.65.255 remote-ip-range 20.20.75.0 - 20.20.75.255
exec ipsec policy add spd 1 priority 57 outbound action bypass local-ip-range 10.10.66.0 - 10.10.66.255 remote-ip-range 20.20.76.0 - 20.20.76.255
exec ipsec policy add spd 1 priority 58 outbound action bypass local-ip-range 10.10.67.0 - 10.10.67.255 remote-ip-range 20.20.77.0 - 20.20.77.255
exec ipsec policy add spd 1 priority 59 outbound action bypass local-ip-range 10.10.68.0 - 10.10.68.255 remote-ip-range 20.20.78.0 - 20.20.78.255
exec ipsec policy add spd 1 priority 60 outbound action bypass local-ip-range 10.10.69.0 - 10.10.69.255 remote-ip-range 20.20.79.0 - 20.20.79.255
exec ipsec policy add spd 1 priority 61 outbound action bypass local-ip-range 10.10.70.0 - 10.10.70.255 remote-ip-range 20.20.80.0 - 20.20.80.255
exec ipsec policy add spd 1 priority 62 outbound action bypass local-ip-range 10.10.71.0 - 10.10.71.255 remote-ip-range 20.20.81.0 - 20.20.81.255
exec ipsec policy add spd 1 priority 63 outbound action bypass local-ip-range 10.10.72.0 - 10.10.72.255 remote-ip-range 20.20.82.0 - 20.20.82.255
exec ipsec policy add spd 1 priority 64 outbound action bypass local-ip-range 10.10.73.0 - 10.10.73.255 remote-ip-range 20.20.83.0 - 20.20.83.255
exec ipsec policy add spd 1 priority 65 outbound action bypass local-ip-range 10.10.74.0 - 10.10.74.255 remote-ip-range 20.20.84.0 - 20.20.84.255
exec ipsec policy add spd 1 priority 66 outbound action bypass local-ip-range 10.10.75.0 - 10.10.75.255 remote-ip-range 20.20.85.0 - 20.20.85.255
exec ipsec policy add spd 1 priority 67 outbound action bypass local-ip-range 10.10.76.0 - 10.10.76.255 remote-ip-range 20.20.86.0 - 20.20.86.255
exec ipsec policy add spd 1 priority 68 outbound action bypass local-ip-range 10.10.77.0 - 10.10.77.255 remote-ip-range 20.20.87.0 - 20.20.87.255
exec ipsec policy add spd 1 priority 69 outbound action bypass local-ip-range 10.10.78.0 - 10.10.78.255 remote-ip-range 20.20.88.0 - 20.20.88.255
exec ipsec policy add spd 1 priority 70 outbound action bypass local-ip-range 10.10.79.0 - 10.10.79.255 remote-ip-range 20.20.89.0 - 20.20.89.255
exec ipsec policy add spd 1 priority 71 outbound action bypass local-ip-range 10.10.80.0 - 10.10.80.255 remote-ip-range 20.20.90.0 - 20.20.90.255
exec ipsec policy add spd 1 priority 72 outbound action bypass local-ip-range 10.10.81.0 - 10.10.81.255 remote-ip-range 20.20.91.0 - 20.20.91.255
exec ipsec policy add spd 1 priority 73 outbound action bypass local-ip-range 10.10.82.0 - 10.10.82.255 remote-ip-range 20.20.92.0 - 20.20.92.255
exec ipsec policy add spd 1 priority 74 outbound action bypass local-ip-range 10.10.83.0 - 10.10.83.255 remote-ip-range 20.20.93.0 - 20.20.93.255
exec ipsec policy add spd 1 priority 75 outbound action bypass local-ip-range 10.10.84.0 - 10.10.84.255 remote-ip-range 20.20.94.0 - 20.20.94.255
exec ipsec policy add spd 1 priority 76 outbound action bypass local-ip-range 10.10.85.0 - 10.10.85.255 remote-ip-range 20.20.95.0 - 20.20.95.255
exec ipsec policy add spd 1 priority 77 outbound action bypass local-ip-range 10.10.86.0 - 10.10.86.255 remote-ip-range 20.20.96.0 - 20.20.96.255
exec ipsec policy add spd 1 priority 78 outbound action bypass local-ip-range 10.10.87.0 - 10.10.87.255 remote-ip-range 20.20.97.0 - 20.20.97.255
exec ipsec policy add spd 1 priority 79 outbound action bypass local-ip-range 10.10.88.0 - 10.10.88.255 remote-ip-range 20.20.98.0 - 20.20.98.255
exec ipsec policy add spd 1 priority 80 outbound action bypass local-ip-range 10.10.89.0 - 10.10.89.255 remote-ip-range 20.20.99.0 - 20.20.99.255
exec ipsec policy add spd 1 priority 81 outbound action bypass local-ip-range 10.10.90.0 - 10.10.90.255 remote-ip-range 20.20.100.0 - 20.20.100.255
exec ipsec policy add spd 1 priority 82 outbound action bypass local-ip-range 10.10.91.0 - 10.10.91.255 remote-ip-range 20.20.101.0 - 20.20.101.255
exec ipsec policy add spd 1 priority 83 outbound action bypass local-ip-range 10.10.92.0 - 10.10.92.255 remote-ip-range 20.20.102.0 - 20.20.102.255
exec ipsec policy add spd 1 priority 84 outbound action bypass local-ip-range 10.10.93.0 - 10.10.93.255 remote-ip-range 20.20.103.0 - 20.20.103.255
exec ipsec policy add spd 1 priority 85 outbound action bypass local-ip-range 10.10.94.0 - 10.10.94.255 remote-ip-range 20.20.104.0 - 20.20.104.255
exec ipsec policy add spd 1 priority 86 outbound action bypass local-ip-range 10.10.95.0 - 10.10.95.255 remote-ip-range 20.20.105.0 - 20.20.105.255
exec ipsec policy add spd 1 priority 87 outbound action bypass local-ip-range 10.10.96.0 - 10.10.96.255 remote-ip-range 20.20.106.0 - 20.20.106.255
exec ipsec policy add spd 1 priority 88 outbound action bypass local-ip-range 10.10.97.0 - 10.10.97.255 remote-ip-range 20.20.107.0 - 20.20.107.255
exec ipsec policy add spd 1 priority 89 outbound action bypass local-ip-range 10.10.98.0 - 10.10.98.255 remote-ip-range 20.20.108.0 - 20.20.108.255
exec ipsec policy add spd 1 priority 90 outbound action bypass local-ip-range 10.10.99.0 - 10.10.99.255 remote-ip-range 20.20.109.0 - 20.20.109.255
exec ipsec policy add spd 1 priority 91 outbound action bypass local-ip-range 10.10.100.0 - 10.10.100.255 remote-ip-range 20.20.110.0 - 20.20.110.255
exec ipsec policy add spd 1 priority 92 outbound action bypass local-ip-range 10.10.101.0 - 10.10.101.255 remote-ip-range 20.20.111.0 - 20.20.111.255
exec ipsec policy add spd 1 priority 93 outbound action bypass local-ip-range 10.10.102.0 - 10.10.102.255 remote-ip-range 20.20.112.0 - 20.20.112.255
exec ipsec policy add spd 1 priority 94 outbound action bypass local-ip-range 10.10.103.0 - 10.10.103.255 remote-ip-range 20.20.113.0 - 20.20.113.255
exec ipsec policy add spd 1 priority 95 outbound action bypass local-ip-range 10.10.104.0 - 10.10.104.255 remote-ip-range 20.20.114.0 - 20.20.114.255
exec ipsec policy add spd 1 priority 96 outbound action bypass local-ip-range 10.10.105.0 - 10.10.105.255 remote-ip-range 20.20.115.0 - 20.20.115.255
exec ipsec policy add spd 1 priority 97 outbound action bypass local-ip-range 10.10.106.0 - 10.10.106.255 remote-ip-range 20.20.116.0 - 20.20.116.255
exec ipsec policy add spd 1 priority 98 outbound action bypass local-ip-range 10.10.107.0 - 10.10.107.255 remote-ip-range 20.20.117.0 - 20.20.117.255
exec ipsec policy add spd 1 priority 99 outbound action bypass local-ip-range 10.10.108.0 - 10.10.108.255 remote-ip-range 20.20.118.0 - 20.20.118.255
exec ipsec policy add spd 1 priority 100 outbound action bypass local-ip-range 10.10.109.0 - 10.10.109.255 remote-ip-range 20.20.119.0 - 20.20.119.255
exec ipsec policy add spd 2 priority 2 outbound action bypass local-ip-range 20.20.21.0 - 20.20.21.255 remote-ip-range 10.10.11.0 - 10.10.11.255
exec ipsec policy add spd 2 priority 3 outbound action bypass local-ip-range 20.20.22.0 - 20.20.22.255 remote-ip-range 10.10.12.0 - 10.10.12.255
exec ipsec policy add spd 2 priority 4 outbound action bypass local-ip-range 20.20.23.0 - 20.20.23.255 remote-ip-range 10.10.13.0 - 10.10.13.255
exec ipsec policy add spd 2 priority 5 outbound action bypass local-ip-range 20.20.24.0 - 20.20.24.255 remote-ip-range 10.10.14.0 - 10.10.14.255
exec ipsec policy add spd 2 priority 6 outbound action bypass local-ip-range 20.20.25.0 - 20.20.25.255 remote-ip-range 10.10.15.0 - 10.10.15.255
exec ipsec policy add spd 2 priority 7 outbound action bypass local-ip-range 20.20.26.0 - 20.20.26.255 remote-ip-range 10.10.16.0 - 10.10.16.255
exec ipsec policy add spd 2 priority 8 outbound action bypass local-ip-range 20.20.27.0 - 20.20.27.255 remote-ip-range 10.10.17.0 - 10.10.17.255
exec ipsec policy add spd 2 priority 9 outbound action bypass local-ip-range 20.20.28.0 - 20.20.28.255 remote-ip-range 10.10.18.0 - 10.10.18.255
exec ipsec policy add spd 2 priority 10 outbound action bypass local-ip-range 20.20.29.0 - 20.20.29.255 remote-ip-range 10.10.19.0 - 10.10.19.255
exec ipsec policy add spd 2 priority 11 outbound action bypass local-ip-range 20.20.30.0 - 20.20.30.255 remote-ip-range 10.10.20.0 - 10.10.20.255
exec ipsec policy add spd 2 priority 12 outbound action bypass local-ip-range 20.20.31.0 - 20.20.31.255 remote-ip-range 10.10.21.0 - 10.10.21.255
exec ipsec policy add spd 2 priority 13 outbound action bypass local-ip-range 20.20.32.0 - 20.20.32.255 remote-ip-range 10.10.22.0 - 10.10.22.255
exec ipsec policy add spd 2 priority 14 outbound action bypass local-ip-range 20.20.33.0 - 20.20.33.255 remote-ip-range 10.10.23.0 - 10.10.23.255
exec ipsec policy add spd 2 priority 15 outbound action bypass local-ip-range 20.20.34.0 - 20.20.34.255 remote-ip-range 10.10.24.0 - 10.10.24.255
exec ipsec policy add spd 2 priority 16 outbound action bypass local-ip-range 20.20.35.0 - 20.20.35.255 remote-ip-range 10.10.25.0 - 10.10.25.255
exec ipsec policy add spd 2 priority 17 outbound action bypass local-ip-range 20.20.36.0 - 20.20.36.255 remote-ip-range 10.10.26.0 - 10.10.26.255
exec ipsec policy add spd 2 priority 18 outbound action bypass local-ip-range 20.20.37.0 - 20.20.37.255 remote-ip-range 10.10.27.0 - 10.10.27.255
exec ipsec policy add spd 2 priority 19 outbound action bypass local-ip-range 20.20.38.0 - 20.20.38.255 remote-ip-range 10.10.28.0 - 10.10.28.255
exec ipsec policy add spd 2 priority 20 outbound action bypass local-ip-range 20.20.39.0 - 20.20.39.255 remote-ip-range 10.10.29.0 - 10.10.29.255
exec ipsec policy add spd 2 priority 21 outbound action bypass local-ip-range 20.20.40.0 - 20.20.40.255 remote-ip-range 10.10.30.0 - 10.10.30.255
exec ipsec policy add spd 2 priority 22 outbound action bypass local-ip-range 20.20.41.0 - 20.20.41.255 remote-ip-range 10.10.31.0 - 10.10.31.255
exec ipsec policy add spd 2 priority 23 outbound action bypass local-ip-range 20.20.42.0 - 20.20.42.255 remote-ip-range 10.10.32.0 - 10.10.32.255
exec ipsec policy add spd 2 priority 24 outbound action bypass local-ip-range 20.20.43.0 - 20.20.43.255 remote-ip-range 10.10.33.0 - 10.10.33.255
exec ipsec policy add spd 2 priority 25 outbound action bypass local-ip-range 20.20.44.0 - 20.20.44.255 remote-ip-range 10.10.34.0 - 10.10.34.255
exec ipsec policy add spd 2 priority 26 outbound action bypass local-ip-range 20.20.45.0 - 20.20.45.255 remote-ip-range 10.10.35.0 - 10.10.35.255
exec ipsec policy add spd 2 priority 27 outbound action bypass local-ip-range 20.20.46.0 - 20.20.46.255 remote-ip-range 10.10.36.0 - 10.10.36.255
exec ipsec policy add spd 2 priority 28 outbound action bypass local-ip-range 20.20.47.0 - 20.20.47.255 remote-ip-range 10.10.37.0 - 10.10.37.255
exec ipsec policy add spd 2 priority 29 outbound action bypass local-ip-range 20.20.48.0 - 20.20.48.255 remote-ip-range 10.10.38.0 - 10.10.38.255
exec ipsec policy add spd 2 priority 30 outbound action bypass local-ip-range 20.20.49.0 - 20.20.49.255 remote-ip-range 10.10.39.0 - 10.10.39.255
exec ipsec policy add spd 2 priority 31 outbound action bypass local-ip-range 20.20.50.0 - 20.20.50.255 remote-ip-range 10.10.40.0 - 10.10.40.255
exec ipsec policy add spd 2 priority 32 outbound action bypass local-ip-range 20.20.51.0 - 20.20.51.255 remote-ip-range 10.10.41.0 - 10.10.41.255
exec ipsec policy add spd 2 priority 33 outbound action bypass local-ip-range 20.20.52.0 - 20.20.52.255 remote-ip-range 10.10.42.0 - 10.10.42.255
exec ipsec policy add spd 2 priority 34 outbound action bypass local-ip-range 20.20.53.0 - 20.20.53.255 remote-ip-range 10.10.43.0 - 10.10.43.255
exec ipsec policy add spd 2 priority 35 outbound action bypass local-ip-range 20.20.54.0 - 20.20.54.255 remote-ip-range 10.10.44.0 - 10.10.44.255
exec ipsec policy add spd 2 priority 36 outbound action bypass local-ip-range 20.20.55.0 - 20.20.55.255 remote-ip-range 10.10.45.0 - 10.10.45.255
exec ipsec policy add spd 2 priority 37 outbound action bypass local-ip-range 20.20.56.0 - 20.20.56.255 remote-ip-range 10.10.46.0 - 10.10.46.255
exec ipsec policy add spd 2 priority 38 outbound action bypass local-ip-range 20.20.57.0 - 20.20.57.255 remote-ip-range 10.10.47.0 - 10.10.47.255
exec ipsec policy add spd 2 priority 39 outbound action bypass local-ip-range 20.20.58.0 - 20.20.58.255 remote-ip-range 10.10.48.0 - 10.10.48.255
exec ipsec policy add spd 2 priority 40 outbound action bypass local-ip-range 20.20.59.0 - 20.20.59.255 remote-ip-range 10.10.49.0 - 10.10.49.255
exec ipsec policy add spd 2 priority 41 outbound action bypass local-ip-range 20.20.60.0 - 20.20.60.255 remote-ip-range 10.10.50.0 - 10.10.50.255
exec ipsec policy add spd 2 priority 42 outbound action bypass local-ip-range 20.20.61.0 - 20.20.61.255 remote-ip-range 10.10.51.0 - 10.10.51.255
exec ipsec policy add spd 2 priority 43 outbound action bypass local-ip-range 20.20.62.0 - 20.20.62.255 remote-ip-range 10.10.52.0 - 10.10.52.255
exec ipsec policy add spd 2 priority 44 outbound action bypass local-ip-range 20.20.63.0 - 20.20.63.255 remote-ip-range 10.10.53.0 - 10.10.53.255
exec ipsec policy add spd 2 priority 45 outbound action bypass local-ip-range 20.20.64.0 - 20.20.64.255 remote-ip-range 10.10.54.0 - 10.10.54.255
exec ipsec policy add spd 2 priority 46 outbound action bypass local-ip-range 20.20.65.0 - 20.20.65.255 remote-ip-range 10.10.55.0 - 10.10.55.255
exec ipsec policy add spd 2 priority 47 outbound action bypass local-ip-range 20.20.66.0 - 20.20.66.255 remote-ip-range 10.10.56.0 - 10.10.56.255
exec ipsec policy add spd 2 priority 48 outbound action bypass local-ip-range 20.20.67.0 - 20.20.67.255 remote-ip-range 10.10.57.0 - 10.10.57.255
exec ipsec policy add spd 2 priority 49 outbound action bypass local-ip-range 20.20.68.0 - 20.20.68.255 remote-ip-range 10.10.58.0 - 10.10.58.255
exec ipsec policy add spd 2 priority 50 outbound action bypass local-ip-range 20.20.69.0 - 20.20.69.255 remote-ip-range 10.10.59.0 - 10.10.59.255
exec ipsec policy add spd 2 priority 51 outbound action bypass local-ip-range 20.20.70.0 - 20.20.70.255 remote-ip-range 10.10.60.0 - 10.10.60.255
exec ipsec policy add spd 2 priority 52 outbound action bypass local-ip-range 20.20.71.0 - 20.20.71.255 remote-ip-range 10.10.61.0 - 10.10.61.255
exec ipsec policy add spd 2 priority 53 outbound action bypass local-ip-range 20.20.72.0 - 20.20.72.255 remote-ip-range 10.10.62.0 - 10.10.62.255
exec ipsec policy add spd 2 priority 54 outbound action bypass local-ip-range 20.20.73.0 - 20.20.73.255 remote-ip-range 10.10.63.0 - 10.10.63.255
exec ipsec policy add spd 2 priority 55 outbound action bypass local-ip-range 20.20.74.0 - 20.20.74.255 remote-ip-range 10.10.64.0 - 10.10.64.255
exec ipsec policy add spd 2 priority 56 outbound action bypass local-ip-range 20.20.75.0 - 20.20.75.255 remote-ip-range 10.10.65.0 - 10.10.65.255
exec ipsec policy add spd 2 priority 57 outbound action bypass local-ip-range 20.20.76.0 - 20.20.76.255 remote-ip-range 10.10.66.0 - 10.10.66.255
exec ipsec policy add spd 2 priority 58 outbound action bypass local-ip-range 20.20.77.0 - 20.20.77.255 remote-ip-range 10.10.67.0 - 10.10.67.255
exec ipsec policy add spd 2 priority 59 outbound action bypass local-ip-range 20.20.78.0 - 20.20.78.255 remote-ip-range 10.10.68.0 - 10.10.68.255
exec ipsec policy add spd 2 priority 60 outbound action bypass local-ip-range 20.20.79.0 - 20.20.79.255 remote-ip-range 10.10.69.0 - 10.10.69.255
exec ipsec policy add spd 2 priority 61 outbound action bypass local-ip-range 20.20.80.0 - 20.20.80.255 remote-ip-range 10.10.70.0 - 10.10.70.255
exec ipsec policy add spd 2 priority 62 outbound action bypass local-ip-range 20.20.81.0 - 20.20.81.255 remote-ip-range 10.10.71.0 - 10.10.71.255
exec ipsec policy add spd 2 priority 63 outbound action bypass local-ip-range 20.20.82.0 - 20.20.82.255 remote-ip-range 10.10.72.0 - 10.10.72.255
exec ipsec policy add spd 2 priority 64 outbound action bypass local-ip-range 20.20.83.0 - 20.20.83.255 remote-ip-range 10.10.73.0 - 10.10.73.255
exec ipsec policy add spd 2 priority 65 outbound action bypass local-ip-range 20.20.84.0 - 20.20.84.255 remote-ip-range 10.10.74.0 - 10.10.74.255
exec ipsec policy add spd 2 priority 66 outbound action bypass local-ip-range 20.20.85.0 - 20.20.85.255 remote-ip-range 10.10.75.0 - 10.10.75.255
exec ipsec policy add spd 2 priority 67 outbound action bypass local-ip-range 20.20.86.0 - 20.20.86.255 remote-ip-range 10.10.76.0 - 10.10.76.255
exec ipsec policy add spd 2 priority 68 outbound action bypass local-ip-range 20.20.87.0 - 20.20.87.255 remote-ip-range 10.10.77.0 - 10.10.77.255
exec ipsec policy add spd 2 priority 69 outbound action bypass local-ip-range 20.20.88.0 - 20.20.88.255 remote-ip-range 10.10.78.0 - 10.10.78.255
exec ipsec policy add spd 2 priority 70 outbound action bypass local-ip-range 20.20.89.0 - 20.20.89.255 remote-ip-range 10.10.79.0 - 10.10.79.255
exec ipsec policy add spd 2 priority 71 outbound action bypass local-ip-range 20.20.90.0 - 20.20.90.255 remote-ip-range 10.10.80.0 - 10.10.80.255
exec ipsec policy add spd 2 priority 72 outbound action bypass local-ip-range 20.20.91.0 - 20.20.91.255 remote-ip-range 10.10.81.0 - 10.10.81.255
exec ipsec policy add spd 2 priority 73 outbound action bypass local-ip-range 20.20.92.0 - 20.20.92.255 remote-ip-range 10.10.82.0 - 10.10.82.255
exec ipsec policy add spd 2 priority 74 outbound action bypass local-ip-range 20.20.93.0 - 20.20.93.255 remote-ip-range 10.10.83.0 - 10.10.83.255
exec ipsec policy add spd 2 priority 75 outbound action bypass local-ip-range 20.20.94.0 - 20.20.94.255 remote-ip-range 10.10.84.0 - 10.10.84.255
exec ipsec policy add spd 2 priority 76 outbound action bypass local-ip-range 20.20.95.0 - 20.20.95.255 remote-ip-range 10.10.85.0 - 10.10.85.255
exec ipsec policy add spd 2 priority 77 outbound action bypass local-ip-range 20.20.96.0 - 20.20.96.255 remote-ip-range 10.10.86.0 - 10.10.86.255
exec ipsec policy add spd 2 priority 78 outbound action bypass local-ip-range 20.20.97.0 - 20.20.97.255 remote-ip-range 10.10.87.0 - 10.10.87.255
exec ipsec policy add spd 2 priority 79 outbound action bypass local-ip-range 20.20.98.0 - 20.20.98.255 remote-ip-range 10.10.88.0 - 10.10.88.255
exec ipsec policy add spd 2 priority 80 outbound action bypass local-ip-range 20.20.99.0 - 20.20.99.255 remote-ip-range 10.10.89.0 - 10.10.89.255
exec ipsec policy add spd 2 priority 81 outbound action bypass local-ip-range 20.20.100.0 - 20.20.100.255 remote-ip-range 10.10.90.0 - 10.10.90.255
exec ipsec policy add spd 2 priority 82 outbound action bypass local-ip-range 20.20.101.0 - 20.20.101.255 remote-ip-range 10.10.91.0 - 10.10.91.255
exec ipsec policy add spd 2 priority 83 outbound action bypass local-ip-range 20.20.102.0 - 20.20.102.255 remote-ip-range 10.10.92.0 - 10.10.92.255
exec ipsec policy add spd 2 priority 84 outbound action bypass local-ip-range 20.20.103.0 - 20.20.103.255 remote-ip-range 10.10.93.0 - 10.10.93.255
exec ipsec policy add spd 2 priority 85 outbound action bypass local-ip-range 20.20.104.0 - 20.20.104.255 remote-ip-range 10.10.94.0 - 10.10.94.255
exec ipsec policy add spd 2 priority 86 outbound action bypass local-ip-range 20.20.105.0 - 20.20.105.255 remote-ip-range 10.10.95.0 - 10.10.95.255
exec ipsec policy add spd 2 priority 87 outbound action bypass local-ip-range 20.20.106.0 - 20.20.106.255 remote-ip-range 10.10.96.0 - 10.10.96.255
exec ipsec policy add spd 2 priority 88 outbound action bypass local-ip-range 20.20.107.0 - 20.20.107.255 remote-ip-range 10.10.97.0 - 10.10.97.255
exec ipsec policy add spd 2 priority 89 outbound action bypass local-ip-range 20.20.108.0 - 20.20.108.255 remote-ip-range 10.10.98.0 - 10.10.98.255
exec ipsec policy add spd 2 priority 90 outbound action bypass local-ip-range 20.20.109.0 - 20.20.109.255 remote-ip-range 10.10.99.0 - 10.10.99.255
exec ipsec policy add spd 2 priority 91 outbound action bypass local-ip-range 20.20.110.0 - 20.20.110.255 remote-ip-range 10.10.100.0 - 10.10.100.255
exec ipsec policy add spd 2 priority 92 outbound action bypass local-ip-range 20.20.111.0 - 20.20.111.255 remote-ip-range 10.10.101.0 - 10.10.101.255
exec ipsec policy add spd 2 priority 93 outbound action bypass local-ip-range 20.20.112.0 - 20.20.112.255 remote-ip-range 10.10.102.0 - 10.10.102.255
exec ipsec policy add spd 2 priority 94 outbound action bypass local-ip-range 20.20.113.0 - 20.20.113.255 remote-ip-range 10.10.103.0 - 10.10.103.255
exec ipsec policy add spd 2 priority 95 outbound action bypass local-ip-range 20.20.114.0 - 20.20.114.255 remote-ip-range 10.10.104.0 - 10.10.104.255
exec ipsec policy add spd 2 priority 96 outbound action bypass local-ip-range 20.20.115.0 - 20.20.115.255 remote-ip-range 10.10.105.0 - 10.10.105.255
exec ipsec policy add spd 2 priority 97 outbound action bypass local-ip-range 20.20.116.0 - 20.20.116.255 remote-ip-range 10.10.106.0 - 10.10.106.255
exec ipsec policy add spd 2 priority 98 outbound action bypass local-ip-range 20.20.117.0 - 20.20.117.255 remote-ip-range 10.10.107.0 - 10.10.107.255
exec ipsec policy add spd 2 priority 99 outbound action bypass local-ip-range 20.20.118.0 - 20.20.118.255 remote-ip-range 10.10.108.0 - 10.10.108.255
exec ipsec policy add spd 2 priority 100 outbound action bypass local-ip-range 20.20.119.0 - 20.20.119.255 remote-ip-range 10.10.109.0 - 10.10.109.255
cli_inband(cmd=’show ipsec all’)

 64b-4t4c-ethip4ipsec100spe-ip4base- 
policy-outbound-nocrypto-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:90’, ‘ip_address’: ‘10.10.10.2’})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:91’, ‘ip_address’: ‘20.20.20.2’})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnx01’}}})
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14x01’}}})
ipsec_spd_add_del(is_add=True,spd_id=1)
ipsec_interface_add_del_spd(is_add=True,sw_if_index=2,spd_id=1)
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 1, ‘is_outbound’: True, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 0, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14xff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnx00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_spd_add_del(is_add=True,spd_id=2)
ipsec_interface_add_del_spd(is_add=True,sw_if_index=1,spd_id=2)
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 2, ‘priority’: 1, ‘is_outbound’: True, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 0, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnx00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnxff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14xff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
exec ipsec policy add spd 1 priority 2 outbound action bypass local-ip-range 10.10.11.0 - 10.10.11.255 remote-ip-range 20.20.21.0 - 20.20.21.255
exec ipsec policy add spd 1 priority 3 outbound action bypass local-ip-range 10.10.12.0 - 10.10.12.255 remote-ip-range 20.20.22.0 - 20.20.22.255
exec ipsec policy add spd 1 priority 4 outbound action bypass local-ip-range 10.10.13.0 - 10.10.13.255 remote-ip-range 20.20.23.0 - 20.20.23.255
exec ipsec policy add spd 1 priority 5 outbound action bypass local-ip-range 10.10.14.0 - 10.10.14.255 remote-ip-range 20.20.24.0 - 20.20.24.255
exec ipsec policy add spd 1 priority 6 outbound action bypass local-ip-range 10.10.15.0 - 10.10.15.255 remote-ip-range 20.20.25.0 - 20.20.25.255
exec ipsec policy add spd 1 priority 7 outbound action bypass local-ip-range 10.10.16.0 - 10.10.16.255 remote-ip-range 20.20.26.0 - 20.20.26.255
exec ipsec policy add spd 1 priority 8 outbound action bypass local-ip-range 10.10.17.0 - 10.10.17.255 remote-ip-range 20.20.27.0 - 20.20.27.255
exec ipsec policy add spd 1 priority 9 outbound action bypass local-ip-range 10.10.18.0 - 10.10.18.255 remote-ip-range 20.20.28.0 - 20.20.28.255
exec ipsec policy add spd 1 priority 10 outbound action bypass local-ip-range 10.10.19.0 - 10.10.19.255 remote-ip-range 20.20.29.0 - 20.20.29.255
exec ipsec policy add spd 1 priority 11 outbound action bypass local-ip-range 10.10.20.0 - 10.10.20.255 remote-ip-range 20.20.30.0 - 20.20.30.255
exec ipsec policy add spd 1 priority 12 outbound action bypass local-ip-range 10.10.21.0 - 10.10.21.255 remote-ip-range 20.20.31.0 - 20.20.31.255
exec ipsec policy add spd 1 priority 13 outbound action bypass local-ip-range 10.10.22.0 - 10.10.22.255 remote-ip-range 20.20.32.0 - 20.20.32.255
exec ipsec policy add spd 1 priority 14 outbound action bypass local-ip-range 10.10.23.0 - 10.10.23.255 remote-ip-range 20.20.33.0 - 20.20.33.255
exec ipsec policy add spd 1 priority 15 outbound action bypass local-ip-range 10.10.24.0 - 10.10.24.255 remote-ip-range 20.20.34.0 - 20.20.34.255
exec ipsec policy add spd 1 priority 16 outbound action bypass local-ip-range 10.10.25.0 - 10.10.25.255 remote-ip-range 20.20.35.0 - 20.20.35.255
exec ipsec policy add spd 1 priority 17 outbound action bypass local-ip-range 10.10.26.0 - 10.10.26.255 remote-ip-range 20.20.36.0 - 20.20.36.255
exec ipsec policy add spd 1 priority 18 outbound action bypass local-ip-range 10.10.27.0 - 10.10.27.255 remote-ip-range 20.20.37.0 - 20.20.37.255
exec ipsec policy add spd 1 priority 19 outbound action bypass local-ip-range 10.10.28.0 - 10.10.28.255 remote-ip-range 20.20.38.0 - 20.20.38.255
exec ipsec policy add spd 1 priority 20 outbound action bypass local-ip-range 10.10.29.0 - 10.10.29.255 remote-ip-range 20.20.39.0 - 20.20.39.255
exec ipsec policy add spd 1 priority 21 outbound action bypass local-ip-range 10.10.30.0 - 10.10.30.255 remote-ip-range 20.20.40.0 - 20.20.40.255
exec ipsec policy add spd 1 priority 22 outbound action bypass local-ip-range 10.10.31.0 - 10.10.31.255 remote-ip-range 20.20.41.0 - 20.20.41.255
exec ipsec policy add spd 1 priority 23 outbound action bypass local-ip-range 10.10.32.0 - 10.10.32.255 remote-ip-range 20.20.42.0 - 20.20.42.255
exec ipsec policy add spd 1 priority 24 outbound action bypass local-ip-range 10.10.33.0 - 10.10.33.255 remote-ip-range 20.20.43.0 - 20.20.43.255
exec ipsec policy add spd 1 priority 25 outbound action bypass local-ip-range 10.10.34.0 - 10.10.34.255 remote-ip-range 20.20.44.0 - 20.20.44.255
exec ipsec policy add spd 1 priority 26 outbound action bypass local-ip-range 10.10.35.0 - 10.10.35.255 remote-ip-range 20.20.45.0 - 20.20.45.255
exec ipsec policy add spd 1 priority 27 outbound action bypass local-ip-range 10.10.36.0 - 10.10.36.255 remote-ip-range 20.20.46.0 - 20.20.46.255
exec ipsec policy add spd 1 priority 28 outbound action bypass local-ip-range 10.10.37.0 - 10.10.37.255 remote-ip-range 20.20.47.0 - 20.20.47.255
exec ipsec policy add spd 1 priority 29 outbound action bypass local-ip-range 10.10.38.0 - 10.10.38.255 remote-ip-range 20.20.48.0 - 20.20.48.255
exec ipsec policy add spd 1 priority 30 outbound action bypass local-ip-range 10.10.39.0 - 10.10.39.255 remote-ip-range 20.20.49.0 - 20.20.49.255
exec ipsec policy add spd 1 priority 31 outbound action bypass local-ip-range 10.10.40.0 - 10.10.40.255 remote-ip-range 20.20.50.0 - 20.20.50.255
exec ipsec policy add spd 1 priority 32 outbound action bypass local-ip-range 10.10.41.0 - 10.10.41.255 remote-ip-range 20.20.51.0 - 20.20.51.255
exec ipsec policy add spd 1 priority 33 outbound action bypass local-ip-range 10.10.42.0 - 10.10.42.255 remote-ip-range 20.20.52.0 - 20.20.52.255
exec ipsec policy add spd 1 priority 34 outbound action bypass local-ip-range 10.10.43.0 - 10.10.43.255 remote-ip-range 20.20.53.0 - 20.20.53.255
exec ipsec policy add spd 1 priority 35 outbound action bypass local-ip-range 10.10.44.0 - 10.10.44.255 remote-ip-range 20.20.54.0 - 20.20.54.255
exec ipsec policy add spd 1 priority 36 outbound action bypass local-ip-range 10.10.45.0 - 10.10.45.255 remote-ip-range 20.20.55.0 - 20.20.55.255
exec ipsec policy add spd 1 priority 37 outbound action bypass local-ip-range 10.10.46.0 - 10.10.46.255 remote-ip-range 20.20.56.0 - 20.20.56.255
exec ipsec policy add spd 1 priority 38 outbound action bypass local-ip-range 10.10.47.0 - 10.10.47.255 remote-ip-range 20.20.57.0 - 20.20.57.255
exec ipsec policy add spd 1 priority 39 outbound action bypass local-ip-range 10.10.48.0 - 10.10.48.255 remote-ip-range 20.20.58.0 - 20.20.58.255
exec ipsec policy add spd 1 priority 40 outbound action bypass local-ip-range 10.10.49.0 - 10.10.49.255 remote-ip-range 20.20.59.0 - 20.20.59.255
exec ipsec policy add spd 1 priority 41 outbound action bypass local-ip-range 10.10.50.0 - 10.10.50.255 remote-ip-range 20.20.60.0 - 20.20.60.255
exec ipsec policy add spd 1 priority 42 outbound action bypass local-ip-range 10.10.51.0 - 10.10.51.255 remote-ip-range 20.20.61.0 - 20.20.61.255
exec ipsec policy add spd 1 priority 43 outbound action bypass local-ip-range 10.10.52.0 - 10.10.52.255 remote-ip-range 20.20.62.0 - 20.20.62.255
exec ipsec policy add spd 1 priority 44 outbound action bypass local-ip-range 10.10.53.0 - 10.10.53.255 remote-ip-range 20.20.63.0 - 20.20.63.255
exec ipsec policy add spd 1 priority 45 outbound action bypass local-ip-range 10.10.54.0 - 10.10.54.255 remote-ip-range 20.20.64.0 - 20.20.64.255
exec ipsec policy add spd 1 priority 46 outbound action bypass local-ip-range 10.10.55.0 - 10.10.55.255 remote-ip-range 20.20.65.0 - 20.20.65.255
exec ipsec policy add spd 1 priority 47 outbound action bypass local-ip-range 10.10.56.0 - 10.10.56.255 remote-ip-range 20.20.66.0 - 20.20.66.255
exec ipsec policy add spd 1 priority 48 outbound action bypass local-ip-range 10.10.57.0 - 10.10.57.255 remote-ip-range 20.20.67.0 - 20.20.67.255
exec ipsec policy add spd 1 priority 49 outbound action bypass local-ip-range 10.10.58.0 - 10.10.58.255 remote-ip-range 20.20.68.0 - 20.20.68.255
exec ipsec policy add spd 1 priority 50 outbound action bypass local-ip-range 10.10.59.0 - 10.10.59.255 remote-ip-range 20.20.69.0 - 20.20.69.255
exec ipsec policy add spd 1 priority 51 outbound action bypass local-ip-range 10.10.60.0 - 10.10.60.255 remote-ip-range 20.20.70.0 - 20.20.70.255
exec ipsec policy add spd 1 priority 52 outbound action bypass local-ip-range 10.10.61.0 - 10.10.61.255 remote-ip-range 20.20.71.0 - 20.20.71.255
exec ipsec policy add spd 1 priority 53 outbound action bypass local-ip-range 10.10.62.0 - 10.10.62.255 remote-ip-range 20.20.72.0 - 20.20.72.255
exec ipsec policy add spd 1 priority 54 outbound action bypass local-ip-range 10.10.63.0 - 10.10.63.255 remote-ip-range 20.20.73.0 - 20.20.73.255
exec ipsec policy add spd 1 priority 55 outbound action bypass local-ip-range 10.10.64.0 - 10.10.64.255 remote-ip-range 20.20.74.0 - 20.20.74.255
exec ipsec policy add spd 1 priority 56 outbound action bypass local-ip-range 10.10.65.0 - 10.10.65.255 remote-ip-range 20.20.75.0 - 20.20.75.255
exec ipsec policy add spd 1 priority 57 outbound action bypass local-ip-range 10.10.66.0 - 10.10.66.255 remote-ip-range 20.20.76.0 - 20.20.76.255
exec ipsec policy add spd 1 priority 58 outbound action bypass local-ip-range 10.10.67.0 - 10.10.67.255 remote-ip-range 20.20.77.0 - 20.20.77.255
exec ipsec policy add spd 1 priority 59 outbound action bypass local-ip-range 10.10.68.0 - 10.10.68.255 remote-ip-range 20.20.78.0 - 20.20.78.255
exec ipsec policy add spd 1 priority 60 outbound action bypass local-ip-range 10.10.69.0 - 10.10.69.255 remote-ip-range 20.20.79.0 - 20.20.79.255
exec ipsec policy add spd 1 priority 61 outbound action bypass local-ip-range 10.10.70.0 - 10.10.70.255 remote-ip-range 20.20.80.0 - 20.20.80.255
exec ipsec policy add spd 1 priority 62 outbound action bypass local-ip-range 10.10.71.0 - 10.10.71.255 remote-ip-range 20.20.81.0 - 20.20.81.255
exec ipsec policy add spd 1 priority 63 outbound action bypass local-ip-range 10.10.72.0 - 10.10.72.255 remote-ip-range 20.20.82.0 - 20.20.82.255
exec ipsec policy add spd 1 priority 64 outbound action bypass local-ip-range 10.10.73.0 - 10.10.73.255 remote-ip-range 20.20.83.0 - 20.20.83.255
exec ipsec policy add spd 1 priority 65 outbound action bypass local-ip-range 10.10.74.0 - 10.10.74.255 remote-ip-range 20.20.84.0 - 20.20.84.255
exec ipsec policy add spd 1 priority 66 outbound action bypass local-ip-range 10.10.75.0 - 10.10.75.255 remote-ip-range 20.20.85.0 - 20.20.85.255
exec ipsec policy add spd 1 priority 67 outbound action bypass local-ip-range 10.10.76.0 - 10.10.76.255 remote-ip-range 20.20.86.0 - 20.20.86.255
exec ipsec policy add spd 1 priority 68 outbound action bypass local-ip-range 10.10.77.0 - 10.10.77.255 remote-ip-range 20.20.87.0 - 20.20.87.255
exec ipsec policy add spd 1 priority 69 outbound action bypass local-ip-range 10.10.78.0 - 10.10.78.255 remote-ip-range 20.20.88.0 - 20.20.88.255
exec ipsec policy add spd 1 priority 70 outbound action bypass local-ip-range 10.10.79.0 - 10.10.79.255 remote-ip-range 20.20.89.0 - 20.20.89.255
exec ipsec policy add spd 1 priority 71 outbound action bypass local-ip-range 10.10.80.0 - 10.10.80.255 remote-ip-range 20.20.90.0 - 20.20.90.255
exec ipsec policy add spd 1 priority 72 outbound action bypass local-ip-range 10.10.81.0 - 10.10.81.255 remote-ip-range 20.20.91.0 - 20.20.91.255
exec ipsec policy add spd 1 priority 73 outbound action bypass local-ip-range 10.10.82.0 - 10.10.82.255 remote-ip-range 20.20.92.0 - 20.20.92.255
exec ipsec policy add spd 1 priority 74 outbound action bypass local-ip-range 10.10.83.0 - 10.10.83.255 remote-ip-range 20.20.93.0 - 20.20.93.255
exec ipsec policy add spd 1 priority 75 outbound action bypass local-ip-range 10.10.84.0 - 10.10.84.255 remote-ip-range 20.20.94.0 - 20.20.94.255
exec ipsec policy add spd 1 priority 76 outbound action bypass local-ip-range 10.10.85.0 - 10.10.85.255 remote-ip-range 20.20.95.0 - 20.20.95.255
exec ipsec policy add spd 1 priority 77 outbound action bypass local-ip-range 10.10.86.0 - 10.10.86.255 remote-ip-range 20.20.96.0 - 20.20.96.255
exec ipsec policy add spd 1 priority 78 outbound action bypass local-ip-range 10.10.87.0 - 10.10.87.255 remote-ip-range 20.20.97.0 - 20.20.97.255
exec ipsec policy add spd 1 priority 79 outbound action bypass local-ip-range 10.10.88.0 - 10.10.88.255 remote-ip-range 20.20.98.0 - 20.20.98.255
exec ipsec policy add spd 1 priority 80 outbound action bypass local-ip-range 10.10.89.0 - 10.10.89.255 remote-ip-range 20.20.99.0 - 20.20.99.255
exec ipsec policy add spd 1 priority 81 outbound action bypass local-ip-range 10.10.90.0 - 10.10.90.255 remote-ip-range 20.20.100.0 - 20.20.100.255
exec ipsec policy add spd 1 priority 82 outbound action bypass local-ip-range 10.10.91.0 - 10.10.91.255 remote-ip-range 20.20.101.0 - 20.20.101.255
exec ipsec policy add spd 1 priority 83 outbound action bypass local-ip-range 10.10.92.0 - 10.10.92.255 remote-ip-range 20.20.102.0 - 20.20.102.255
exec ipsec policy add spd 1 priority 84 outbound action bypass local-ip-range 10.10.93.0 - 10.10.93.255 remote-ip-range 20.20.103.0 - 20.20.103.255
exec ipsec policy add spd 1 priority 85 outbound action bypass local-ip-range 10.10.94.0 - 10.10.94.255 remote-ip-range 20.20.104.0 - 20.20.104.255
exec ipsec policy add spd 1 priority 86 outbound action bypass local-ip-range 10.10.95.0 - 10.10.95.255 remote-ip-range 20.20.105.0 - 20.20.105.255
exec ipsec policy add spd 1 priority 87 outbound action bypass local-ip-range 10.10.96.0 - 10.10.96.255 remote-ip-range 20.20.106.0 - 20.20.106.255
exec ipsec policy add spd 1 priority 88 outbound action bypass local-ip-range 10.10.97.0 - 10.10.97.255 remote-ip-range 20.20.107.0 - 20.20.107.255
exec ipsec policy add spd 1 priority 89 outbound action bypass local-ip-range 10.10.98.0 - 10.10.98.255 remote-ip-range 20.20.108.0 - 20.20.108.255
exec ipsec policy add spd 1 priority 90 outbound action bypass local-ip-range 10.10.99.0 - 10.10.99.255 remote-ip-range 20.20.109.0 - 20.20.109.255
exec ipsec policy add spd 1 priority 91 outbound action bypass local-ip-range 10.10.100.0 - 10.10.100.255 remote-ip-range 20.20.110.0 - 20.20.110.255
exec ipsec policy add spd 1 priority 92 outbound action bypass local-ip-range 10.10.101.0 - 10.10.101.255 remote-ip-range 20.20.111.0 - 20.20.111.255
exec ipsec policy add spd 1 priority 93 outbound action bypass local-ip-range 10.10.102.0 - 10.10.102.255 remote-ip-range 20.20.112.0 - 20.20.112.255
exec ipsec policy add spd 1 priority 94 outbound action bypass local-ip-range 10.10.103.0 - 10.10.103.255 remote-ip-range 20.20.113.0 - 20.20.113.255
exec ipsec policy add spd 1 priority 95 outbound action bypass local-ip-range 10.10.104.0 - 10.10.104.255 remote-ip-range 20.20.114.0 - 20.20.114.255
exec ipsec policy add spd 1 priority 96 outbound action bypass local-ip-range 10.10.105.0 - 10.10.105.255 remote-ip-range 20.20.115.0 - 20.20.115.255
exec ipsec policy add spd 1 priority 97 outbound action bypass local-ip-range 10.10.106.0 - 10.10.106.255 remote-ip-range 20.20.116.0 - 20.20.116.255
exec ipsec policy add spd 1 priority 98 outbound action bypass local-ip-range 10.10.107.0 - 10.10.107.255 remote-ip-range 20.20.117.0 - 20.20.117.255
exec ipsec policy add spd 1 priority 99 outbound action bypass local-ip-range 10.10.108.0 - 10.10.108.255 remote-ip-range 20.20.118.0 - 20.20.118.255
exec ipsec policy add spd 1 priority 100 outbound action bypass local-ip-range 10.10.109.0 - 10.10.109.255 remote-ip-range 20.20.119.0 - 20.20.119.255
exec ipsec policy add spd 2 priority 2 outbound action bypass local-ip-range 20.20.21.0 - 20.20.21.255 remote-ip-range 10.10.11.0 - 10.10.11.255
exec ipsec policy add spd 2 priority 3 outbound action bypass local-ip-range 20.20.22.0 - 20.20.22.255 remote-ip-range 10.10.12.0 - 10.10.12.255
exec ipsec policy add spd 2 priority 4 outbound action bypass local-ip-range 20.20.23.0 - 20.20.23.255 remote-ip-range 10.10.13.0 - 10.10.13.255
exec ipsec policy add spd 2 priority 5 outbound action bypass local-ip-range 20.20.24.0 - 20.20.24.255 remote-ip-range 10.10.14.0 - 10.10.14.255
exec ipsec policy add spd 2 priority 6 outbound action bypass local-ip-range 20.20.25.0 - 20.20.25.255 remote-ip-range 10.10.15.0 - 10.10.15.255
exec ipsec policy add spd 2 priority 7 outbound action bypass local-ip-range 20.20.26.0 - 20.20.26.255 remote-ip-range 10.10.16.0 - 10.10.16.255
exec ipsec policy add spd 2 priority 8 outbound action bypass local-ip-range 20.20.27.0 - 20.20.27.255 remote-ip-range 10.10.17.0 - 10.10.17.255
exec ipsec policy add spd 2 priority 9 outbound action bypass local-ip-range 20.20.28.0 - 20.20.28.255 remote-ip-range 10.10.18.0 - 10.10.18.255
exec ipsec policy add spd 2 priority 10 outbound action bypass local-ip-range 20.20.29.0 - 20.20.29.255 remote-ip-range 10.10.19.0 - 10.10.19.255
exec ipsec policy add spd 2 priority 11 outbound action bypass local-ip-range 20.20.30.0 - 20.20.30.255 remote-ip-range 10.10.20.0 - 10.10.20.255
exec ipsec policy add spd 2 priority 12 outbound action bypass local-ip-range 20.20.31.0 - 20.20.31.255 remote-ip-range 10.10.21.0 - 10.10.21.255
exec ipsec policy add spd 2 priority 13 outbound action bypass local-ip-range 20.20.32.0 - 20.20.32.255 remote-ip-range 10.10.22.0 - 10.10.22.255
exec ipsec policy add spd 2 priority 14 outbound action bypass local-ip-range 20.20.33.0 - 20.20.33.255 remote-ip-range 10.10.23.0 - 10.10.23.255
exec ipsec policy add spd 2 priority 15 outbound action bypass local-ip-range 20.20.34.0 - 20.20.34.255 remote-ip-range 10.10.24.0 - 10.10.24.255
exec ipsec policy add spd 2 priority 16 outbound action bypass local-ip-range 20.20.35.0 - 20.20.35.255 remote-ip-range 10.10.25.0 - 10.10.25.255
exec ipsec policy add spd 2 priority 17 outbound action bypass local-ip-range 20.20.36.0 - 20.20.36.255 remote-ip-range 10.10.26.0 - 10.10.26.255
exec ipsec policy add spd 2 priority 18 outbound action bypass local-ip-range 20.20.37.0 - 20.20.37.255 remote-ip-range 10.10.27.0 - 10.10.27.255
exec ipsec policy add spd 2 priority 19 outbound action bypass local-ip-range 20.20.38.0 - 20.20.38.255 remote-ip-range 10.10.28.0 - 10.10.28.255
exec ipsec policy add spd 2 priority 20 outbound action bypass local-ip-range 20.20.39.0 - 20.20.39.255 remote-ip-range 10.10.29.0 - 10.10.29.255
exec ipsec policy add spd 2 priority 21 outbound action bypass local-ip-range 20.20.40.0 - 20.20.40.255 remote-ip-range 10.10.30.0 - 10.10.30.255
exec ipsec policy add spd 2 priority 22 outbound action bypass local-ip-range 20.20.41.0 - 20.20.41.255 remote-ip-range 10.10.31.0 - 10.10.31.255
exec ipsec policy add spd 2 priority 23 outbound action bypass local-ip-range 20.20.42.0 - 20.20.42.255 remote-ip-range 10.10.32.0 - 10.10.32.255
exec ipsec policy add spd 2 priority 24 outbound action bypass local-ip-range 20.20.43.0 - 20.20.43.255 remote-ip-range 10.10.33.0 - 10.10.33.255
exec ipsec policy add spd 2 priority 25 outbound action bypass local-ip-range 20.20.44.0 - 20.20.44.255 remote-ip-range 10.10.34.0 - 10.10.34.255
exec ipsec policy add spd 2 priority 26 outbound action bypass local-ip-range 20.20.45.0 - 20.20.45.255 remote-ip-range 10.10.35.0 - 10.10.35.255
exec ipsec policy add spd 2 priority 27 outbound action bypass local-ip-range 20.20.46.0 - 20.20.46.255 remote-ip-range 10.10.36.0 - 10.10.36.255
exec ipsec policy add spd 2 priority 28 outbound action bypass local-ip-range 20.20.47.0 - 20.20.47.255 remote-ip-range 10.10.37.0 - 10.10.37.255
exec ipsec policy add spd 2 priority 29 outbound action bypass local-ip-range 20.20.48.0 - 20.20.48.255 remote-ip-range 10.10.38.0 - 10.10.38.255
exec ipsec policy add spd 2 priority 30 outbound action bypass local-ip-range 20.20.49.0 - 20.20.49.255 remote-ip-range 10.10.39.0 - 10.10.39.255
exec ipsec policy add spd 2 priority 31 outbound action bypass local-ip-range 20.20.50.0 - 20.20.50.255 remote-ip-range 10.10.40.0 - 10.10.40.255
exec ipsec policy add spd 2 priority 32 outbound action bypass local-ip-range 20.20.51.0 - 20.20.51.255 remote-ip-range 10.10.41.0 - 10.10.41.255
exec ipsec policy add spd 2 priority 33 outbound action bypass local-ip-range 20.20.52.0 - 20.20.52.255 remote-ip-range 10.10.42.0 - 10.10.42.255
exec ipsec policy add spd 2 priority 34 outbound action bypass local-ip-range 20.20.53.0 - 20.20.53.255 remote-ip-range 10.10.43.0 - 10.10.43.255
exec ipsec policy add spd 2 priority 35 outbound action bypass local-ip-range 20.20.54.0 - 20.20.54.255 remote-ip-range 10.10.44.0 - 10.10.44.255
exec ipsec policy add spd 2 priority 36 outbound action bypass local-ip-range 20.20.55.0 - 20.20.55.255 remote-ip-range 10.10.45.0 - 10.10.45.255
exec ipsec policy add spd 2 priority 37 outbound action bypass local-ip-range 20.20.56.0 - 20.20.56.255 remote-ip-range 10.10.46.0 - 10.10.46.255
exec ipsec policy add spd 2 priority 38 outbound action bypass local-ip-range 20.20.57.0 - 20.20.57.255 remote-ip-range 10.10.47.0 - 10.10.47.255
exec ipsec policy add spd 2 priority 39 outbound action bypass local-ip-range 20.20.58.0 - 20.20.58.255 remote-ip-range 10.10.48.0 - 10.10.48.255
exec ipsec policy add spd 2 priority 40 outbound action bypass local-ip-range 20.20.59.0 - 20.20.59.255 remote-ip-range 10.10.49.0 - 10.10.49.255
exec ipsec policy add spd 2 priority 41 outbound action bypass local-ip-range 20.20.60.0 - 20.20.60.255 remote-ip-range 10.10.50.0 - 10.10.50.255
exec ipsec policy add spd 2 priority 42 outbound action bypass local-ip-range 20.20.61.0 - 20.20.61.255 remote-ip-range 10.10.51.0 - 10.10.51.255
exec ipsec policy add spd 2 priority 43 outbound action bypass local-ip-range 20.20.62.0 - 20.20.62.255 remote-ip-range 10.10.52.0 - 10.10.52.255
exec ipsec policy add spd 2 priority 44 outbound action bypass local-ip-range 20.20.63.0 - 20.20.63.255 remote-ip-range 10.10.53.0 - 10.10.53.255
exec ipsec policy add spd 2 priority 45 outbound action bypass local-ip-range 20.20.64.0 - 20.20.64.255 remote-ip-range 10.10.54.0 - 10.10.54.255
exec ipsec policy add spd 2 priority 46 outbound action bypass local-ip-range 20.20.65.0 - 20.20.65.255 remote-ip-range 10.10.55.0 - 10.10.55.255
exec ipsec policy add spd 2 priority 47 outbound action bypass local-ip-range 20.20.66.0 - 20.20.66.255 remote-ip-range 10.10.56.0 - 10.10.56.255
exec ipsec policy add spd 2 priority 48 outbound action bypass local-ip-range 20.20.67.0 - 20.20.67.255 remote-ip-range 10.10.57.0 - 10.10.57.255
exec ipsec policy add spd 2 priority 49 outbound action bypass local-ip-range 20.20.68.0 - 20.20.68.255 remote-ip-range 10.10.58.0 - 10.10.58.255
exec ipsec policy add spd 2 priority 50 outbound action bypass local-ip-range 20.20.69.0 - 20.20.69.255 remote-ip-range 10.10.59.0 - 10.10.59.255
exec ipsec policy add spd 2 priority 51 outbound action bypass local-ip-range 20.20.70.0 - 20.20.70.255 remote-ip-range 10.10.60.0 - 10.10.60.255
exec ipsec policy add spd 2 priority 52 outbound action bypass local-ip-range 20.20.71.0 - 20.20.71.255 remote-ip-range 10.10.61.0 - 10.10.61.255
exec ipsec policy add spd 2 priority 53 outbound action bypass local-ip-range 20.20.72.0 - 20.20.72.255 remote-ip-range 10.10.62.0 - 10.10.62.255
exec ipsec policy add spd 2 priority 54 outbound action bypass local-ip-range 20.20.73.0 - 20.20.73.255 remote-ip-range 10.10.63.0 - 10.10.63.255
exec ipsec policy add spd 2 priority 55 outbound action bypass local-ip-range 20.20.74.0 - 20.20.74.255 remote-ip-range 10.10.64.0 - 10.10.64.255
exec ipsec policy add spd 2 priority 56 outbound action bypass local-ip-range 20.20.75.0 - 20.20.75.255 remote-ip-range 10.10.65.0 - 10.10.65.255
exec ipsec policy add spd 2 priority 57 outbound action bypass local-ip-range 20.20.76.0 - 20.20.76.255 remote-ip-range 10.10.66.0 - 10.10.66.255
exec ipsec policy add spd 2 priority 58 outbound action bypass local-ip-range 20.20.77.0 - 20.20.77.255 remote-ip-range 10.10.67.0 - 10.10.67.255
exec ipsec policy add spd 2 priority 59 outbound action bypass local-ip-range 20.20.78.0 - 20.20.78.255 remote-ip-range 10.10.68.0 - 10.10.68.255
exec ipsec policy add spd 2 priority 60 outbound action bypass local-ip-range 20.20.79.0 - 20.20.79.255 remote-ip-range 10.10.69.0 - 10.10.69.255
exec ipsec policy add spd 2 priority 61 outbound action bypass local-ip-range 20.20.80.0 - 20.20.80.255 remote-ip-range 10.10.70.0 - 10.10.70.255
exec ipsec policy add spd 2 priority 62 outbound action bypass local-ip-range 20.20.81.0 - 20.20.81.255 remote-ip-range 10.10.71.0 - 10.10.71.255
exec ipsec policy add spd 2 priority 63 outbound action bypass local-ip-range 20.20.82.0 - 20.20.82.255 remote-ip-range 10.10.72.0 - 10.10.72.255
exec ipsec policy add spd 2 priority 64 outbound action bypass local-ip-range 20.20.83.0 - 20.20.83.255 remote-ip-range 10.10.73.0 - 10.10.73.255
exec ipsec policy add spd 2 priority 65 outbound action bypass local-ip-range 20.20.84.0 - 20.20.84.255 remote-ip-range 10.10.74.0 - 10.10.74.255
exec ipsec policy add spd 2 priority 66 outbound action bypass local-ip-range 20.20.85.0 - 20.20.85.255 remote-ip-range 10.10.75.0 - 10.10.75.255
exec ipsec policy add spd 2 priority 67 outbound action bypass local-ip-range 20.20.86.0 - 20.20.86.255 remote-ip-range 10.10.76.0 - 10.10.76.255
exec ipsec policy add spd 2 priority 68 outbound action bypass local-ip-range 20.20.87.0 - 20.20.87.255 remote-ip-range 10.10.77.0 - 10.10.77.255
exec ipsec policy add spd 2 priority 69 outbound action bypass local-ip-range 20.20.88.0 - 20.20.88.255 remote-ip-range 10.10.78.0 - 10.10.78.255
exec ipsec policy add spd 2 priority 70 outbound action bypass local-ip-range 20.20.89.0 - 20.20.89.255 remote-ip-range 10.10.79.0 - 10.10.79.255
exec ipsec policy add spd 2 priority 71 outbound action bypass local-ip-range 20.20.90.0 - 20.20.90.255 remote-ip-range 10.10.80.0 - 10.10.80.255
exec ipsec policy add spd 2 priority 72 outbound action bypass local-ip-range 20.20.91.0 - 20.20.91.255 remote-ip-range 10.10.81.0 - 10.10.81.255
exec ipsec policy add spd 2 priority 73 outbound action bypass local-ip-range 20.20.92.0 - 20.20.92.255 remote-ip-range 10.10.82.0 - 10.10.82.255
exec ipsec policy add spd 2 priority 74 outbound action bypass local-ip-range 20.20.93.0 - 20.20.93.255 remote-ip-range 10.10.83.0 - 10.10.83.255
exec ipsec policy add spd 2 priority 75 outbound action bypass local-ip-range 20.20.94.0 - 20.20.94.255 remote-ip-range 10.10.84.0 - 10.10.84.255
exec ipsec policy add spd 2 priority 76 outbound action bypass local-ip-range 20.20.95.0 - 20.20.95.255 remote-ip-range 10.10.85.0 - 10.10.85.255
exec ipsec policy add spd 2 priority 77 outbound action bypass local-ip-range 20.20.96.0 - 20.20.96.255 remote-ip-range 10.10.86.0 - 10.10.86.255
exec ipsec policy add spd 2 priority 78 outbound action bypass local-ip-range 20.20.97.0 - 20.20.97.255 remote-ip-range 10.10.87.0 - 10.10.87.255
exec ipsec policy add spd 2 priority 79 outbound action bypass local-ip-range 20.20.98.0 - 20.20.98.255 remote-ip-range 10.10.88.0 - 10.10.88.255
exec ipsec policy add spd 2 priority 80 outbound action bypass local-ip-range 20.20.99.0 - 20.20.99.255 remote-ip-range 10.10.89.0 - 10.10.89.255
exec ipsec policy add spd 2 priority 81 outbound action bypass local-ip-range 20.20.100.0 - 20.20.100.255 remote-ip-range 10.10.90.0 - 10.10.90.255
exec ipsec policy add spd 2 priority 82 outbound action bypass local-ip-range 20.20.101.0 - 20.20.101.255 remote-ip-range 10.10.91.0 - 10.10.91.255
exec ipsec policy add spd 2 priority 83 outbound action bypass local-ip-range 20.20.102.0 - 20.20.102.255 remote-ip-range 10.10.92.0 - 10.10.92.255
exec ipsec policy add spd 2 priority 84 outbound action bypass local-ip-range 20.20.103.0 - 20.20.103.255 remote-ip-range 10.10.93.0 - 10.10.93.255
exec ipsec policy add spd 2 priority 85 outbound action bypass local-ip-range 20.20.104.0 - 20.20.104.255 remote-ip-range 10.10.94.0 - 10.10.94.255
exec ipsec policy add spd 2 priority 86 outbound action bypass local-ip-range 20.20.105.0 - 20.20.105.255 remote-ip-range 10.10.95.0 - 10.10.95.255
exec ipsec policy add spd 2 priority 87 outbound action bypass local-ip-range 20.20.106.0 - 20.20.106.255 remote-ip-range 10.10.96.0 - 10.10.96.255
exec ipsec policy add spd 2 priority 88 outbound action bypass local-ip-range 20.20.107.0 - 20.20.107.255 remote-ip-range 10.10.97.0 - 10.10.97.255
exec ipsec policy add spd 2 priority 89 outbound action bypass local-ip-range 20.20.108.0 - 20.20.108.255 remote-ip-range 10.10.98.0 - 10.10.98.255
exec ipsec policy add spd 2 priority 90 outbound action bypass local-ip-range 20.20.109.0 - 20.20.109.255 remote-ip-range 10.10.99.0 - 10.10.99.255
exec ipsec policy add spd 2 priority 91 outbound action bypass local-ip-range 20.20.110.0 - 20.20.110.255 remote-ip-range 10.10.100.0 - 10.10.100.255
exec ipsec policy add spd 2 priority 92 outbound action bypass local-ip-range 20.20.111.0 - 20.20.111.255 remote-ip-range 10.10.101.0 - 10.10.101.255
exec ipsec policy add spd 2 priority 93 outbound action bypass local-ip-range 20.20.112.0 - 20.20.112.255 remote-ip-range 10.10.102.0 - 10.10.102.255
exec ipsec policy add spd 2 priority 94 outbound action bypass local-ip-range 20.20.113.0 - 20.20.113.255 remote-ip-range 10.10.103.0 - 10.10.103.255
exec ipsec policy add spd 2 priority 95 outbound action bypass local-ip-range 20.20.114.0 - 20.20.114.255 remote-ip-range 10.10.104.0 - 10.10.104.255
exec ipsec policy add spd 2 priority 96 outbound action bypass local-ip-range 20.20.115.0 - 20.20.115.255 remote-ip-range 10.10.105.0 - 10.10.105.255
exec ipsec policy add spd 2 priority 97 outbound action bypass local-ip-range 20.20.116.0 - 20.20.116.255 remote-ip-range 10.10.106.0 - 10.10.106.255
exec ipsec policy add spd 2 priority 98 outbound action bypass local-ip-range 20.20.117.0 - 20.20.117.255 remote-ip-range 10.10.107.0 - 10.10.107.255
exec ipsec policy add spd 2 priority 99 outbound action bypass local-ip-range 20.20.118.0 - 20.20.118.255 remote-ip-range 10.10.108.0 - 10.10.108.255
exec ipsec policy add spd 2 priority 100 outbound action bypass local-ip-range 20.20.119.0 - 20.20.119.255 remote-ip-range 10.10.109.0 - 10.10.109.255
cli_inband(cmd=’show ipsec all’)

2n1l-40ge2p1xl710-ethip4ipsec1spe-cache-ip4base-policy-outbound-nocrypto-mrr

RFC4301: SPD lookup performance

  • [Top] Network Topologies: TG-DUT1-TG 2-node circular topology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 for IPv4 routing.

  • [Cfg] DUT configuration: DUT1 is configured with IPv4 routing, two static IPv4 /24 route entries, one SPD on each outbound interface in each direction and 1 SPD entry(ies) in each SPD. Only outbound traffic is matched and only the last rule is the matching rule. SPD flow-cache for IPv4 outbound traffic is enabled. DUT1 is tested with Intel-XL710.

  • [Ver] TG vefication: In MaxReceivedRate tests TG sends traffic at line rate and reports total received packets over trial period. Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, 253 flows per flow-group) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG node interfaces. The DUT does SPD lookup with only the lowest priority rule matching the traffic. The action of the matching rule is BYPASS. No encryption or authentication is done.

  • [Ref] Applicable standard specifications: RFC4301 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 64b-1t1c-ethip4ipsec1spe-cache- 
ip4base-policy-outbound-nocrypto-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:90’, ‘ip_address’: ‘10.10.10.2’})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:91’, ‘ip_address’: ‘20.20.20.2’})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnx01’}}})
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14x01’}}})
ipsec_spd_add_del(is_add=True,spd_id=1)
ipsec_interface_add_del_spd(is_add=True,sw_if_index=2,spd_id=1)
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 1, ‘is_outbound’: True, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 0, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14xff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnx00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_spd_add_del(is_add=True,spd_id=2)
ipsec_interface_add_del_spd(is_add=True,sw_if_index=1,spd_id=2)
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 2, ‘priority’: 1, ‘is_outbound’: True, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 0, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnx00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnxff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14xff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
cli_inband(cmd=’show ipsec all’)

 64b-2t2c-ethip4ipsec1spe-cache- 
ip4base-policy-outbound-nocrypto-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:90’, ‘ip_address’: ‘10.10.10.2’})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:91’, ‘ip_address’: ‘20.20.20.2’})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnx01’}}})
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14x01’}}})
ipsec_spd_add_del(is_add=True,spd_id=1)
ipsec_interface_add_del_spd(is_add=True,sw_if_index=2,spd_id=1)
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 1, ‘is_outbound’: True, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 0, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14xff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnx00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_spd_add_del(is_add=True,spd_id=2)
ipsec_interface_add_del_spd(is_add=True,sw_if_index=1,spd_id=2)
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 2, ‘priority’: 1, ‘is_outbound’: True, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 0, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnx00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnxff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14xff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
cli_inband(cmd=’show ipsec all’)

 64b-4t4c-ethip4ipsec1spe-cache- 
ip4base-policy-outbound-nocrypto-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:90’, ‘ip_address’: ‘10.10.10.2’})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:91’, ‘ip_address’: ‘20.20.20.2’})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnx01’}}})
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14x01’}}})
ipsec_spd_add_del(is_add=True,spd_id=1)
ipsec_interface_add_del_spd(is_add=True,sw_if_index=2,spd_id=1)
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 1, ‘is_outbound’: True, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 0, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14xff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnx00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_spd_add_del(is_add=True,spd_id=2)
ipsec_interface_add_del_spd(is_add=True,sw_if_index=1,spd_id=2)
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 2, ‘priority’: 1, ‘is_outbound’: True, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 0, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnx00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnxff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14xff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
cli_inband(cmd=’show ipsec all’)

2n1l-40ge2p1xl710-ethip4ipsec1spe-ip4base-policy-outbound-nocrypto-mrr

RFC4301: SPD lookup performance

  • [Top] Network Topologies: TG-DUT1-TG 2-node circular topology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 for IPv4 routing.

  • [Cfg] DUT configuration: DUT1 is configured with IPv4 routing, two static IPv4 /24 route entries, one SPD on each outbound interface in each direction and 1 SPD entry(ies) in each SPD. Only outbound traffic is matched and only the last rule is the matching rule. DUT1 tested with Intel-XL710.

  • [Ver] TG vefication: In MaxReceivedRate tests TG sends traffic at line rate and reports total received packets over trial period. Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, 253 flows per flow-group) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG node interfaces. The DUT does SPD lookup with only the lowest priority rule matching the traffic. The action of the matching rule is BYPASS. No encryption or authentication is done.

  • [Ref] Applicable standard specifications: RFC4301 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 64b-1t1c-ethip4ipsec1spe-ip4base- 
policy-outbound-nocrypto-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:90’, ‘ip_address’: ‘10.10.10.2’})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:91’, ‘ip_address’: ‘20.20.20.2’})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnx01’}}})
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14x01’}}})
ipsec_spd_add_del(is_add=True,spd_id=1)
ipsec_interface_add_del_spd(is_add=True,sw_if_index=2,spd_id=1)
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 1, ‘is_outbound’: True, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 0, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14xff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnx00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_spd_add_del(is_add=True,spd_id=2)
ipsec_interface_add_del_spd(is_add=True,sw_if_index=1,spd_id=2)
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 2, ‘priority’: 1, ‘is_outbound’: True, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 0, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnx00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnxff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14xff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
cli_inband(cmd=’show ipsec all’)

 64b-2t2c-ethip4ipsec1spe-ip4base- 
policy-outbound-nocrypto-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:90’, ‘ip_address’: ‘10.10.10.2’})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:91’, ‘ip_address’: ‘20.20.20.2’})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnx01’}}})
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14x01’}}})
ipsec_spd_add_del(is_add=True,spd_id=1)
ipsec_interface_add_del_spd(is_add=True,sw_if_index=2,spd_id=1)
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 1, ‘is_outbound’: True, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 0, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14xff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnx00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_spd_add_del(is_add=True,spd_id=2)
ipsec_interface_add_del_spd(is_add=True,sw_if_index=1,spd_id=2)
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 2, ‘priority’: 1, ‘is_outbound’: True, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 0, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnx00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnxff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14xff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
cli_inband(cmd=’show ipsec all’)

 64b-4t4c-ethip4ipsec1spe-ip4base- 
policy-outbound-nocrypto-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:90’, ‘ip_address’: ‘10.10.10.2’})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:91’, ‘ip_address’: ‘20.20.20.2’})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnx01’}}})
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14x01’}}})
ipsec_spd_add_del(is_add=True,spd_id=1)
ipsec_interface_add_del_spd(is_add=True,sw_if_index=2,spd_id=1)
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 1, ‘is_outbound’: True, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 0, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14xff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnx00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_spd_add_del(is_add=True,spd_id=2)
ipsec_interface_add_del_spd(is_add=True,sw_if_index=1,spd_id=2)
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 2, ‘priority’: 1, ‘is_outbound’: True, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 0, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnx00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnxff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14xff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
cli_inband(cmd=’show ipsec all’)

2n1l-40ge2p1xl710-ethip4ipsec1tnlsw-ip4base-policy-aes256gcm-udir-mrr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-TG 2-node circular topology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUT1, Eth-IPv4-IPSec on DUT1-TG.

  • [Cfg] DUT configuration: DUT1 is configured with multiple IPsec tunnels between it and TG. DUT gets IPv4 traffic from TG, encrypts it and sends back to TG.

  • [Ver] TG vefication: In MaxReceivedRate tests TG sends traffic at line rate and reports total received packets over trial period. Test packets are generated by TG on links to DUTs. TG traffic profile contains one L3 flow-groups (number of flows per flow-group equals to number of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG node interfaces. Incrementing of IP.dst (IPv4 destination address) field is applied to the stream.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 64b-1t1c-ethip4ipsec1tnlsw-ip4base- 
policy-aes256gcm-udir-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx01’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:90’, ‘ip_address’: ‘192.168.10.2’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nx02’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’dx00x00x02’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’dx00x00x02’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:91’, ‘ip_address’: IPv4Address(‘100.0.0.2’)})
ipsec_spd_add_del(is_add=True,spd_id=1)
ipsec_interface_add_del_spd(is_add=True,sw_if_index=2,spd_id=1)
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 100, ‘is_outbound’: True, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 50, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’dxffxffxff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’dxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 100, ‘is_outbound’: False, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 50, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’dxffxffxff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’dxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 300000, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’WpcAsXPpkBGbKWNQREjwmAOYwXRLDOxZ’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: 0}, ‘flags’: 4, ‘tunnel’: {‘src’: ‘100.0.0.1’, ‘dst’: ‘100.0.0.2’, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘protocol’: 50, ‘udp_src_port’: 4500, ‘udp_dst_port’: 4500})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 10, ‘is_outbound’: True, ‘sa_id’: 100000, ‘policy’: 3, ‘protocol’: 0, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x00x00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xffxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 200000, ‘spi’: 400000, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’WpcAsXPpkBGbKWNQREjwmAOYwXRLDOxZ’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: 0}, ‘flags’: 4, ‘tunnel’: {‘src’: ‘100.0.0.2’, ‘dst’: ‘100.0.0.1’, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘protocol’: 50, ‘udp_src_port’: 4500, ‘udp_dst_port’: 4500})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 10, ‘is_outbound’: False, ‘sa_id’: 200000, ‘policy’: 3, ‘protocol’: 0, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x00x00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xffxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})

 64b-2t2c-ethip4ipsec1tnlsw-ip4base- 
policy-aes256gcm-udir-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx01’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:90’, ‘ip_address’: ‘192.168.10.2’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nx02’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’dx00x00x02’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’dx00x00x02’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:91’, ‘ip_address’: IPv4Address(‘100.0.0.2’)})
ipsec_spd_add_del(is_add=True,spd_id=1)
ipsec_interface_add_del_spd(is_add=True,sw_if_index=2,spd_id=1)
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 100, ‘is_outbound’: True, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 50, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’dxffxffxff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’dxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 100, ‘is_outbound’: False, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 50, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’dxffxffxff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’dxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 300000, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’umvvbwRNBlxddObVgHgTDUXAcfohhktb’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: 0}, ‘flags’: 4, ‘tunnel’: {‘src’: ‘100.0.0.1’, ‘dst’: ‘100.0.0.2’, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘protocol’: 50, ‘udp_src_port’: 4500, ‘udp_dst_port’: 4500})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 10, ‘is_outbound’: True, ‘sa_id’: 100000, ‘policy’: 3, ‘protocol’: 0, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x00x00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xffxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 200000, ‘spi’: 400000, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’umvvbwRNBlxddObVgHgTDUXAcfohhktb’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: 0}, ‘flags’: 4, ‘tunnel’: {‘src’: ‘100.0.0.2’, ‘dst’: ‘100.0.0.1’, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘protocol’: 50, ‘udp_src_port’: 4500, ‘udp_dst_port’: 4500})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 10, ‘is_outbound’: False, ‘sa_id’: 200000, ‘policy’: 3, ‘protocol’: 0, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x00x00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xffxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})

 64b-4t4c-ethip4ipsec1tnlsw-ip4base- 
policy-aes256gcm-udir-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx01’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:90’, ‘ip_address’: ‘192.168.10.2’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nx02’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’dx00x00x02’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’dx00x00x02’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:91’, ‘ip_address’: IPv4Address(‘100.0.0.2’)})
ipsec_spd_add_del(is_add=True,spd_id=1)
ipsec_interface_add_del_spd(is_add=True,sw_if_index=2,spd_id=1)
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 100, ‘is_outbound’: True, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 50, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’dxffxffxff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’dxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 100, ‘is_outbound’: False, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 50, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’dxffxffxff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’dxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 300000, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’qLjaSrqvtlUhnxbPmfFcSImgVLzwMnrA’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: 0}, ‘flags’: 4, ‘tunnel’: {‘src’: ‘100.0.0.1’, ‘dst’: ‘100.0.0.2’, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘protocol’: 50, ‘udp_src_port’: 4500, ‘udp_dst_port’: 4500})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 10, ‘is_outbound’: True, ‘sa_id’: 100000, ‘policy’: 3, ‘protocol’: 0, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x00x00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xffxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 200000, ‘spi’: 400000, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’qLjaSrqvtlUhnxbPmfFcSImgVLzwMnrA’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: 0}, ‘flags’: 4, ‘tunnel’: {‘src’: ‘100.0.0.2’, ‘dst’: ‘100.0.0.1’, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘protocol’: 50, ‘udp_src_port’: 4500, ‘udp_dst_port’: 4500})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 10, ‘is_outbound’: False, ‘sa_id’: 200000, ‘policy’: 3, ‘protocol’: 0, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x00x00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xffxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})

2n1l-40ge2p1xl710-ethip4ipsec40tnlsw-ip4base-policy-aes256gcm-udir-mrr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-TG 2-node circular topology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUT1, Eth-IPv4-IPSec on DUT1-TG.

  • [Cfg] DUT configuration: DUT1 is configured with multiple IPsec tunnels between it and TG. DUT gets IPv4 traffic from TG, encrypts it and sends back to TG.

  • [Ver] TG vefication: In MaxReceivedRate tests TG sends traffic at line rate and reports total received packets over trial period. Test packets are generated by TG on links to DUTs. TG traffic profile contains one L3 flow-groups (number of flows per flow-group equals to number of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG node interfaces. Incrementing of IP.dst (IPv4 destination address) field is applied to the stream.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 64b-1t1c-ethip4ipsec40tnlsw-ip4base- 
policy-aes256gcm-udir-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx01’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:90’, ‘ip_address’: ‘192.168.10.2’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nx02’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.0.1/24
exec ip route add 20.0.0.0/32 via 100.0.0.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.0.2/32 via 100.0.0.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.0.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.1.1/24
exec ip route add 20.0.0.1/32 via 100.0.1.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.1.2/32 via 100.0.1.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.1.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.2.1/24
exec ip route add 20.0.0.2/32 via 100.0.2.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.2.2/32 via 100.0.2.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.2.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.3.1/24
exec ip route add 20.0.0.3/32 via 100.0.3.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.3.2/32 via 100.0.3.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.3.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.4.1/24
exec ip route add 20.0.0.4/32 via 100.0.4.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.4.2/32 via 100.0.4.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.4.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.5.1/24
exec ip route add 20.0.0.5/32 via 100.0.5.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.5.2/32 via 100.0.5.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.5.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.6.1/24
exec ip route add 20.0.0.6/32 via 100.0.6.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.6.2/32 via 100.0.6.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.6.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.7.1/24
exec ip route add 20.0.0.7/32 via 100.0.7.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.7.2/32 via 100.0.7.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.7.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.8.1/24
exec ip route add 20.0.0.8/32 via 100.0.8.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.8.2/32 via 100.0.8.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.8.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.9.1/24
exec ip route add 20.0.0.9/32 via 100.0.9.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.9.2/32 via 100.0.9.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.9.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.10.1/24
exec ip route add 20.0.0.10/32 via 100.0.10.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.10.2/32 via 100.0.10.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.10.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.11.1/24
exec ip route add 20.0.0.11/32 via 100.0.11.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.11.2/32 via 100.0.11.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.11.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.12.1/24
exec ip route add 20.0.0.12/32 via 100.0.12.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.12.2/32 via 100.0.12.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.12.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.13.1/24
exec ip route add 20.0.0.13/32 via 100.0.13.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.13.2/32 via 100.0.13.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.13.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.14.1/24
exec ip route add 20.0.0.14/32 via 100.0.14.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.14.2/32 via 100.0.14.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.14.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.15.1/24
exec ip route add 20.0.0.15/32 via 100.0.15.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.15.2/32 via 100.0.15.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.15.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.16.1/24
exec ip route add 20.0.0.16/32 via 100.0.16.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.16.2/32 via 100.0.16.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.16.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.17.1/24
exec ip route add 20.0.0.17/32 via 100.0.17.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.17.2/32 via 100.0.17.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.17.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.18.1/24
exec ip route add 20.0.0.18/32 via 100.0.18.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.18.2/32 via 100.0.18.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.18.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.19.1/24
exec ip route add 20.0.0.19/32 via 100.0.19.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.19.2/32 via 100.0.19.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.19.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.20.1/24
exec ip route add 20.0.0.20/32 via 100.0.20.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.20.2/32 via 100.0.20.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.20.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.21.1/24
exec ip route add 20.0.0.21/32 via 100.0.21.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.21.2/32 via 100.0.21.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.21.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.22.1/24
exec ip route add 20.0.0.22/32 via 100.0.22.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.22.2/32 via 100.0.22.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.22.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.23.1/24
exec ip route add 20.0.0.23/32 via 100.0.23.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.23.2/32 via 100.0.23.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.23.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.24.1/24
exec ip route add 20.0.0.24/32 via 100.0.24.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.24.2/32 via 100.0.24.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.24.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.25.1/24
exec ip route add 20.0.0.25/32 via 100.0.25.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.25.2/32 via 100.0.25.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.25.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.26.1/24
exec ip route add 20.0.0.26/32 via 100.0.26.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.26.2/32 via 100.0.26.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.26.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.27.1/24
exec ip route add 20.0.0.27/32 via 100.0.27.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.27.2/32 via 100.0.27.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.27.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.28.1/24
exec ip route add 20.0.0.28/32 via 100.0.28.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.28.2/32 via 100.0.28.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.28.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.29.1/24
exec ip route add 20.0.0.29/32 via 100.0.29.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.29.2/32 via 100.0.29.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.29.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.30.1/24
exec ip route add 20.0.0.30/32 via 100.0.30.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.30.2/32 via 100.0.30.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.30.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.31.1/24
exec ip route add 20.0.0.31/32 via 100.0.31.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.31.2/32 via 100.0.31.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.31.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.32.1/24
exec ip route add 20.0.0.32/32 via 100.0.32.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.32.2/32 via 100.0.32.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.32.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.33.1/24
exec ip route add 20.0.0.33/32 via 100.0.33.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.33.2/32 via 100.0.33.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.33.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.34.1/24
exec ip route add 20.0.0.34/32 via 100.0.34.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.34.2/32 via 100.0.34.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.34.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.35.1/24
exec ip route add 20.0.0.35/32 via 100.0.35.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.35.2/32 via 100.0.35.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.35.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.36.1/24
exec ip route add 20.0.0.36/32 via 100.0.36.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.36.2/32 via 100.0.36.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.36.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.37.1/24
exec ip route add 20.0.0.37/32 via 100.0.37.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.37.2/32 via 100.0.37.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.37.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.38.1/24
exec ip route add 20.0.0.38/32 via 100.0.38.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.38.2/32 via 100.0.38.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.38.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.39.1/24
exec ip route add 20.0.0.39/32 via 100.0.39.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.39.2/32 via 100.0.39.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.39.2 3c:fd:fe:c3:e0:91
ipsec_spd_add_del(is_add=True,spd_id=1)
ipsec_interface_add_del_spd(is_add=True,sw_if_index=2,spd_id=1)
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 100, ‘is_outbound’: True, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 50, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’dxffxffxff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’dxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 100, ‘is_outbound’: False, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 50, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’dxffxffxff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’dxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
exec ipsec sa add 100000 esp spi 300000 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.0.1 tunnel dst 100.0.0.2
exec ipsec sa add 100001 esp spi 300001 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.1.1 tunnel dst 100.0.1.2
exec ipsec sa add 100002 esp spi 300002 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.2.1 tunnel dst 100.0.2.2
exec ipsec sa add 100003 esp spi 300003 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.3.1 tunnel dst 100.0.3.2
exec ipsec sa add 100004 esp spi 300004 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.4.1 tunnel dst 100.0.4.2
exec ipsec sa add 100005 esp spi 300005 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.5.1 tunnel dst 100.0.5.2
exec ipsec sa add 100006 esp spi 300006 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.6.1 tunnel dst 100.0.6.2
exec ipsec sa add 100007 esp spi 300007 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.7.1 tunnel dst 100.0.7.2
exec ipsec sa add 100008 esp spi 300008 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.8.1 tunnel dst 100.0.8.2
exec ipsec sa add 100009 esp spi 300009 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.9.1 tunnel dst 100.0.9.2
exec ipsec sa add 100010 esp spi 300010 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.10.1 tunnel dst 100.0.10.2
exec ipsec sa add 100011 esp spi 300011 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.11.1 tunnel dst 100.0.11.2
exec ipsec sa add 100012 esp spi 300012 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.12.1 tunnel dst 100.0.12.2
exec ipsec sa add 100013 esp spi 300013 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.13.1 tunnel dst 100.0.13.2
exec ipsec sa add 100014 esp spi 300014 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.14.1 tunnel dst 100.0.14.2
exec ipsec sa add 100015 esp spi 300015 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.15.1 tunnel dst 100.0.15.2
exec ipsec sa add 100016 esp spi 300016 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.16.1 tunnel dst 100.0.16.2
exec ipsec sa add 100017 esp spi 300017 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.17.1 tunnel dst 100.0.17.2
exec ipsec sa add 100018 esp spi 300018 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.18.1 tunnel dst 100.0.18.2
exec ipsec sa add 100019 esp spi 300019 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.19.1 tunnel dst 100.0.19.2
exec ipsec sa add 100020 esp spi 300020 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.20.1 tunnel dst 100.0.20.2
exec ipsec sa add 100021 esp spi 300021 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.21.1 tunnel dst 100.0.21.2
exec ipsec sa add 100022 esp spi 300022 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.22.1 tunnel dst 100.0.22.2
exec ipsec sa add 100023 esp spi 300023 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.23.1 tunnel dst 100.0.23.2
exec ipsec sa add 100024 esp spi 300024 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.24.1 tunnel dst 100.0.24.2
exec ipsec sa add 100025 esp spi 300025 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.25.1 tunnel dst 100.0.25.2
exec ipsec sa add 100026 esp spi 300026 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.26.1 tunnel dst 100.0.26.2
exec ipsec sa add 100027 esp spi 300027 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.27.1 tunnel dst 100.0.27.2
exec ipsec sa add 100028 esp spi 300028 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.28.1 tunnel dst 100.0.28.2
exec ipsec sa add 100029 esp spi 300029 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.29.1 tunnel dst 100.0.29.2
exec ipsec sa add 100030 esp spi 300030 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.30.1 tunnel dst 100.0.30.2
exec ipsec sa add 100031 esp spi 300031 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.31.1 tunnel dst 100.0.31.2
exec ipsec sa add 100032 esp spi 300032 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.32.1 tunnel dst 100.0.32.2
exec ipsec sa add 100033 esp spi 300033 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.33.1 tunnel dst 100.0.33.2
exec ipsec sa add 100034 esp spi 300034 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.34.1 tunnel dst 100.0.34.2
exec ipsec sa add 100035 esp spi 300035 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.35.1 tunnel dst 100.0.35.2
exec ipsec sa add 100036 esp spi 300036 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.36.1 tunnel dst 100.0.36.2
exec ipsec sa add 100037 esp spi 300037 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.37.1 tunnel dst 100.0.37.2
exec ipsec sa add 100038 esp spi 300038 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.38.1 tunnel dst 100.0.38.2
exec ipsec sa add 100039 esp spi 300039 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.39.1 tunnel dst 100.0.39.2
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100000 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.0 - 20.0.0.0
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100001 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.1 - 20.0.0.1
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100002 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.2 - 20.0.0.2
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100003 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.3 - 20.0.0.3
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100004 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.4 - 20.0.0.4
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100005 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.5 - 20.0.0.5
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100006 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.6 - 20.0.0.6
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100007 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.7 - 20.0.0.7
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100008 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.8 - 20.0.0.8
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100009 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.9 - 20.0.0.9
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100010 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.10 - 20.0.0.10
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100011 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.11 - 20.0.0.11
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100012 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.12 - 20.0.0.12
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100013 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.13 - 20.0.0.13
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100014 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.14 - 20.0.0.14
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100015 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.15 - 20.0.0.15
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100016 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.16 - 20.0.0.16
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100017 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.17 - 20.0.0.17
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100018 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.18 - 20.0.0.18
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100019 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.19 - 20.0.0.19
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100020 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.20 - 20.0.0.20
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100021 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.21 - 20.0.0.21
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100022 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.22 - 20.0.0.22
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100023 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.23 - 20.0.0.23
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100024 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.24 - 20.0.0.24
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100025 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.25 - 20.0.0.25
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100026 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.26 - 20.0.0.26
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100027 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.27 - 20.0.0.27
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100028 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.28 - 20.0.0.28
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100029 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.29 - 20.0.0.29
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100030 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.30 - 20.0.0.30
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100031 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.31 - 20.0.0.31
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100032 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.32 - 20.0.0.32
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100033 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.33 - 20.0.0.33
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100034 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.34 - 20.0.0.34
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100035 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.35 - 20.0.0.35
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100036 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.36 - 20.0.0.36
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100037 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.37 - 20.0.0.37
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100038 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.38 - 20.0.0.38
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100039 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.39 - 20.0.0.39
exec ipsec sa add 200000 esp spi 400000 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.0.2 tunnel dst 100.0.0.1
exec ipsec sa add 200001 esp spi 400001 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.1.2 tunnel dst 100.0.1.1
exec ipsec sa add 200002 esp spi 400002 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.2.2 tunnel dst 100.0.2.1
exec ipsec sa add 200003 esp spi 400003 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.3.2 tunnel dst 100.0.3.1
exec ipsec sa add 200004 esp spi 400004 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.4.2 tunnel dst 100.0.4.1
exec ipsec sa add 200005 esp spi 400005 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.5.2 tunnel dst 100.0.5.1
exec ipsec sa add 200006 esp spi 400006 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.6.2 tunnel dst 100.0.6.1
exec ipsec sa add 200007 esp spi 400007 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.7.2 tunnel dst 100.0.7.1
exec ipsec sa add 200008 esp spi 400008 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.8.2 tunnel dst 100.0.8.1
exec ipsec sa add 200009 esp spi 400009 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.9.2 tunnel dst 100.0.9.1
exec ipsec sa add 200010 esp spi 400010 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.10.2 tunnel dst 100.0.10.1
exec ipsec sa add 200011 esp spi 400011 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.11.2 tunnel dst 100.0.11.1
exec ipsec sa add 200012 esp spi 400012 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.12.2 tunnel dst 100.0.12.1
exec ipsec sa add 200013 esp spi 400013 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.13.2 tunnel dst 100.0.13.1
exec ipsec sa add 200014 esp spi 400014 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.14.2 tunnel dst 100.0.14.1
exec ipsec sa add 200015 esp spi 400015 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.15.2 tunnel dst 100.0.15.1
exec ipsec sa add 200016 esp spi 400016 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.16.2 tunnel dst 100.0.16.1
exec ipsec sa add 200017 esp spi 400017 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.17.2 tunnel dst 100.0.17.1
exec ipsec sa add 200018 esp spi 400018 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.18.2 tunnel dst 100.0.18.1
exec ipsec sa add 200019 esp spi 400019 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.19.2 tunnel dst 100.0.19.1
exec ipsec sa add 200020 esp spi 400020 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.20.2 tunnel dst 100.0.20.1
exec ipsec sa add 200021 esp spi 400021 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.21.2 tunnel dst 100.0.21.1
exec ipsec sa add 200022 esp spi 400022 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.22.2 tunnel dst 100.0.22.1
exec ipsec sa add 200023 esp spi 400023 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.23.2 tunnel dst 100.0.23.1
exec ipsec sa add 200024 esp spi 400024 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.24.2 tunnel dst 100.0.24.1
exec ipsec sa add 200025 esp spi 400025 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.25.2 tunnel dst 100.0.25.1
exec ipsec sa add 200026 esp spi 400026 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.26.2 tunnel dst 100.0.26.1
exec ipsec sa add 200027 esp spi 400027 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.27.2 tunnel dst 100.0.27.1
exec ipsec sa add 200028 esp spi 400028 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.28.2 tunnel dst 100.0.28.1
exec ipsec sa add 200029 esp spi 400029 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.29.2 tunnel dst 100.0.29.1
exec ipsec sa add 200030 esp spi 400030 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.30.2 tunnel dst 100.0.30.1
exec ipsec sa add 200031 esp spi 400031 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.31.2 tunnel dst 100.0.31.1
exec ipsec sa add 200032 esp spi 400032 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.32.2 tunnel dst 100.0.32.1
exec ipsec sa add 200033 esp spi 400033 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.33.2 tunnel dst 100.0.33.1
exec ipsec sa add 200034 esp spi 400034 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.34.2 tunnel dst 100.0.34.1
exec ipsec sa add 200035 esp spi 400035 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.35.2 tunnel dst 100.0.35.1
exec ipsec sa add 200036 esp spi 400036 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.36.2 tunnel dst 100.0.36.1
exec ipsec sa add 200037 esp spi 400037 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.37.2 tunnel dst 100.0.37.1
exec ipsec sa add 200038 esp spi 400038 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.38.2 tunnel dst 100.0.38.1
exec ipsec sa add 200039 esp spi 400039 crypto-alg aes-gcm-256 crypto-key 6d4e5947687a66674c597762547359664a614c504d686e45475444554c744156 tunnel src 100.0.39.2 tunnel dst 100.0.39.1
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200000 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.0 - 10.0.0.0
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200001 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.1 - 10.0.0.1
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200002 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.2 - 10.0.0.2
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200003 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.3 - 10.0.0.3
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200004 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.4 - 10.0.0.4
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200005 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.5 - 10.0.0.5
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200006 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.6 - 10.0.0.6
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200007 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.7 - 10.0.0.7
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200008 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.8 - 10.0.0.8
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200009 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.9 - 10.0.0.9
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200010 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.10 - 10.0.0.10
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200011 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.11 - 10.0.0.11
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200012 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.12 - 10.0.0.12
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200013 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.13 - 10.0.0.13
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200014 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.14 - 10.0.0.14
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200015 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.15 - 10.0.0.15
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200016 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.16 - 10.0.0.16
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200017 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.17 - 10.0.0.17
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200018 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.18 - 10.0.0.18
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200019 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.19 - 10.0.0.19
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200020 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.20 - 10.0.0.20
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200021 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.21 - 10.0.0.21
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200022 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.22 - 10.0.0.22
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200023 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.23 - 10.0.0.23
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200024 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.24 - 10.0.0.24
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200025 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.25 - 10.0.0.25
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200026 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.26 - 10.0.0.26
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200027 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.27 - 10.0.0.27
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200028 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.28 - 10.0.0.28
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200029 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.29 - 10.0.0.29
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200030 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.30 - 10.0.0.30
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200031 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.31 - 10.0.0.31
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200032 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.32 - 10.0.0.32
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200033 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.33 - 10.0.0.33
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200034 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.34 - 10.0.0.34
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200035 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.35 - 10.0.0.35
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200036 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.36 - 10.0.0.36
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200037 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.37 - 10.0.0.37
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200038 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.38 - 10.0.0.38
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200039 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.39 - 10.0.0.39

 64b-2t2c-ethip4ipsec40tnlsw-ip4base- 
policy-aes256gcm-udir-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx01’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:90’, ‘ip_address’: ‘192.168.10.2’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nx02’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.0.1/24
exec ip route add 20.0.0.0/32 via 100.0.0.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.0.2/32 via 100.0.0.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.0.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.1.1/24
exec ip route add 20.0.0.1/32 via 100.0.1.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.1.2/32 via 100.0.1.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.1.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.2.1/24
exec ip route add 20.0.0.2/32 via 100.0.2.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.2.2/32 via 100.0.2.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.2.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.3.1/24
exec ip route add 20.0.0.3/32 via 100.0.3.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.3.2/32 via 100.0.3.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.3.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.4.1/24
exec ip route add 20.0.0.4/32 via 100.0.4.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.4.2/32 via 100.0.4.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.4.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.5.1/24
exec ip route add 20.0.0.5/32 via 100.0.5.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.5.2/32 via 100.0.5.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.5.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.6.1/24
exec ip route add 20.0.0.6/32 via 100.0.6.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.6.2/32 via 100.0.6.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.6.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.7.1/24
exec ip route add 20.0.0.7/32 via 100.0.7.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.7.2/32 via 100.0.7.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.7.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.8.1/24
exec ip route add 20.0.0.8/32 via 100.0.8.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.8.2/32 via 100.0.8.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.8.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.9.1/24
exec ip route add 20.0.0.9/32 via 100.0.9.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.9.2/32 via 100.0.9.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.9.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.10.1/24
exec ip route add 20.0.0.10/32 via 100.0.10.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.10.2/32 via 100.0.10.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.10.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.11.1/24
exec ip route add 20.0.0.11/32 via 100.0.11.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.11.2/32 via 100.0.11.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.11.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.12.1/24
exec ip route add 20.0.0.12/32 via 100.0.12.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.12.2/32 via 100.0.12.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.12.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.13.1/24
exec ip route add 20.0.0.13/32 via 100.0.13.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.13.2/32 via 100.0.13.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.13.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.14.1/24
exec ip route add 20.0.0.14/32 via 100.0.14.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.14.2/32 via 100.0.14.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.14.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.15.1/24
exec ip route add 20.0.0.15/32 via 100.0.15.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.15.2/32 via 100.0.15.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.15.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.16.1/24
exec ip route add 20.0.0.16/32 via 100.0.16.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.16.2/32 via 100.0.16.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.16.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.17.1/24
exec ip route add 20.0.0.17/32 via 100.0.17.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.17.2/32 via 100.0.17.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.17.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.18.1/24
exec ip route add 20.0.0.18/32 via 100.0.18.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.18.2/32 via 100.0.18.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.18.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.19.1/24
exec ip route add 20.0.0.19/32 via 100.0.19.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.19.2/32 via 100.0.19.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.19.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.20.1/24
exec ip route add 20.0.0.20/32 via 100.0.20.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.20.2/32 via 100.0.20.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.20.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.21.1/24
exec ip route add 20.0.0.21/32 via 100.0.21.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.21.2/32 via 100.0.21.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.21.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.22.1/24
exec ip route add 20.0.0.22/32 via 100.0.22.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.22.2/32 via 100.0.22.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.22.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.23.1/24
exec ip route add 20.0.0.23/32 via 100.0.23.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.23.2/32 via 100.0.23.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.23.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.24.1/24
exec ip route add 20.0.0.24/32 via 100.0.24.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.24.2/32 via 100.0.24.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.24.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.25.1/24
exec ip route add 20.0.0.25/32 via 100.0.25.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.25.2/32 via 100.0.25.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.25.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.26.1/24
exec ip route add 20.0.0.26/32 via 100.0.26.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.26.2/32 via 100.0.26.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.26.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.27.1/24
exec ip route add 20.0.0.27/32 via 100.0.27.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.27.2/32 via 100.0.27.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.27.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.28.1/24
exec ip route add 20.0.0.28/32 via 100.0.28.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.28.2/32 via 100.0.28.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.28.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.29.1/24
exec ip route add 20.0.0.29/32 via 100.0.29.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.29.2/32 via 100.0.29.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.29.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.30.1/24
exec ip route add 20.0.0.30/32 via 100.0.30.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.30.2/32 via 100.0.30.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.30.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.31.1/24
exec ip route add 20.0.0.31/32 via 100.0.31.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.31.2/32 via 100.0.31.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.31.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.32.1/24
exec ip route add 20.0.0.32/32 via 100.0.32.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.32.2/32 via 100.0.32.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.32.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.33.1/24
exec ip route add 20.0.0.33/32 via 100.0.33.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.33.2/32 via 100.0.33.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.33.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.34.1/24
exec ip route add 20.0.0.34/32 via 100.0.34.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.34.2/32 via 100.0.34.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.34.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.35.1/24
exec ip route add 20.0.0.35/32 via 100.0.35.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.35.2/32 via 100.0.35.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.35.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.36.1/24
exec ip route add 20.0.0.36/32 via 100.0.36.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.36.2/32 via 100.0.36.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.36.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.37.1/24
exec ip route add 20.0.0.37/32 via 100.0.37.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.37.2/32 via 100.0.37.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.37.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.38.1/24
exec ip route add 20.0.0.38/32 via 100.0.38.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.38.2/32 via 100.0.38.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.38.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.39.1/24
exec ip route add 20.0.0.39/32 via 100.0.39.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.39.2/32 via 100.0.39.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.39.2 3c:fd:fe:c3:e0:91
ipsec_spd_add_del(is_add=True,spd_id=1)
ipsec_interface_add_del_spd(is_add=True,sw_if_index=2,spd_id=1)
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 100, ‘is_outbound’: True, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 50, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’dxffxffxff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’dxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 100, ‘is_outbound’: False, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 50, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’dxffxffxff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’dxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
exec ipsec sa add 100000 esp spi 300000 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.0.1 tunnel dst 100.0.0.2
exec ipsec sa add 100001 esp spi 300001 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.1.1 tunnel dst 100.0.1.2
exec ipsec sa add 100002 esp spi 300002 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.2.1 tunnel dst 100.0.2.2
exec ipsec sa add 100003 esp spi 300003 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.3.1 tunnel dst 100.0.3.2
exec ipsec sa add 100004 esp spi 300004 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.4.1 tunnel dst 100.0.4.2
exec ipsec sa add 100005 esp spi 300005 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.5.1 tunnel dst 100.0.5.2
exec ipsec sa add 100006 esp spi 300006 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.6.1 tunnel dst 100.0.6.2
exec ipsec sa add 100007 esp spi 300007 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.7.1 tunnel dst 100.0.7.2
exec ipsec sa add 100008 esp spi 300008 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.8.1 tunnel dst 100.0.8.2
exec ipsec sa add 100009 esp spi 300009 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.9.1 tunnel dst 100.0.9.2
exec ipsec sa add 100010 esp spi 300010 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.10.1 tunnel dst 100.0.10.2
exec ipsec sa add 100011 esp spi 300011 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.11.1 tunnel dst 100.0.11.2
exec ipsec sa add 100012 esp spi 300012 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.12.1 tunnel dst 100.0.12.2
exec ipsec sa add 100013 esp spi 300013 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.13.1 tunnel dst 100.0.13.2
exec ipsec sa add 100014 esp spi 300014 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.14.1 tunnel dst 100.0.14.2
exec ipsec sa add 100015 esp spi 300015 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.15.1 tunnel dst 100.0.15.2
exec ipsec sa add 100016 esp spi 300016 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.16.1 tunnel dst 100.0.16.2
exec ipsec sa add 100017 esp spi 300017 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.17.1 tunnel dst 100.0.17.2
exec ipsec sa add 100018 esp spi 300018 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.18.1 tunnel dst 100.0.18.2
exec ipsec sa add 100019 esp spi 300019 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.19.1 tunnel dst 100.0.19.2
exec ipsec sa add 100020 esp spi 300020 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.20.1 tunnel dst 100.0.20.2
exec ipsec sa add 100021 esp spi 300021 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.21.1 tunnel dst 100.0.21.2
exec ipsec sa add 100022 esp spi 300022 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.22.1 tunnel dst 100.0.22.2
exec ipsec sa add 100023 esp spi 300023 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.23.1 tunnel dst 100.0.23.2
exec ipsec sa add 100024 esp spi 300024 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.24.1 tunnel dst 100.0.24.2
exec ipsec sa add 100025 esp spi 300025 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.25.1 tunnel dst 100.0.25.2
exec ipsec sa add 100026 esp spi 300026 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.26.1 tunnel dst 100.0.26.2
exec ipsec sa add 100027 esp spi 300027 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.27.1 tunnel dst 100.0.27.2
exec ipsec sa add 100028 esp spi 300028 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.28.1 tunnel dst 100.0.28.2
exec ipsec sa add 100029 esp spi 300029 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.29.1 tunnel dst 100.0.29.2
exec ipsec sa add 100030 esp spi 300030 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.30.1 tunnel dst 100.0.30.2
exec ipsec sa add 100031 esp spi 300031 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.31.1 tunnel dst 100.0.31.2
exec ipsec sa add 100032 esp spi 300032 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.32.1 tunnel dst 100.0.32.2
exec ipsec sa add 100033 esp spi 300033 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.33.1 tunnel dst 100.0.33.2
exec ipsec sa add 100034 esp spi 300034 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.34.1 tunnel dst 100.0.34.2
exec ipsec sa add 100035 esp spi 300035 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.35.1 tunnel dst 100.0.35.2
exec ipsec sa add 100036 esp spi 300036 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.36.1 tunnel dst 100.0.36.2
exec ipsec sa add 100037 esp spi 300037 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.37.1 tunnel dst 100.0.37.2
exec ipsec sa add 100038 esp spi 300038 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.38.1 tunnel dst 100.0.38.2
exec ipsec sa add 100039 esp spi 300039 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.39.1 tunnel dst 100.0.39.2
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100000 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.0 - 20.0.0.0
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100001 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.1 - 20.0.0.1
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100002 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.2 - 20.0.0.2
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100003 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.3 - 20.0.0.3
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100004 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.4 - 20.0.0.4
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100005 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.5 - 20.0.0.5
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100006 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.6 - 20.0.0.6
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100007 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.7 - 20.0.0.7
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100008 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.8 - 20.0.0.8
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100009 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.9 - 20.0.0.9
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100010 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.10 - 20.0.0.10
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100011 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.11 - 20.0.0.11
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100012 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.12 - 20.0.0.12
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100013 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.13 - 20.0.0.13
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100014 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.14 - 20.0.0.14
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100015 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.15 - 20.0.0.15
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100016 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.16 - 20.0.0.16
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100017 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.17 - 20.0.0.17
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100018 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.18 - 20.0.0.18
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100019 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.19 - 20.0.0.19
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100020 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.20 - 20.0.0.20
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100021 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.21 - 20.0.0.21
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100022 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.22 - 20.0.0.22
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100023 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.23 - 20.0.0.23
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100024 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.24 - 20.0.0.24
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100025 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.25 - 20.0.0.25
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100026 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.26 - 20.0.0.26
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100027 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.27 - 20.0.0.27
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100028 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.28 - 20.0.0.28
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100029 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.29 - 20.0.0.29
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100030 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.30 - 20.0.0.30
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100031 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.31 - 20.0.0.31
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100032 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.32 - 20.0.0.32
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100033 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.33 - 20.0.0.33
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100034 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.34 - 20.0.0.34
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100035 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.35 - 20.0.0.35
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100036 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.36 - 20.0.0.36
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100037 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.37 - 20.0.0.37
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100038 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.38 - 20.0.0.38
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100039 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.39 - 20.0.0.39
exec ipsec sa add 200000 esp spi 400000 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.0.2 tunnel dst 100.0.0.1
exec ipsec sa add 200001 esp spi 400001 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.1.2 tunnel dst 100.0.1.1
exec ipsec sa add 200002 esp spi 400002 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.2.2 tunnel dst 100.0.2.1
exec ipsec sa add 200003 esp spi 400003 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.3.2 tunnel dst 100.0.3.1
exec ipsec sa add 200004 esp spi 400004 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.4.2 tunnel dst 100.0.4.1
exec ipsec sa add 200005 esp spi 400005 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.5.2 tunnel dst 100.0.5.1
exec ipsec sa add 200006 esp spi 400006 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.6.2 tunnel dst 100.0.6.1
exec ipsec sa add 200007 esp spi 400007 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.7.2 tunnel dst 100.0.7.1
exec ipsec sa add 200008 esp spi 400008 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.8.2 tunnel dst 100.0.8.1
exec ipsec sa add 200009 esp spi 400009 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.9.2 tunnel dst 100.0.9.1
exec ipsec sa add 200010 esp spi 400010 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.10.2 tunnel dst 100.0.10.1
exec ipsec sa add 200011 esp spi 400011 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.11.2 tunnel dst 100.0.11.1
exec ipsec sa add 200012 esp spi 400012 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.12.2 tunnel dst 100.0.12.1
exec ipsec sa add 200013 esp spi 400013 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.13.2 tunnel dst 100.0.13.1
exec ipsec sa add 200014 esp spi 400014 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.14.2 tunnel dst 100.0.14.1
exec ipsec sa add 200015 esp spi 400015 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.15.2 tunnel dst 100.0.15.1
exec ipsec sa add 200016 esp spi 400016 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.16.2 tunnel dst 100.0.16.1
exec ipsec sa add 200017 esp spi 400017 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.17.2 tunnel dst 100.0.17.1
exec ipsec sa add 200018 esp spi 400018 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.18.2 tunnel dst 100.0.18.1
exec ipsec sa add 200019 esp spi 400019 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.19.2 tunnel dst 100.0.19.1
exec ipsec sa add 200020 esp spi 400020 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.20.2 tunnel dst 100.0.20.1
exec ipsec sa add 200021 esp spi 400021 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.21.2 tunnel dst 100.0.21.1
exec ipsec sa add 200022 esp spi 400022 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.22.2 tunnel dst 100.0.22.1
exec ipsec sa add 200023 esp spi 400023 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.23.2 tunnel dst 100.0.23.1
exec ipsec sa add 200024 esp spi 400024 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.24.2 tunnel dst 100.0.24.1
exec ipsec sa add 200025 esp spi 400025 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.25.2 tunnel dst 100.0.25.1
exec ipsec sa add 200026 esp spi 400026 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.26.2 tunnel dst 100.0.26.1
exec ipsec sa add 200027 esp spi 400027 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.27.2 tunnel dst 100.0.27.1
exec ipsec sa add 200028 esp spi 400028 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.28.2 tunnel dst 100.0.28.1
exec ipsec sa add 200029 esp spi 400029 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.29.2 tunnel dst 100.0.29.1
exec ipsec sa add 200030 esp spi 400030 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.30.2 tunnel dst 100.0.30.1
exec ipsec sa add 200031 esp spi 400031 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.31.2 tunnel dst 100.0.31.1
exec ipsec sa add 200032 esp spi 400032 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.32.2 tunnel dst 100.0.32.1
exec ipsec sa add 200033 esp spi 400033 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.33.2 tunnel dst 100.0.33.1
exec ipsec sa add 200034 esp spi 400034 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.34.2 tunnel dst 100.0.34.1
exec ipsec sa add 200035 esp spi 400035 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.35.2 tunnel dst 100.0.35.1
exec ipsec sa add 200036 esp spi 400036 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.36.2 tunnel dst 100.0.36.1
exec ipsec sa add 200037 esp spi 400037 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.37.2 tunnel dst 100.0.37.1
exec ipsec sa add 200038 esp spi 400038 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.38.2 tunnel dst 100.0.38.1
exec ipsec sa add 200039 esp spi 400039 crypto-alg aes-gcm-256 crypto-key 4b79426c5348467845767777506c495551426f706d705055636b627850535170 tunnel src 100.0.39.2 tunnel dst 100.0.39.1
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200000 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.0 - 10.0.0.0
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200001 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.1 - 10.0.0.1
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200002 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.2 - 10.0.0.2
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200003 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.3 - 10.0.0.3
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200004 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.4 - 10.0.0.4
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200005 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.5 - 10.0.0.5
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200006 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.6 - 10.0.0.6
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200007 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.7 - 10.0.0.7
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200008 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.8 - 10.0.0.8
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200009 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.9 - 10.0.0.9
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200010 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.10 - 10.0.0.10
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200011 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.11 - 10.0.0.11
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200012 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.12 - 10.0.0.12
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200013 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.13 - 10.0.0.13
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200014 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.14 - 10.0.0.14
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200015 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.15 - 10.0.0.15
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200016 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.16 - 10.0.0.16
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200017 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.17 - 10.0.0.17
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200018 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.18 - 10.0.0.18
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200019 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.19 - 10.0.0.19
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200020 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.20 - 10.0.0.20
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200021 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.21 - 10.0.0.21
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200022 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.22 - 10.0.0.22
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200023 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.23 - 10.0.0.23
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200024 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.24 - 10.0.0.24
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200025 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.25 - 10.0.0.25
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200026 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.26 - 10.0.0.26
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200027 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.27 - 10.0.0.27
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200028 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.28 - 10.0.0.28
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200029 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.29 - 10.0.0.29
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200030 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.30 - 10.0.0.30
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200031 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.31 - 10.0.0.31
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200032 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.32 - 10.0.0.32
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200033 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.33 - 10.0.0.33
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200034 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.34 - 10.0.0.34
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200035 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.35 - 10.0.0.35
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200036 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.36 - 10.0.0.36
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200037 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.37 - 10.0.0.37
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200038 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.38 - 10.0.0.38
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200039 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.39 - 10.0.0.39

 64b-4t4c-ethip4ipsec40tnlsw-ip4base- 
policy-aes256gcm-udir-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx01’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:90’, ‘ip_address’: ‘192.168.10.2’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nx02’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.0.1/24
exec ip route add 20.0.0.0/32 via 100.0.0.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.0.2/32 via 100.0.0.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.0.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.1.1/24
exec ip route add 20.0.0.1/32 via 100.0.1.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.1.2/32 via 100.0.1.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.1.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.2.1/24
exec ip route add 20.0.0.2/32 via 100.0.2.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.2.2/32 via 100.0.2.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.2.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.3.1/24
exec ip route add 20.0.0.3/32 via 100.0.3.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.3.2/32 via 100.0.3.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.3.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.4.1/24
exec ip route add 20.0.0.4/32 via 100.0.4.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.4.2/32 via 100.0.4.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.4.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.5.1/24
exec ip route add 20.0.0.5/32 via 100.0.5.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.5.2/32 via 100.0.5.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.5.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.6.1/24
exec ip route add 20.0.0.6/32 via 100.0.6.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.6.2/32 via 100.0.6.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.6.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.7.1/24
exec ip route add 20.0.0.7/32 via 100.0.7.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.7.2/32 via 100.0.7.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.7.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.8.1/24
exec ip route add 20.0.0.8/32 via 100.0.8.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.8.2/32 via 100.0.8.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.8.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.9.1/24
exec ip route add 20.0.0.9/32 via 100.0.9.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.9.2/32 via 100.0.9.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.9.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.10.1/24
exec ip route add 20.0.0.10/32 via 100.0.10.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.10.2/32 via 100.0.10.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.10.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.11.1/24
exec ip route add 20.0.0.11/32 via 100.0.11.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.11.2/32 via 100.0.11.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.11.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.12.1/24
exec ip route add 20.0.0.12/32 via 100.0.12.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.12.2/32 via 100.0.12.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.12.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.13.1/24
exec ip route add 20.0.0.13/32 via 100.0.13.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.13.2/32 via 100.0.13.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.13.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.14.1/24
exec ip route add 20.0.0.14/32 via 100.0.14.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.14.2/32 via 100.0.14.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.14.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.15.1/24
exec ip route add 20.0.0.15/32 via 100.0.15.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.15.2/32 via 100.0.15.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.15.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.16.1/24
exec ip route add 20.0.0.16/32 via 100.0.16.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.16.2/32 via 100.0.16.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.16.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.17.1/24
exec ip route add 20.0.0.17/32 via 100.0.17.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.17.2/32 via 100.0.17.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.17.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.18.1/24
exec ip route add 20.0.0.18/32 via 100.0.18.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.18.2/32 via 100.0.18.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.18.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.19.1/24
exec ip route add 20.0.0.19/32 via 100.0.19.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.19.2/32 via 100.0.19.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.19.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.20.1/24
exec ip route add 20.0.0.20/32 via 100.0.20.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.20.2/32 via 100.0.20.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.20.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.21.1/24
exec ip route add 20.0.0.21/32 via 100.0.21.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.21.2/32 via 100.0.21.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.21.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.22.1/24
exec ip route add 20.0.0.22/32 via 100.0.22.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.22.2/32 via 100.0.22.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.22.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.23.1/24
exec ip route add 20.0.0.23/32 via 100.0.23.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.23.2/32 via 100.0.23.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.23.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.24.1/24
exec ip route add 20.0.0.24/32 via 100.0.24.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.24.2/32 via 100.0.24.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.24.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.25.1/24
exec ip route add 20.0.0.25/32 via 100.0.25.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.25.2/32 via 100.0.25.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.25.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.26.1/24
exec ip route add 20.0.0.26/32 via 100.0.26.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.26.2/32 via 100.0.26.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.26.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.27.1/24
exec ip route add 20.0.0.27/32 via 100.0.27.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.27.2/32 via 100.0.27.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.27.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.28.1/24
exec ip route add 20.0.0.28/32 via 100.0.28.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.28.2/32 via 100.0.28.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.28.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.29.1/24
exec ip route add 20.0.0.29/32 via 100.0.29.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.29.2/32 via 100.0.29.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.29.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.30.1/24
exec ip route add 20.0.0.30/32 via 100.0.30.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.30.2/32 via 100.0.30.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.30.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.31.1/24
exec ip route add 20.0.0.31/32 via 100.0.31.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.31.2/32 via 100.0.31.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.31.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.32.1/24
exec ip route add 20.0.0.32/32 via 100.0.32.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.32.2/32 via 100.0.32.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.32.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.33.1/24
exec ip route add 20.0.0.33/32 via 100.0.33.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.33.2/32 via 100.0.33.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.33.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.34.1/24
exec ip route add 20.0.0.34/32 via 100.0.34.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.34.2/32 via 100.0.34.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.34.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.35.1/24
exec ip route add 20.0.0.35/32 via 100.0.35.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.35.2/32 via 100.0.35.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.35.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.36.1/24
exec ip route add 20.0.0.36/32 via 100.0.36.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.36.2/32 via 100.0.36.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.36.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.37.1/24
exec ip route add 20.0.0.37/32 via 100.0.37.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.37.2/32 via 100.0.37.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.37.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.38.1/24
exec ip route add 20.0.0.38/32 via 100.0.38.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.38.2/32 via 100.0.38.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.38.2 3c:fd:fe:c3:e0:91
exec set interface ip address FortyGigabitEthernet91/0/1 100.0.39.1/24
exec ip route add 20.0.0.39/32 via 100.0.39.2 FortyGigabitEthernet91/0/1
exec ip route add 100.0.39.2/32 via 100.0.39.2 FortyGigabitEthernet91/0/1
exec set ip neighbor FortyGigabitEthernet91/0/1 100.0.39.2 3c:fd:fe:c3:e0:91
ipsec_spd_add_del(is_add=True,spd_id=1)
ipsec_interface_add_del_spd(is_add=True,sw_if_index=2,spd_id=1)
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 100, ‘is_outbound’: True, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 50, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’dxffxffxff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’dxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 100, ‘is_outbound’: False, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 50, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’dxffxffxff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’dxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
exec ipsec sa add 100000 esp spi 300000 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.0.1 tunnel dst 100.0.0.2
exec ipsec sa add 100001 esp spi 300001 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.1.1 tunnel dst 100.0.1.2
exec ipsec sa add 100002 esp spi 300002 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.2.1 tunnel dst 100.0.2.2
exec ipsec sa add 100003 esp spi 300003 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.3.1 tunnel dst 100.0.3.2
exec ipsec sa add 100004 esp spi 300004 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.4.1 tunnel dst 100.0.4.2
exec ipsec sa add 100005 esp spi 300005 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.5.1 tunnel dst 100.0.5.2
exec ipsec sa add 100006 esp spi 300006 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.6.1 tunnel dst 100.0.6.2
exec ipsec sa add 100007 esp spi 300007 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.7.1 tunnel dst 100.0.7.2
exec ipsec sa add 100008 esp spi 300008 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.8.1 tunnel dst 100.0.8.2
exec ipsec sa add 100009 esp spi 300009 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.9.1 tunnel dst 100.0.9.2
exec ipsec sa add 100010 esp spi 300010 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.10.1 tunnel dst 100.0.10.2
exec ipsec sa add 100011 esp spi 300011 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.11.1 tunnel dst 100.0.11.2
exec ipsec sa add 100012 esp spi 300012 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.12.1 tunnel dst 100.0.12.2
exec ipsec sa add 100013 esp spi 300013 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.13.1 tunnel dst 100.0.13.2
exec ipsec sa add 100014 esp spi 300014 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.14.1 tunnel dst 100.0.14.2
exec ipsec sa add 100015 esp spi 300015 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.15.1 tunnel dst 100.0.15.2
exec ipsec sa add 100016 esp spi 300016 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.16.1 tunnel dst 100.0.16.2
exec ipsec sa add 100017 esp spi 300017 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.17.1 tunnel dst 100.0.17.2
exec ipsec sa add 100018 esp spi 300018 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.18.1 tunnel dst 100.0.18.2
exec ipsec sa add 100019 esp spi 300019 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.19.1 tunnel dst 100.0.19.2
exec ipsec sa add 100020 esp spi 300020 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.20.1 tunnel dst 100.0.20.2
exec ipsec sa add 100021 esp spi 300021 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.21.1 tunnel dst 100.0.21.2
exec ipsec sa add 100022 esp spi 300022 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.22.1 tunnel dst 100.0.22.2
exec ipsec sa add 100023 esp spi 300023 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.23.1 tunnel dst 100.0.23.2
exec ipsec sa add 100024 esp spi 300024 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.24.1 tunnel dst 100.0.24.2
exec ipsec sa add 100025 esp spi 300025 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.25.1 tunnel dst 100.0.25.2
exec ipsec sa add 100026 esp spi 300026 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.26.1 tunnel dst 100.0.26.2
exec ipsec sa add 100027 esp spi 300027 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.27.1 tunnel dst 100.0.27.2
exec ipsec sa add 100028 esp spi 300028 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.28.1 tunnel dst 100.0.28.2
exec ipsec sa add 100029 esp spi 300029 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.29.1 tunnel dst 100.0.29.2
exec ipsec sa add 100030 esp spi 300030 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.30.1 tunnel dst 100.0.30.2
exec ipsec sa add 100031 esp spi 300031 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.31.1 tunnel dst 100.0.31.2
exec ipsec sa add 100032 esp spi 300032 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.32.1 tunnel dst 100.0.32.2
exec ipsec sa add 100033 esp spi 300033 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.33.1 tunnel dst 100.0.33.2
exec ipsec sa add 100034 esp spi 300034 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.34.1 tunnel dst 100.0.34.2
exec ipsec sa add 100035 esp spi 300035 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.35.1 tunnel dst 100.0.35.2
exec ipsec sa add 100036 esp spi 300036 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.36.1 tunnel dst 100.0.36.2
exec ipsec sa add 100037 esp spi 300037 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.37.1 tunnel dst 100.0.37.2
exec ipsec sa add 100038 esp spi 300038 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.38.1 tunnel dst 100.0.38.2
exec ipsec sa add 100039 esp spi 300039 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.39.1 tunnel dst 100.0.39.2
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100000 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.0 - 20.0.0.0
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100001 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.1 - 20.0.0.1
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100002 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.2 - 20.0.0.2
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100003 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.3 - 20.0.0.3
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100004 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.4 - 20.0.0.4
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100005 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.5 - 20.0.0.5
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100006 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.6 - 20.0.0.6
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100007 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.7 - 20.0.0.7
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100008 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.8 - 20.0.0.8
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100009 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.9 - 20.0.0.9
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100010 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.10 - 20.0.0.10
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100011 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.11 - 20.0.0.11
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100012 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.12 - 20.0.0.12
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100013 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.13 - 20.0.0.13
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100014 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.14 - 20.0.0.14
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100015 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.15 - 20.0.0.15
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100016 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.16 - 20.0.0.16
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100017 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.17 - 20.0.0.17
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100018 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.18 - 20.0.0.18
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100019 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.19 - 20.0.0.19
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100020 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.20 - 20.0.0.20
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100021 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.21 - 20.0.0.21
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100022 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.22 - 20.0.0.22
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100023 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.23 - 20.0.0.23
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100024 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.24 - 20.0.0.24
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100025 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.25 - 20.0.0.25
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100026 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.26 - 20.0.0.26
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100027 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.27 - 20.0.0.27
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100028 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.28 - 20.0.0.28
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100029 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.29 - 20.0.0.29
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100030 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.30 - 20.0.0.30
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100031 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.31 - 20.0.0.31
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100032 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.32 - 20.0.0.32
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100033 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.33 - 20.0.0.33
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100034 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.34 - 20.0.0.34
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100035 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.35 - 20.0.0.35
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100036 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.36 - 20.0.0.36
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100037 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.37 - 20.0.0.37
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100038 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.38 - 20.0.0.38
exec ipsec policy add spd 1 priority 10 outbound action protect sa 100039 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.39 - 20.0.0.39
exec ipsec sa add 200000 esp spi 400000 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.0.2 tunnel dst 100.0.0.1
exec ipsec sa add 200001 esp spi 400001 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.1.2 tunnel dst 100.0.1.1
exec ipsec sa add 200002 esp spi 400002 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.2.2 tunnel dst 100.0.2.1
exec ipsec sa add 200003 esp spi 400003 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.3.2 tunnel dst 100.0.3.1
exec ipsec sa add 200004 esp spi 400004 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.4.2 tunnel dst 100.0.4.1
exec ipsec sa add 200005 esp spi 400005 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.5.2 tunnel dst 100.0.5.1
exec ipsec sa add 200006 esp spi 400006 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.6.2 tunnel dst 100.0.6.1
exec ipsec sa add 200007 esp spi 400007 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.7.2 tunnel dst 100.0.7.1
exec ipsec sa add 200008 esp spi 400008 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.8.2 tunnel dst 100.0.8.1
exec ipsec sa add 200009 esp spi 400009 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.9.2 tunnel dst 100.0.9.1
exec ipsec sa add 200010 esp spi 400010 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.10.2 tunnel dst 100.0.10.1
exec ipsec sa add 200011 esp spi 400011 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.11.2 tunnel dst 100.0.11.1
exec ipsec sa add 200012 esp spi 400012 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.12.2 tunnel dst 100.0.12.1
exec ipsec sa add 200013 esp spi 400013 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.13.2 tunnel dst 100.0.13.1
exec ipsec sa add 200014 esp spi 400014 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.14.2 tunnel dst 100.0.14.1
exec ipsec sa add 200015 esp spi 400015 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.15.2 tunnel dst 100.0.15.1
exec ipsec sa add 200016 esp spi 400016 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.16.2 tunnel dst 100.0.16.1
exec ipsec sa add 200017 esp spi 400017 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.17.2 tunnel dst 100.0.17.1
exec ipsec sa add 200018 esp spi 400018 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.18.2 tunnel dst 100.0.18.1
exec ipsec sa add 200019 esp spi 400019 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.19.2 tunnel dst 100.0.19.1
exec ipsec sa add 200020 esp spi 400020 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.20.2 tunnel dst 100.0.20.1
exec ipsec sa add 200021 esp spi 400021 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.21.2 tunnel dst 100.0.21.1
exec ipsec sa add 200022 esp spi 400022 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.22.2 tunnel dst 100.0.22.1
exec ipsec sa add 200023 esp spi 400023 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.23.2 tunnel dst 100.0.23.1
exec ipsec sa add 200024 esp spi 400024 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.24.2 tunnel dst 100.0.24.1
exec ipsec sa add 200025 esp spi 400025 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.25.2 tunnel dst 100.0.25.1
exec ipsec sa add 200026 esp spi 400026 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.26.2 tunnel dst 100.0.26.1
exec ipsec sa add 200027 esp spi 400027 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.27.2 tunnel dst 100.0.27.1
exec ipsec sa add 200028 esp spi 400028 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.28.2 tunnel dst 100.0.28.1
exec ipsec sa add 200029 esp spi 400029 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.29.2 tunnel dst 100.0.29.1
exec ipsec sa add 200030 esp spi 400030 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.30.2 tunnel dst 100.0.30.1
exec ipsec sa add 200031 esp spi 400031 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.31.2 tunnel dst 100.0.31.1
exec ipsec sa add 200032 esp spi 400032 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.32.2 tunnel dst 100.0.32.1
exec ipsec sa add 200033 esp spi 400033 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.33.2 tunnel dst 100.0.33.1
exec ipsec sa add 200034 esp spi 400034 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.34.2 tunnel dst 100.0.34.1
exec ipsec sa add 200035 esp spi 400035 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.35.2 tunnel dst 100.0.35.1
exec ipsec sa add 200036 esp spi 400036 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.36.2 tunnel dst 100.0.36.1
exec ipsec sa add 200037 esp spi 400037 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.37.2 tunnel dst 100.0.37.1
exec ipsec sa add 200038 esp spi 400038 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.38.2 tunnel dst 100.0.38.1
exec ipsec sa add 200039 esp spi 400039 crypto-alg aes-gcm-256 crypto-key 485977644f6e7449697273784c505a74464a77794f496e626a59794d534c4f57 tunnel src 100.0.39.2 tunnel dst 100.0.39.1
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200000 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.0 - 10.0.0.0
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200001 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.1 - 10.0.0.1
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200002 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.2 - 10.0.0.2
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200003 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.3 - 10.0.0.3
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200004 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.4 - 10.0.0.4
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200005 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.5 - 10.0.0.5
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200006 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.6 - 10.0.0.6
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200007 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.7 - 10.0.0.7
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200008 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.8 - 10.0.0.8
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200009 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.9 - 10.0.0.9
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200010 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.10 - 10.0.0.10
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200011 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.11 - 10.0.0.11
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200012 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.12 - 10.0.0.12
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200013 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.13 - 10.0.0.13
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200014 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.14 - 10.0.0.14
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200015 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.15 - 10.0.0.15
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200016 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.16 - 10.0.0.16
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200017 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.17 - 10.0.0.17
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200018 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.18 - 10.0.0.18
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200019 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.19 - 10.0.0.19
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200020 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.20 - 10.0.0.20
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200021 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.21 - 10.0.0.21
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200022 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.22 - 10.0.0.22
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200023 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.23 - 10.0.0.23
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200024 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.24 - 10.0.0.24
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200025 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.25 - 10.0.0.25
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200026 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.26 - 10.0.0.26
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200027 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.27 - 10.0.0.27
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200028 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.28 - 10.0.0.28
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200029 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.29 - 10.0.0.29
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200030 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.30 - 10.0.0.30
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200031 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.31 - 10.0.0.31
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200032 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.32 - 10.0.0.32
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200033 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.33 - 10.0.0.33
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200034 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.34 - 10.0.0.34
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200035 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.35 - 10.0.0.35
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200036 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.36 - 10.0.0.36
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200037 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.37 - 10.0.0.37
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200038 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.38 - 10.0.0.38
exec ipsec policy add spd 1 priority 10 inbound action protect sa 200039 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.39 - 10.0.0.39

2n1l-40ge2p1xl710-ethip4ipsec4tnlsw-ip4base-int-aes128cbc-hmac512sha-udir-mrr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-TG 2-node circular topology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUT1, Eth-IPv4-IPSec on DUT1-TG.

  • [Cfg] DUT configuration: DUT1 is configured with multiple IPsec tunnels between it and TG. DUT gets IPv4 traffic from TG, encrypts it and sends back to TG.

  • [Ver] TG vefication: In MaxReceivedRate tests TG sends traffic at line rate and reports total received packets over trial period. Test packets are generated by TG on links to DUTs. TG traffic profile contains one L3 flow-groups (number of flows per flow-group equals to number of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG node interfaces. Incrementing of IP.dst (IPv4 destination address) field is applied to the stream.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 1518b-1t1c-ethip4ipsec4tnlsw-ip4base- 
int-aes128cbc-hmac512sha-udir-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx01’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:90’, ‘ip_address’: ‘192.168.10.2’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nx02’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x01’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 2, ‘flags’: 1, ‘mac_address’: ‘3c:fd:fe:c3:e0:91’, ‘ip_address’: ‘200.0.0.2’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x02’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x02’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x02’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x02’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’aDjfrJHMGKCMGfyp’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’UgePYyPIQqNpcJmHsbOHIKXlJNZyrhaOVznxZDixnKQMqSRiYMsTUMBfkcqAxVSP’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’aDjfrJHMGKCMGfyp’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’UgePYyPIQqNpcJmHsbOHIKXlJNZyrhaOVznxZDixnKQMqSRiYMsTUMBfkcqAxVSP’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’AovXEMaowLNoevcS’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’CgveEKdGbSWYMdWABcgWXuqMHxImpbqVCjyREboGXbHeWDKkoPfvwtqwSXzfvxoV’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’AovXEMaowLNoevcS’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’CgveEKdGbSWYMdWABcgWXuqMHxImpbqVCjyREboGXbHeWDKkoPfvwtqwSXzfvxoV’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’SWhQiOOFWebHUleA’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’WPfukuEiAxqMBmTuQbStCmDJeWBtaCRXLczkRoTolQuoTpQpeTXpBWYjxvQfTnib’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’SWhQiOOFWebHUleA’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’WPfukuEiAxqMBmTuQbStCmDJeWBtaCRXLczkRoTolQuoTpQpeTXpBWYjxvQfTnib’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’ohamiAKoxJxipKAb’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’dTFIXHhEMpISBdOVKsYtKiLPFRSeByWNYymbegYCsbBPylrazxllolOMPufRiFJh’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’ohamiAKoxJxipKAb’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’dTFIXHhEMpISBdOVKsYtKiLPFRSeByWNYymbegYCsbBPylrazxllolOMPufRiFJh’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 1, ‘n_sa_in’: 1, ‘sa_in’: [100001]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 2, ‘n_sa_in’: 1, ‘sa_in’: [100002]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 7, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 3, ‘n_sa_in’: 1, ‘sa_in’: [100003]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=6)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=7)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
sw_interface_set_flags(sw_if_index=7,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 7, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-2t2c-ethip4ipsec4tnlsw-ip4base- 
int-aes128cbc-hmac512sha-udir-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx01’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:90’, ‘ip_address’: ‘192.168.10.2’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nx02’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x01’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 2, ‘flags’: 1, ‘mac_address’: ‘3c:fd:fe:c3:e0:91’, ‘ip_address’: ‘200.0.0.2’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x02’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x02’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x02’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x02’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’VIwtbnGJjxTINNIp’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’BgRTikrvUnZGxAZXUAegOemwOZZuIjBxsksJbwrDAGjiRqEOZZgvFEGpYoFuITrJ’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’VIwtbnGJjxTINNIp’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’BgRTikrvUnZGxAZXUAegOemwOZZuIjBxsksJbwrDAGjiRqEOZZgvFEGpYoFuITrJ’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’IdKmycKNAbqaxaho’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’chWJssugBhozMEApMatFgAiKwHpHXUrrmvVXhnRxBjywccTYRDoswquUyPtTcjCf’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’IdKmycKNAbqaxaho’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’chWJssugBhozMEApMatFgAiKwHpHXUrrmvVXhnRxBjywccTYRDoswquUyPtTcjCf’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’TTFhYUYkdAvwttbz’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’fwLwovossLzPcyznjJcqcUWdqCluPGpxEqMtRUIETscREbULgmYaKNPjIskaisFv’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’TTFhYUYkdAvwttbz’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’fwLwovossLzPcyznjJcqcUWdqCluPGpxEqMtRUIETscREbULgmYaKNPjIskaisFv’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’txzBwGzhMdGyOJUU’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’uMcRgvuCJvwEYGcsdwXbiBWppQeFqOGUjPqTRRvtkxYDnjtBuwPOfxfAIzcWUDNb’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’txzBwGzhMdGyOJUU’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’uMcRgvuCJvwEYGcsdwXbiBWppQeFqOGUjPqTRRvtkxYDnjtBuwPOfxfAIzcWUDNb’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 1, ‘n_sa_in’: 1, ‘sa_in’: [100001]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 2, ‘n_sa_in’: 1, ‘sa_in’: [100002]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 7, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 3, ‘n_sa_in’: 1, ‘sa_in’: [100003]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=6)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=7)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
sw_interface_set_flags(sw_if_index=7,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 7, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-4t4c-ethip4ipsec4tnlsw-ip4base- 
int-aes128cbc-hmac512sha-udir-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx01’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:90’, ‘ip_address’: ‘192.168.10.2’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nx02’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x01’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 2, ‘flags’: 1, ‘mac_address’: ‘3c:fd:fe:c3:e0:91’, ‘ip_address’: ‘200.0.0.2’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x02’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x02’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x02’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x02’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’ptrbGAuAdNQOZJlq’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’wRjfGIaAmFtNakUlhjjzRZohuFWIDBEYGZGIrecfissaCEaMMdaAWJBqoVohPlKA’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’ptrbGAuAdNQOZJlq’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’wRjfGIaAmFtNakUlhjjzRZohuFWIDBEYGZGIrecfissaCEaMMdaAWJBqoVohPlKA’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’LLxkEADpuWMqildG’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’NbAspXPhOUkyXnfuwSrWLJcKxpsMEYpXIPshuQmXSaLolgiQXkGpaYSrzBrEKGzp’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’LLxkEADpuWMqildG’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’NbAspXPhOUkyXnfuwSrWLJcKxpsMEYpXIPshuQmXSaLolgiQXkGpaYSrzBrEKGzp’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’xVsWvwekXATevTeu’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’amoqTqZzjAeOILPvzBEQChTPHDaRQFplRsKCiTAGuNpyCZSinHngscPIqFRzxQfT’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’xVsWvwekXATevTeu’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’amoqTqZzjAeOILPvzBEQChTPHDaRQFplRsKCiTAGuNpyCZSinHngscPIqFRzxQfT’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’fZWpbrbUpnCSrcnu’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’HXRgAFwZHiBByldMBuozmTWWHfLospSJigeHJRCPACeJWlYoUkVEiFpCWfyiMszz’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’fZWpbrbUpnCSrcnu’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’HXRgAFwZHiBByldMBuozmTWWHfLospSJigeHJRCPACeJWlYoUkVEiFpCWfyiMszz’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 1, ‘n_sa_in’: 1, ‘sa_in’: [100001]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 2, ‘n_sa_in’: 1, ‘sa_in’: [100002]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 7, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 3, ‘n_sa_in’: 1, ‘sa_in’: [100003]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=6)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=7)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
sw_interface_set_flags(sw_if_index=7,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 7, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-1t1c-ethip4ipsec4tnlsw-ip4base- 
int-aes128cbc-hmac512sha-udir-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx01’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:90’, ‘ip_address’: ‘192.168.10.2’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nx02’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x01’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 2, ‘flags’: 1, ‘mac_address’: ‘3c:fd:fe:c3:e0:91’, ‘ip_address’: ‘200.0.0.2’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x02’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x02’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x02’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x02’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’LKKJahvDPauWJfJG’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’PfvfKXQHNvPTJRIdqEVmJIPCYPGRvjkwnjeNszBOaudWFUtLngsowtiVWuuTnhZS’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’LKKJahvDPauWJfJG’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’PfvfKXQHNvPTJRIdqEVmJIPCYPGRvjkwnjeNszBOaudWFUtLngsowtiVWuuTnhZS’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’OeCjwvUeVPTKfkut’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’edfBiJGfJVuOFQZYubeOekqeMHWeGzKSKVqGGCiWNJDJXgPKoydDqTdCFnsWVbYC’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’OeCjwvUeVPTKfkut’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’edfBiJGfJVuOFQZYubeOekqeMHWeGzKSKVqGGCiWNJDJXgPKoydDqTdCFnsWVbYC’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’IrLJqZdoBtGOfhuj’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’mhcnbfnpVKZqknQFNrRWZyhjKCWNgVGRyCfbXSXJCJuDDNFIzewYpuElTFtgquCs’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’IrLJqZdoBtGOfhuj’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’mhcnbfnpVKZqknQFNrRWZyhjKCWNgVGRyCfbXSXJCJuDDNFIzewYpuElTFtgquCs’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’NPUkqXUYqTiDgiVp’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’vVKKnQqoCPUaAmlmvApeyqNCScZMeNXktLzMrtgDWNyFnMQbEqoPGfhvYlWCXOPQ’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’NPUkqXUYqTiDgiVp’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’vVKKnQqoCPUaAmlmvApeyqNCScZMeNXktLzMrtgDWNyFnMQbEqoPGfhvYlWCXOPQ’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 1, ‘n_sa_in’: 1, ‘sa_in’: [100001]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 2, ‘n_sa_in’: 1, ‘sa_in’: [100002]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 7, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 3, ‘n_sa_in’: 1, ‘sa_in’: [100003]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=6)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=7)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
sw_interface_set_flags(sw_if_index=7,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 7, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-2t2c-ethip4ipsec4tnlsw-ip4base- 
int-aes128cbc-hmac512sha-udir-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx01’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:90’, ‘ip_address’: ‘192.168.10.2’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nx02’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x01’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 2, ‘flags’: 1, ‘mac_address’: ‘3c:fd:fe:c3:e0:91’, ‘ip_address’: ‘200.0.0.2’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x02’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x02’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x02’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x02’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’YuMukmJWPONRsEeT’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’uyKUxkDieUrEZquyxbZzSbgJKcxxWsEqQjPxrAUODgOHTJtZGzalkRuUZHjNddbQ’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’YuMukmJWPONRsEeT’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’uyKUxkDieUrEZquyxbZzSbgJKcxxWsEqQjPxrAUODgOHTJtZGzalkRuUZHjNddbQ’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’mVanyqsdmaUpErpk’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’omKVbGLUUHrTKXchFeNLLxrbJWBNyvujcaOoYwrIRYTLyVOdJRmzZgVjpnPLUuul’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’mVanyqsdmaUpErpk’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’omKVbGLUUHrTKXchFeNLLxrbJWBNyvujcaOoYwrIRYTLyVOdJRmzZgVjpnPLUuul’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’NIIBHxQtwBWRviji’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’EjgpkkJRwUCXLXxiLAZwXRxyQuPxqoTuRrtCMwrrAkNkilIBNZvmUrrOrhkPHMkX’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’NIIBHxQtwBWRviji’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’EjgpkkJRwUCXLXxiLAZwXRxyQuPxqoTuRrtCMwrrAkNkilIBNZvmUrrOrhkPHMkX’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’BHAQqtPRuCNAwAZM’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’ZRjYCWQrLgxyatPtlrwaSyulIwJfJvKYpKshLulAXcfhqxgtVwyisSyYPITxIkNU’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’BHAQqtPRuCNAwAZM’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’ZRjYCWQrLgxyatPtlrwaSyulIwJfJvKYpKshLulAXcfhqxgtVwyisSyYPITxIkNU’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 1, ‘n_sa_in’: 1, ‘sa_in’: [100001]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 2, ‘n_sa_in’: 1, ‘sa_in’: [100002]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 7, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 3, ‘n_sa_in’: 1, ‘sa_in’: [100003]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=6)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=7)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
sw_interface_set_flags(sw_if_index=7,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 7, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-4t4c-ethip4ipsec4tnlsw-ip4base- 
int-aes128cbc-hmac512sha-udir-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx01’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:90’, ‘ip_address’: ‘192.168.10.2’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nx02’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x01’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 2, ‘flags’: 1, ‘mac_address’: ‘3c:fd:fe:c3:e0:91’, ‘ip_address’: ‘200.0.0.2’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x02’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x02’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x02’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x02’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’zhSHsXaatFWarWcH’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’lthXtCzIxvpTQVVAqSuUOTnFyJZQpQqyYEAhPuVvwrpMVvQZynlogreLyDiGAoFC’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’zhSHsXaatFWarWcH’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’lthXtCzIxvpTQVVAqSuUOTnFyJZQpQqyYEAhPuVvwrpMVvQZynlogreLyDiGAoFC’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’zmaMitSbDHtIEYtg’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’ZXuuNnBhUQxfTzpsSjMxfGveeGWwOefkarjdJgpjhzstxCEWyzlRBEwBCMsUssmY’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’zmaMitSbDHtIEYtg’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’ZXuuNnBhUQxfTzpsSjMxfGveeGWwOefkarjdJgpjhzstxCEWyzlRBEwBCMsUssmY’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’klaTOiHuidwgtenx’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’qyFtoanQbpIHitFYbtxFAXdyYDReTZCgMqbqTgaKnUkiPTgQSkdTvARhTdqiufpF’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’klaTOiHuidwgtenx’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’qyFtoanQbpIHitFYbtxFAXdyYDReTZCgMqbqTgaKnUkiPTgQSkdTvARhTdqiufpF’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’puyUqAXLYPpmrAHh’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’nwpLkDNHoLPNFubpaOyqWdjXGtqGztcPyddoqdtynzLzxiTqoTGyNdHJmBwvhKzk’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’puyUqAXLYPpmrAHh’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’nwpLkDNHoLPNFubpaOyqWdjXGtqGztcPyddoqdtynzLzxiTqoTGyNdHJmBwvhKzk’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 1, ‘n_sa_in’: 1, ‘sa_in’: [100001]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 2, ‘n_sa_in’: 1, ‘sa_in’: [100002]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 7, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 3, ‘n_sa_in’: 1, ‘sa_in’: [100003]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=6)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=7)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
sw_interface_set_flags(sw_if_index=7,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 7, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

2n1l-40ge2p1xl710-ethip4ipsec4tnlsw-ip4base-int-aes128gcm-udir-mrr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-TG 2-node circular topology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUT1, Eth-IPv4-IPSec on DUT1-TG.

  • [Cfg] DUT configuration: DUT1 is configured with multiple IPsec tunnels between it and TG. DUT gets IPv4 traffic from TG, encrypts it and sends back to TG.

  • [Ver] TG vefication: In MaxReceivedRate tests TG sends traffic at line rate and reports total received packets over trial period. Test packets are generated by TG on links to DUTs. TG traffic profile contains one L3 flow-groups (number of flows per flow-group equals to number of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG node interfaces. Incrementing of IP.dst (IPv4 destination address) field is applied to the stream.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 1518b-1t1c-ethip4ipsec4tnlsw-ip4base- 
int-aes128gcm-udir-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx01’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:90’, ‘ip_address’: ‘192.168.10.2’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nx02’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x01’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 2, ‘flags’: 1, ‘mac_address’: ‘3c:fd:fe:c3:e0:91’, ‘ip_address’: ‘200.0.0.2’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x02’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x02’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x02’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x02’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’IgMIVDRLIhRtYJVS’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’IgMIVDRLIhRtYJVS’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’qBgEDgdmirepoDYe’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’qBgEDgdmirepoDYe’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’IbbkwvkQAyPMkzXV’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’IbbkwvkQAyPMkzXV’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’OFoiiBugmySVEUhw’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’OFoiiBugmySVEUhw’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 1, ‘n_sa_in’: 1, ‘sa_in’: [100001]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 2, ‘n_sa_in’: 1, ‘sa_in’: [100002]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 7, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 3, ‘n_sa_in’: 1, ‘sa_in’: [100003]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=6)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=7)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
sw_interface_set_flags(sw_if_index=7,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 7, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-2t2c-ethip4ipsec4tnlsw-ip4base- 
int-aes128gcm-udir-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx01’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:90’, ‘ip_address’: ‘192.168.10.2’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nx02’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x01’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 2, ‘flags’: 1, ‘mac_address’: ‘3c:fd:fe:c3:e0:91’, ‘ip_address’: ‘200.0.0.2’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x02’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x02’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x02’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x02’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’ODnjxJoQTTDubczR’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’ODnjxJoQTTDubczR’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’GIxWfVNLbvAKVfta’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’GIxWfVNLbvAKVfta’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’lAqVYJmwyMnwkGHT’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’lAqVYJmwyMnwkGHT’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’KVyZEbbFlsCqqnTH’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’KVyZEbbFlsCqqnTH’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 1, ‘n_sa_in’: 1, ‘sa_in’: [100001]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 2, ‘n_sa_in’: 1, ‘sa_in’: [100002]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 7, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 3, ‘n_sa_in’: 1, ‘sa_in’: [100003]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=6)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=7)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
sw_interface_set_flags(sw_if_index=7,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 7, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-4t4c-ethip4ipsec4tnlsw-ip4base- 
int-aes128gcm-udir-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx01’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:90’, ‘ip_address’: ‘192.168.10.2’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nx02’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x01’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 2, ‘flags’: 1, ‘mac_address’: ‘3c:fd:fe:c3:e0:91’, ‘ip_address’: ‘200.0.0.2’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x02’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x02’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x02’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x02’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’zAEJDtbOVqXBcqyA’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’zAEJDtbOVqXBcqyA’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’zcEapKdNnkemMHxK’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’zcEapKdNnkemMHxK’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’DMgUrkrtetFEFidy’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’DMgUrkrtetFEFidy’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’lnpCeUFRhMyrEyQN’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’lnpCeUFRhMyrEyQN’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 1, ‘n_sa_in’: 1, ‘sa_in’: [100001]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 2, ‘n_sa_in’: 1, ‘sa_in’: [100002]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 7, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 3, ‘n_sa_in’: 1, ‘sa_in’: [100003]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=6)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=7)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
sw_interface_set_flags(sw_if_index=7,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 7, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-1t1c-ethip4ipsec4tnlsw-ip4base- 
int-aes128gcm-udir-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx01’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:90’, ‘ip_address’: ‘192.168.10.2’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nx02’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x01’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 2, ‘flags’: 1, ‘mac_address’: ‘3c:fd:fe:c3:e0:91’, ‘ip_address’: ‘200.0.0.2’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x02’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x02’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x02’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x02’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’bzyUCiMuAgjNtKCU’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’bzyUCiMuAgjNtKCU’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’bYkUitWjGarijQKV’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’bYkUitWjGarijQKV’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’IrAUZzhMfntCAQMd’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’IrAUZzhMfntCAQMd’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’gEiClbwesfYMmhlV’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’gEiClbwesfYMmhlV’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 1, ‘n_sa_in’: 1, ‘sa_in’: [100001]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 2, ‘n_sa_in’: 1, ‘sa_in’: [100002]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 7, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 3, ‘n_sa_in’: 1, ‘sa_in’: [100003]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=6)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=7)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
sw_interface_set_flags(sw_if_index=7,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 7, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-2t2c-ethip4ipsec4tnlsw-ip4base- 
int-aes128gcm-udir-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx01’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:90’, ‘ip_address’: ‘192.168.10.2’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nx02’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x01’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 2, ‘flags’: 1, ‘mac_address’: ‘3c:fd:fe:c3:e0:91’, ‘ip_address’: ‘200.0.0.2’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x02’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x02’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x02’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x02’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’gbEGHECVhfFIkVeq’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’gbEGHECVhfFIkVeq’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’QTeHlSgxciIlAuKM’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’QTeHlSgxciIlAuKM’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’iRTjDTotBZhTSFyj’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’iRTjDTotBZhTSFyj’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’FuYPmbydBEUpupcF’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’FuYPmbydBEUpupcF’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 1, ‘n_sa_in’: 1, ‘sa_in’: [100001]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 2, ‘n_sa_in’: 1, ‘sa_in’: [100002]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 7, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 3, ‘n_sa_in’: 1, ‘sa_in’: [100003]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=6)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=7)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
sw_interface_set_flags(sw_if_index=7,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 7, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-4t4c-ethip4ipsec4tnlsw-ip4base- 
int-aes128gcm-udir-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx01’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:90’, ‘ip_address’: ‘192.168.10.2’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nx02’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x01’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 2, ‘flags’: 1, ‘mac_address’: ‘3c:fd:fe:c3:e0:91’, ‘ip_address’: ‘200.0.0.2’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x02’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x02’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x02’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x02’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’cugTblvQRSDHMBGP’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’cugTblvQRSDHMBGP’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’YeKwmiueVZFnLsQQ’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’YeKwmiueVZFnLsQQ’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’IlyWSMXeembfeEHM’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’IlyWSMXeembfeEHM’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’BrgdsvCLYSahmiRd’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’BrgdsvCLYSahmiRd’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 1, ‘n_sa_in’: 1, ‘sa_in’: [100001]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 2, ‘n_sa_in’: 1, ‘sa_in’: [100002]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 7, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 3, ‘n_sa_in’: 1, ‘sa_in’: [100003]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=6)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=7)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
sw_interface_set_flags(sw_if_index=7,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 7, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

2n1l-40ge2p1xl710-ethip4ipsec4tnlsw-ip4base-int-aes256gcm-udir-mrr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-TG 2-node circular topology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUT1, Eth-IPv4-IPSec on DUT1-TG.

  • [Cfg] DUT configuration: DUT1 is configured with multiple IPsec tunnels between it and TG. DUT gets IPv4 traffic from TG, encrypts it and sends back to TG.

  • [Ver] TG vefication: In MaxReceivedRate tests TG sends traffic at line rate and reports total received packets over trial period. Test packets are generated by TG on links to DUTs. TG traffic profile contains one L3 flow-groups (number of flows per flow-group equals to number of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG node interfaces. Incrementing of IP.dst (IPv4 destination address) field is applied to the stream.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 1518b-1t1c-ethip4ipsec4tnlsw-ip4base- 
int-aes256gcm-udir-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx01’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:90’, ‘ip_address’: ‘192.168.10.2’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nx02’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x01’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 2, ‘flags’: 1, ‘mac_address’: ‘3c:fd:fe:c3:e0:91’, ‘ip_address’: ‘200.0.0.2’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x02’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x02’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x02’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x02’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’cLKTjIsYYLxNuoBBYvQVdfElrHrlUfWz’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’cLKTjIsYYLxNuoBBYvQVdfElrHrlUfWz’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’KebphmpQTFamIdSCIwSPFxJaihLzulXX’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’KebphmpQTFamIdSCIwSPFxJaihLzulXX’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’EdEJajLWWMCXFTFahvXWWVnbqCjMgELb’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’EdEJajLWWMCXFTFahvXWWVnbqCjMgELb’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’kydDgznvvtQnLrXwHbJGhlYPMDWocaKQ’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’kydDgznvvtQnLrXwHbJGhlYPMDWocaKQ’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 1, ‘n_sa_in’: 1, ‘sa_in’: [100001]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 2, ‘n_sa_in’: 1, ‘sa_in’: [100002]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 7, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 3, ‘n_sa_in’: 1, ‘sa_in’: [100003]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=6)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=7)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
sw_interface_set_flags(sw_if_index=7,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 7, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-2t2c-ethip4ipsec4tnlsw-ip4base- 
int-aes256gcm-udir-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx01’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:90’, ‘ip_address’: ‘192.168.10.2’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nx02’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x01’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 2, ‘flags’: 1, ‘mac_address’: ‘3c:fd:fe:c3:e0:91’, ‘ip_address’: ‘200.0.0.2’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x02’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x02’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x02’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x02’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’hpJnLHsvjYAxvnvUdTVqlTJRobgMUtyE’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’hpJnLHsvjYAxvnvUdTVqlTJRobgMUtyE’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’cbzrNXSzNDOduUflqscOMvwIwTVOrhOa’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’cbzrNXSzNDOduUflqscOMvwIwTVOrhOa’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’CGnqgXOZnOXIRqENPaptcsaFHwzhWFeE’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’CGnqgXOZnOXIRqENPaptcsaFHwzhWFeE’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’oOOFrFFzFByxpjvuUWcBVSVhCmNCjiWl’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’oOOFrFFzFByxpjvuUWcBVSVhCmNCjiWl’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 1, ‘n_sa_in’: 1, ‘sa_in’: [100001]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 2, ‘n_sa_in’: 1, ‘sa_in’: [100002]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 7, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 3, ‘n_sa_in’: 1, ‘sa_in’: [100003]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=6)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=7)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
sw_interface_set_flags(sw_if_index=7,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 7, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-4t4c-ethip4ipsec4tnlsw-ip4base- 
int-aes256gcm-udir-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx01’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:90’, ‘ip_address’: ‘192.168.10.2’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nx02’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x01’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 2, ‘flags’: 1, ‘mac_address’: ‘3c:fd:fe:c3:e0:91’, ‘ip_address’: ‘200.0.0.2’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x02’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x02’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x02’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x02’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’rZnfQTTiywPcrJbbjJaeuglQzUWIlQub’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’rZnfQTTiywPcrJbbjJaeuglQzUWIlQub’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’wqmMfffOllGMclTXFQIywNymhXOTLJNU’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’wqmMfffOllGMclTXFQIywNymhXOTLJNU’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’wyWfnrVTaFSVRUugpZTRGIETrlfKkpWY’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’wyWfnrVTaFSVRUugpZTRGIETrlfKkpWY’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’kXWglrMkwwXGySOglEwBxrojBqoGjTVh’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’kXWglrMkwwXGySOglEwBxrojBqoGjTVh’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 1, ‘n_sa_in’: 1, ‘sa_in’: [100001]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 2, ‘n_sa_in’: 1, ‘sa_in’: [100002]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 7, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 3, ‘n_sa_in’: 1, ‘sa_in’: [100003]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=6)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=7)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
sw_interface_set_flags(sw_if_index=7,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 7, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-1t1c-ethip4ipsec4tnlsw-ip4base- 
int-aes256gcm-udir-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx01’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:90’, ‘ip_address’: ‘192.168.10.2’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nx02’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x01’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 2, ‘flags’: 1, ‘mac_address’: ‘3c:fd:fe:c3:e0:91’, ‘ip_address’: ‘200.0.0.2’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x02’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x02’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x02’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x02’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’EHlPsxdjPfwyelrcfDrIQHZdEIKqmRay’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’EHlPsxdjPfwyelrcfDrIQHZdEIKqmRay’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’KFnLFjQwOhlSPoxNTBzpaBNnsneGWqKW’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’KFnLFjQwOhlSPoxNTBzpaBNnsneGWqKW’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’bxfvDnyKGYYnwEMBvuCRwotixtBgvscv’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’bxfvDnyKGYYnwEMBvuCRwotixtBgvscv’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’mdeUsauqnevwimDLPnyXltjVxQPnwaFn’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’mdeUsauqnevwimDLPnyXltjVxQPnwaFn’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 1, ‘n_sa_in’: 1, ‘sa_in’: [100001]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 2, ‘n_sa_in’: 1, ‘sa_in’: [100002]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 7, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 3, ‘n_sa_in’: 1, ‘sa_in’: [100003]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=6)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=7)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
sw_interface_set_flags(sw_if_index=7,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 7, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-2t2c-ethip4ipsec4tnlsw-ip4base- 
int-aes256gcm-udir-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx01’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:90’, ‘ip_address’: ‘192.168.10.2’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nx02’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x01’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 2, ‘flags’: 1, ‘mac_address’: ‘3c:fd:fe:c3:e0:91’, ‘ip_address’: ‘200.0.0.2’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x02’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x02’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x02’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x02’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’bKuIYQSeRilmFmQCKRaiFBMtopNIeEfr’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’bKuIYQSeRilmFmQCKRaiFBMtopNIeEfr’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’nwVSGSBfNWNoxcyCBGzjzZSYfKXrxwdL’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’nwVSGSBfNWNoxcyCBGzjzZSYfKXrxwdL’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’wgPDkFHHbpNdUKPfFJeSnTJbPMdFHpwp’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’wgPDkFHHbpNdUKPfFJeSnTJbPMdFHpwp’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’tZExaNYTJbzztDqloExPkbUanenbRvgi’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’tZExaNYTJbzztDqloExPkbUanenbRvgi’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 1, ‘n_sa_in’: 1, ‘sa_in’: [100001]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 2, ‘n_sa_in’: 1, ‘sa_in’: [100002]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 7, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 3, ‘n_sa_in’: 1, ‘sa_in’: [100003]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=6)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=7)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
sw_interface_set_flags(sw_if_index=7,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 7, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-4t4c-ethip4ipsec4tnlsw-ip4base- 
int-aes256gcm-udir-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8nx01’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e0:90’, ‘ip_address’: ‘192.168.10.2’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8nx02’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
create_loopback_instance(mac_address=0,is_specified=False,user_instance=0)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x01’}}})
ip_neighbor_add_del(is_add=1,neighbor={‘sw_if_index’: 2, ‘flags’: 1, ‘mac_address’: ‘3c:fd:fe:c3:e0:91’, ‘ip_address’: ‘200.0.0.2’})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}})
sw_interface_add_del_address(sw_if_index=3,is_add=True,del_all=False,prefix={‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x02’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x02’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x02’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x02’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’PvDbcmEXCWGafeqUMaoiLbdxRqFPhemh’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’PvDbcmEXCWGafeqUMaoiLbdxRqFPhemh’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’DmBxqVkXpWxNTfhVwfBdMtryVtkJpgBZ’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’DmBxqVkXpWxNTfhVwfBdMtryVtkJpgBZ’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’rtqDpPiOeALoSfRstWCVvKAlnNGAhikP’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’rtqDpPiOeALoSfRstWCVvKAlnNGAhikP’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’eJpMdwhtNCWHzBTJMXjqCLbopNOYWkvv’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add_del_v3(is_add=True,entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’eJpMdwhtNCWHzBTJMXjqCLbopNOYWkvv’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 0, ‘n_sa_in’: 1, ‘sa_in’: [100000]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 1, ‘n_sa_in’: 1, ‘sa_in’: [100001]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 2, ‘n_sa_in’: 1, ‘sa_in’: [100002]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 7, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 3, ‘n_sa_in’: 1, ‘sa_in’: [100003]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=6)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=7)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
sw_interface_set_flags(sw_if_index=7,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 7, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})