3n-alt-xl710

40ge2p1xl710-ethip4ipsec10000tnlsw-ip4base-int-aes128cbc-hmac512sha-mrr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular opology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG vefication: In MaxReceivedRate tests TG sends traffic at line rate and reports total received packets over trial period. Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to

umber of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG ode interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 imix-4t4c-ethip4ipsec10000tnlsw-ip4base- 
int-aes128cbc-hmac512sha-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e7:a0’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

40ge2p1xl710-ethip4ipsec10000tnlsw-ip4base-int-aes128gcm-mrr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular opology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG vefication: In MaxReceivedRate tests TG sends traffic at line rate and reports total received packets over trial period. Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to

umber of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG ode interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 1518b-1t1c-ethip4ipsec10000tnlsw- 
ip4base-int-aes128gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e7:a0’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-2t2c-ethip4ipsec10000tnlsw- 
ip4base-int-aes128gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e7:a0’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-4t4c-ethip4ipsec10000tnlsw- 
ip4base-int-aes128gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e7:a0’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-1t1c-ethip4ipsec10000tnlsw- 
ip4base-int-aes128gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e7:a0’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-2t2c-ethip4ipsec10000tnlsw- 
ip4base-int-aes128gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e7:a0’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-4t4c-ethip4ipsec10000tnlsw- 
ip4base-int-aes128gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e7:a0’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

40ge2p1xl710-ethip4ipsec10000tnlsw-ip4base-int-aes256gcm-mrr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular opology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG vefication: In MaxReceivedRate tests TG sends traffic at line rate and reports total received packets over trial period. Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to

umber of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG ode interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 1518b-1t1c-ethip4ipsec10000tnlsw- 
ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e7:a0’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-2t2c-ethip4ipsec10000tnlsw- 
ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e7:a0’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-4t4c-ethip4ipsec10000tnlsw- 
ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e7:a0’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-1t1c-ethip4ipsec10000tnlsw- 
ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e7:a0’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-2t2c-ethip4ipsec10000tnlsw- 
ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e7:a0’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-4t4c-ethip4ipsec10000tnlsw- 
ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e7:a0’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

40ge2p1xl710-ethip4ipsec1000spe-cache-ip4base-policy-outbound-nocrypto-mrr

RFC4301: SPD lookup performance

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular opology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 for IPv4 routing.

  • [Cfg] DUT configuration: DUT1 is configured with IPv4 routing, wo static IPv4 /24 route entries, one SPD on each outbound interface in each direction and 1000 SPD entry(ies) in each SPD. Only outbound traffic is matched and only the last rule is the matching

ule. SPD flow-cache for IPv4 outbound traffic is enabled. DUT1 is tested with Intel-XL710.

  • [Ver] TG vefication: In MaxReceivedRate tests TG sends traffic at line rate and reports total received packets over trial period. Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, 253 flows per flow-group) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG node interfaces. The DUT does SPD lookup with only he lowest priority rule matching the traffic. The action of the matching rule is BYPASS. No encryption or authentication is done.

  • [Ref] Applicable standard specifications: RFC4301 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 64b-1t1c-ethip4ipsec1000spe-cache- 
ip4base-policy-outbound-nocrypto-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘40:a6:b7:85:e7:80’, ‘ip_address’: ‘1.1.1.1’})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e7:a0’, ‘ip_address’: ‘20.20.20.2’})
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 30, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x01x01x01x02’}}})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14x01’}}})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnx00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’x01x01x01x01’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 64b-2t2c-ethip4ipsec1000spe-cache- 
ip4base-policy-outbound-nocrypto-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘40:a6:b7:85:e7:80’, ‘ip_address’: ‘1.1.1.1’})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e7:a0’, ‘ip_address’: ‘20.20.20.2’})
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 30, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x01x01x01x02’}}})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14x01’}}})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnx00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’x01x01x01x01’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 64b-4t4c-ethip4ipsec1000spe-cache- 
ip4base-policy-outbound-nocrypto-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘40:a6:b7:85:e7:80’, ‘ip_address’: ‘1.1.1.1’})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e7:a0’, ‘ip_address’: ‘20.20.20.2’})
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 30, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x01x01x01x02’}}})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14x01’}}})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnx00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’x01x01x01x01’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

40ge2p1xl710-ethip4ipsec1000spe-ip4base-policy-outbound-nocrypto-mrr

RFC4301: SPD lookup performance

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular opology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 for IPv4 routing.

  • [Cfg] DUT configuration: DUT1 is configured with IPv4 routing, wo static IPv4 /24 route entries, one SPD on each outbound interface in each direction and 1000 SPD entry(ies) in each SPD. Only outbound traffic is matched and only the last rule is the matching

ule. DUT1 tested with Intel-XL710.

  • [Ver] TG vefication: In MaxReceivedRate tests TG sends traffic at line rate and reports total received packets over trial period. Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, 253 flows per flow-group) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG node interfaces. The DUT does SPD lookup with only he lowest priority rule matching the traffic. The action of the matching rule is BYPASS. No encryption or authentication is done.

  • [Ref] Applicable standard specifications: RFC4301 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 64b-1t1c-ethip4ipsec1000spe-ip4base- 
policy-outbound-nocrypto-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘40:a6:b7:85:e7:80’, ‘ip_address’: ‘1.1.1.1’})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e7:a0’, ‘ip_address’: ‘20.20.20.2’})
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 30, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x01x01x01x02’}}})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14x01’}}})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnx00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’x01x01x01x01’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 64b-2t2c-ethip4ipsec1000spe-ip4base- 
policy-outbound-nocrypto-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘40:a6:b7:85:e7:80’, ‘ip_address’: ‘1.1.1.1’})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e7:a0’, ‘ip_address’: ‘20.20.20.2’})
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 30, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x01x01x01x02’}}})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14x01’}}})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnx00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’x01x01x01x01’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 64b-4t4c-ethip4ipsec1000spe-ip4base- 
policy-outbound-nocrypto-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘40:a6:b7:85:e7:80’, ‘ip_address’: ‘1.1.1.1’})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e7:a0’, ‘ip_address’: ‘20.20.20.2’})
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 30, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x01x01x01x02’}}})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14x01’}}})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnx00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’x01x01x01x01’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

40ge2p1xl710-ethip4ipsec1000tnlsw-ip4base-int-aes128cbc-hmac512sha-mrr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular opology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG vefication: In MaxReceivedRate tests TG sends traffic at line rate and reports total received packets over trial period. Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to

umber of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG ode interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 1518b-1t1c-ethip4ipsec1000tnlsw-ip4base- 
int-aes128cbc-hmac512sha-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e7:a0’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-2t2c-ethip4ipsec1000tnlsw-ip4base- 
int-aes128cbc-hmac512sha-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e7:a0’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-4t4c-ethip4ipsec1000tnlsw-ip4base- 
int-aes128cbc-hmac512sha-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e7:a0’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-1t1c-ethip4ipsec1000tnlsw-ip4base- 
int-aes128cbc-hmac512sha-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e7:a0’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-2t2c-ethip4ipsec1000tnlsw-ip4base- 
int-aes128cbc-hmac512sha-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e7:a0’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-4t4c-ethip4ipsec1000tnlsw-ip4base- 
int-aes128cbc-hmac512sha-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e7:a0’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

40ge2p1xl710-ethip4ipsec1000tnlsw-ip4base-int-aes128gcm-mrr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular opology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG vefication: In MaxReceivedRate tests TG sends traffic at line rate and reports total received packets over trial period. Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to

umber of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG ode interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 1518b-1t1c-ethip4ipsec1000tnlsw- 
ip4base-int-aes128gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e7:a0’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-2t2c-ethip4ipsec1000tnlsw- 
ip4base-int-aes128gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e7:a0’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-4t4c-ethip4ipsec1000tnlsw- 
ip4base-int-aes128gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e7:a0’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-1t1c-ethip4ipsec1000tnlsw- 
ip4base-int-aes128gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e7:a0’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-2t2c-ethip4ipsec1000tnlsw- 
ip4base-int-aes128gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e7:a0’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-4t4c-ethip4ipsec1000tnlsw- 
ip4base-int-aes128gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e7:a0’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

40ge2p1xl710-ethip4ipsec1000tnlsw-ip4base-int-aes256gcm-mrr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular opology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG vefication: In MaxReceivedRate tests TG sends traffic at line rate and reports total received packets over trial period. Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to

umber of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG ode interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 1518b-1t1c-ethip4ipsec1000tnlsw- 
ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e7:a0’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-2t2c-ethip4ipsec1000tnlsw- 
ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e7:a0’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-4t4c-ethip4ipsec1000tnlsw- 
ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e7:a0’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-1t1c-ethip4ipsec1000tnlsw- 
ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e7:a0’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-2t2c-ethip4ipsec1000tnlsw- 
ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e7:a0’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-4t4c-ethip4ipsec1000tnlsw- 
ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e7:a0’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

40ge2p1xl710-ethip4ipsec1000tnlsw-ip4base-policy-aes256gcm-mrr

IPv4 IPsec tunnel mode performance test suite.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular opology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG vefication: In MaxReceivedRate tests TG sends traffic at line rate and reports total received packets over trial period. Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to

umber of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG ode interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

40ge2p1xl710-ethip4ipsec100spe-cache-ip4base-policy-outbound-nocrypto-mrr

RFC4301: SPD lookup performance

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular opology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 for IPv4 routing.

  • [Cfg] DUT configuration: DUT1 is configured with IPv4 routing, wo static IPv4 /24 route entries, one SPD on each outbound interface in each direction and 100 SPD entry(ies) in each SPD. Only outbound traffic is matched and only the last rule is the matching

ule. SPD flow-cache for IPv4 outbound traffic is enabled. DUT1 tested with Intel-XL710.

  • [Ver] TG vefication: In MaxReceivedRate tests TG sends traffic at line rate and reports total received packets over trial period. Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, 253 flows per flow-group) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG node interfaces. The DUT does SPD lookup with only he lowest priority rule matching the traffic. The action of the matching rule is BYPASS. No encryption or authentication is done.

  • [Ref] Applicable standard specifications: RFC4301 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 64b-1t1c-ethip4ipsec100spe-cache- 
ip4base-policy-outbound-nocrypto-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘40:a6:b7:85:e7:80’, ‘ip_address’: ‘1.1.1.1’})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e7:a0’, ‘ip_address’: ‘20.20.20.2’})
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 30, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x01x01x01x02’}}})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14x01’}}})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnx00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’x01x01x01x01’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 64b-2t2c-ethip4ipsec100spe-cache- 
ip4base-policy-outbound-nocrypto-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘40:a6:b7:85:e7:80’, ‘ip_address’: ‘1.1.1.1’})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e7:a0’, ‘ip_address’: ‘20.20.20.2’})
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 30, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x01x01x01x02’}}})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14x01’}}})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnx00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’x01x01x01x01’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 64b-4t4c-ethip4ipsec100spe-cache- 
ip4base-policy-outbound-nocrypto-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘40:a6:b7:85:e7:80’, ‘ip_address’: ‘1.1.1.1’})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e7:a0’, ‘ip_address’: ‘20.20.20.2’})
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 30, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x01x01x01x02’}}})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14x01’}}})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnx00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’x01x01x01x01’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

40ge2p1xl710-ethip4ipsec100spe-ip4base-policy-outbound-nocrypto-mrr

RFC4301: SPD lookup performance

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular opology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 for IPv4 routing.

  • [Cfg] DUT configuration: DUT1 is configured with IPv4 routing, wo static IPv4 /24 route entries, one SPD on each outbound interface in each direction and 100 SPD entry(ies) in each SPD. Only outbound traffic is matched and only the last rule is the matching

ule. DUT1 tested with Intel-XL710.

  • [Ver] TG vefication: In MaxReceivedRate tests TG sends traffic at line rate and reports total received packets over trial period. Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, 253 flows per flow-group) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG node interfaces. The DUT does SPD lookup with only he lowest priority rule matching the traffic. The action of the matching rule is BYPASS. No encryption or authentication is done.

  • [Ref] Applicable standard specifications: RFC4301 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 64b-1t1c-ethip4ipsec100spe-ip4base- 
policy-outbound-nocrypto-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘40:a6:b7:85:e7:80’, ‘ip_address’: ‘1.1.1.1’})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e7:a0’, ‘ip_address’: ‘20.20.20.2’})
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 30, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x01x01x01x02’}}})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14x01’}}})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnx00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’x01x01x01x01’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 64b-2t2c-ethip4ipsec100spe-ip4base- 
policy-outbound-nocrypto-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘40:a6:b7:85:e7:80’, ‘ip_address’: ‘1.1.1.1’})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e7:a0’, ‘ip_address’: ‘20.20.20.2’})
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 30, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x01x01x01x02’}}})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14x01’}}})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnx00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’x01x01x01x01’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 64b-4t4c-ethip4ipsec100spe-ip4base- 
policy-outbound-nocrypto-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘40:a6:b7:85:e7:80’, ‘ip_address’: ‘1.1.1.1’})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e7:a0’, ‘ip_address’: ‘20.20.20.2’})
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 30, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x01x01x01x02’}}})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14x01’}}})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnx00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’x01x01x01x01’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

40ge2p1xl710-ethip4ipsec1spe-cache-ip4base-policy-outbound-nocrypto-mrr

RFC4301: SPD lookup performance

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular opology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 for IPv4 routing.

  • [Cfg] DUT configuration: DUT1 is configured with IPv4 routing, wo static IPv4 /24 route entries, one SPD on each outbound interface in each direction and 1 SPD entry(ies) in each SPD. Only outbound traffic is matched and only the last rule is the matching

ule. SPD flow-cache for IPv4 outbound traffic is enabled. DUT1 tested with Intel-XL710.

  • [Ver] TG vefication: In MaxReceivedRate tests TG sends traffic at line rate and reports total received packets over trial period. Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, 253 flows per flow-group) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG node interfaces. The DUT does SPD lookup with only he lowest priority rule matching the traffic. The action of the matching rule is BYPASS. No encryption or authentication is done.

  • [Ref] Applicable standard specifications: RFC4301 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 64b-1t1c-ethip4ipsec1spe-cache- 
ip4base-policy-outbound-nocrypto-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘40:a6:b7:85:e7:80’, ‘ip_address’: ‘1.1.1.1’})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e7:a0’, ‘ip_address’: ‘20.20.20.2’})
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 30, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x01x01x01x02’}}})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14x01’}}})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnx00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’x01x01x01x01’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 64b-2t2c-ethip4ipsec1spe-cache- 
ip4base-policy-outbound-nocrypto-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘40:a6:b7:85:e7:80’, ‘ip_address’: ‘1.1.1.1’})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e7:a0’, ‘ip_address’: ‘20.20.20.2’})
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 30, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x01x01x01x02’}}})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14x01’}}})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnx00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’x01x01x01x01’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 64b-4t4c-ethip4ipsec1spe-cache- 
ip4base-policy-outbound-nocrypto-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘40:a6:b7:85:e7:80’, ‘ip_address’: ‘1.1.1.1’})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e7:a0’, ‘ip_address’: ‘20.20.20.2’})
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 30, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x01x01x01x02’}}})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14x01’}}})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnx00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’x01x01x01x01’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

40ge2p1xl710-ethip4ipsec1spe-ip4base-policy-outbound-nocrypto-mrr

RFC4301: SPD lookup performance

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular opology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 for IPv4 routing.

  • [Cfg] DUT configuration: DUT1 is configured with IPv4 routing, wo static IPv4 /24 route entries, one SPD on each outbound interface in each direction and 1 SPD entry(ies) in each SPD. Only outbound traffic is matched and only the last rule is the matching

ule. DUT1 tested with Intel-XL710.

  • [Ver] TG vefication: In MaxReceivedRate tests TG sends traffic at line rate and reports total received packets over trial period. Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, 253 flows per flow-group) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG node interfaces. The DUT does SPD lookup with only he lowest priority rule matching the traffic. The action of the matching rule is BYPASS. No encryption or authentication is done.

  • [Ref] Applicable standard specifications: RFC4301 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 64b-1t1c-ethip4ipsec1spe-ip4base- 
policy-outbound-nocrypto-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘40:a6:b7:85:e7:80’, ‘ip_address’: ‘1.1.1.1’})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e7:a0’, ‘ip_address’: ‘20.20.20.2’})
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 30, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x01x01x01x02’}}})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14x01’}}})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnx00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’x01x01x01x01’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 64b-2t2c-ethip4ipsec1spe-ip4base- 
policy-outbound-nocrypto-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘40:a6:b7:85:e7:80’, ‘ip_address’: ‘1.1.1.1’})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e7:a0’, ‘ip_address’: ‘20.20.20.2’})
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 30, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x01x01x01x02’}}})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14x01’}}})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnx00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’x01x01x01x01’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 64b-4t4c-ethip4ipsec1spe-ip4base- 
policy-outbound-nocrypto-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘40:a6:b7:85:e7:80’, ‘ip_address’: ‘1.1.1.1’})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e7:a0’, ‘ip_address’: ‘20.20.20.2’})
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 30, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x01x01x01x02’}}})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x14x14x01’}}})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nnnx00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’x01x01x01x01’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

40ge2p1xl710-ethip4ipsec1tnlsw-ip4base-policy-aes256gcm-mrr

IPv4 IPsec tunnel mode performance test suite.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular opology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG vefication: In MaxReceivedRate tests TG sends traffic at line rate and reports total received packets over trial period. Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to

umber of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG ode interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 64b-1t1c-ethip4ipsec1tnlsw- 
ip4base-policy-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e7:a0’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’dx00x00x01’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’dx00x00x01’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘40:a6:b7:85:e7:80’, ‘ip_address’: IPv4Address(‘100.0.0.1’)})
ipsec_spd_add_del(is_add=True,spd_id=1)
ipsec_interface_add_del_spd(is_add=True,sw_if_index=2,spd_id=1)
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 100, ‘is_outbound’: True, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 50, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’dxffxffxff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8xffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 100, ‘is_outbound’: False, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 50, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8xffxffxff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’dxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 300000, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’benLTJQpqOIAwqwGUdlbItHIaiPvsqMY’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: 0}, ‘flags’: 4, ‘tunnel’: {‘src’: ‘100.0.0.1’, ‘dst’: ‘200.0.0.102’, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘protocol’: 50, ‘udp_src_port’: 4500, ‘udp_dst_port’: 4500})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 10, ‘is_outbound’: False, ‘sa_id’: 100000, ‘policy’: 3, ‘protocol’: 0, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x00x00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xffxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 200000, ‘spi’: 400000, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’benLTJQpqOIAwqwGUdlbItHIaiPvsqMY’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: 0}, ‘flags’: 4, ‘tunnel’: {‘src’: ‘200.0.0.102’, ‘dst’: ‘100.0.0.1’, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘protocol’: 50, ‘udp_src_port’: 4500, ‘udp_dst_port’: 4500})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 10, ‘is_outbound’: True, ‘sa_id’: 200000, ‘policy’: 3, ‘protocol’: 0, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x00x00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xffxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})

 64b-2t2c-ethip4ipsec1tnlsw- 
ip4base-policy-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e7:a0’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’dx00x00x01’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’dx00x00x01’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘40:a6:b7:85:e7:80’, ‘ip_address’: IPv4Address(‘100.0.0.1’)})
ipsec_spd_add_del(is_add=True,spd_id=1)
ipsec_interface_add_del_spd(is_add=True,sw_if_index=2,spd_id=1)
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 100, ‘is_outbound’: True, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 50, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’dxffxffxff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8xffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 100, ‘is_outbound’: False, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 50, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8xffxffxff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’dxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 300000, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’BQGiFVSFzKueWrUfjadXNeZdEwhEnXZF’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: 0}, ‘flags’: 4, ‘tunnel’: {‘src’: ‘100.0.0.1’, ‘dst’: ‘200.0.0.102’, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘protocol’: 50, ‘udp_src_port’: 4500, ‘udp_dst_port’: 4500})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 10, ‘is_outbound’: False, ‘sa_id’: 100000, ‘policy’: 3, ‘protocol’: 0, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x00x00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xffxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 200000, ‘spi’: 400000, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’BQGiFVSFzKueWrUfjadXNeZdEwhEnXZF’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: 0}, ‘flags’: 4, ‘tunnel’: {‘src’: ‘200.0.0.102’, ‘dst’: ‘100.0.0.1’, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘protocol’: 50, ‘udp_src_port’: 4500, ‘udp_dst_port’: 4500})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 10, ‘is_outbound’: True, ‘sa_id’: 200000, ‘policy’: 3, ‘protocol’: 0, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x00x00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xffxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})

 64b-4t4c-ethip4ipsec1tnlsw- 
ip4base-policy-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e7:a0’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’dx00x00x01’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’dx00x00x01’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘40:a6:b7:85:e7:80’, ‘ip_address’: IPv4Address(‘100.0.0.1’)})
ipsec_spd_add_del(is_add=True,spd_id=1)
ipsec_interface_add_del_spd(is_add=True,sw_if_index=2,spd_id=1)
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 100, ‘is_outbound’: True, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 50, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’dxffxffxff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8xffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 100, ‘is_outbound’: False, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 50, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8xffxffxff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’dxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 300000, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’WTvvPWAlzXAeSAyuOdseMCemkrYrirYT’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: 0}, ‘flags’: 4, ‘tunnel’: {‘src’: ‘100.0.0.1’, ‘dst’: ‘200.0.0.102’, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘protocol’: 50, ‘udp_src_port’: 4500, ‘udp_dst_port’: 4500})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 10, ‘is_outbound’: False, ‘sa_id’: 100000, ‘policy’: 3, ‘protocol’: 0, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x00x00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xffxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 200000, ‘spi’: 400000, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’WTvvPWAlzXAeSAyuOdseMCemkrYrirYT’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: 0}, ‘flags’: 4, ‘tunnel’: {‘src’: ‘200.0.0.102’, ‘dst’: ‘100.0.0.1’, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘protocol’: 50, ‘udp_src_port’: 4500, ‘udp_dst_port’: 4500})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 10, ‘is_outbound’: True, ‘sa_id’: 200000, ‘policy’: 3, ‘protocol’: 0, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’x00x00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xffxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})

40ge2p1xl710-ethip4ipsec40tnlsw-ip4base-policy-aes256gcm-mrr

IPv4 IPsec tunnel mode performance test suite.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular opology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG vefication: In MaxReceivedRate tests TG sends traffic at line rate and reports total received packets over trial period. Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to

umber of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG ode interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 64b-1t1c-ethip4ipsec40tnlsw- 
ip4base-policy-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e7:a0’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.0.102/24
exec ip route add 10.0.0.0/32 via 100.0.0.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.0.1/32 via 100.0.0.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.0.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.1.102/24
exec ip route add 10.0.0.1/32 via 100.0.1.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.1.1/32 via 100.0.1.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.1.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.2.102/24
exec ip route add 10.0.0.2/32 via 100.0.2.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.2.1/32 via 100.0.2.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.2.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.3.102/24
exec ip route add 10.0.0.3/32 via 100.0.3.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.3.1/32 via 100.0.3.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.3.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.4.102/24
exec ip route add 10.0.0.4/32 via 100.0.4.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.4.1/32 via 100.0.4.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.4.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.5.102/24
exec ip route add 10.0.0.5/32 via 100.0.5.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.5.1/32 via 100.0.5.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.5.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.6.102/24
exec ip route add 10.0.0.6/32 via 100.0.6.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.6.1/32 via 100.0.6.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.6.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.7.102/24
exec ip route add 10.0.0.7/32 via 100.0.7.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.7.1/32 via 100.0.7.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.7.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.8.102/24
exec ip route add 10.0.0.8/32 via 100.0.8.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.8.1/32 via 100.0.8.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.8.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.9.102/24
exec ip route add 10.0.0.9/32 via 100.0.9.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.9.1/32 via 100.0.9.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.9.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.10.102/24
exec ip route add 10.0.0.10/32 via 100.0.10.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.10.1/32 via 100.0.10.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.10.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.11.102/24
exec ip route add 10.0.0.11/32 via 100.0.11.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.11.1/32 via 100.0.11.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.11.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.12.102/24
exec ip route add 10.0.0.12/32 via 100.0.12.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.12.1/32 via 100.0.12.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.12.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.13.102/24
exec ip route add 10.0.0.13/32 via 100.0.13.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.13.1/32 via 100.0.13.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.13.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.14.102/24
exec ip route add 10.0.0.14/32 via 100.0.14.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.14.1/32 via 100.0.14.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.14.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.15.102/24
exec ip route add 10.0.0.15/32 via 100.0.15.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.15.1/32 via 100.0.15.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.15.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.16.102/24
exec ip route add 10.0.0.16/32 via 100.0.16.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.16.1/32 via 100.0.16.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.16.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.17.102/24
exec ip route add 10.0.0.17/32 via 100.0.17.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.17.1/32 via 100.0.17.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.17.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.18.102/24
exec ip route add 10.0.0.18/32 via 100.0.18.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.18.1/32 via 100.0.18.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.18.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.19.102/24
exec ip route add 10.0.0.19/32 via 100.0.19.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.19.1/32 via 100.0.19.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.19.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.20.102/24
exec ip route add 10.0.0.20/32 via 100.0.20.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.20.1/32 via 100.0.20.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.20.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.21.102/24
exec ip route add 10.0.0.21/32 via 100.0.21.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.21.1/32 via 100.0.21.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.21.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.22.102/24
exec ip route add 10.0.0.22/32 via 100.0.22.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.22.1/32 via 100.0.22.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.22.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.23.102/24
exec ip route add 10.0.0.23/32 via 100.0.23.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.23.1/32 via 100.0.23.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.23.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.24.102/24
exec ip route add 10.0.0.24/32 via 100.0.24.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.24.1/32 via 100.0.24.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.24.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.25.102/24
exec ip route add 10.0.0.25/32 via 100.0.25.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.25.1/32 via 100.0.25.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.25.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.26.102/24
exec ip route add 10.0.0.26/32 via 100.0.26.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.26.1/32 via 100.0.26.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.26.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.27.102/24
exec ip route add 10.0.0.27/32 via 100.0.27.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.27.1/32 via 100.0.27.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.27.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.28.102/24
exec ip route add 10.0.0.28/32 via 100.0.28.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.28.1/32 via 100.0.28.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.28.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.29.102/24
exec ip route add 10.0.0.29/32 via 100.0.29.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.29.1/32 via 100.0.29.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.29.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.30.102/24
exec ip route add 10.0.0.30/32 via 100.0.30.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.30.1/32 via 100.0.30.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.30.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.31.102/24
exec ip route add 10.0.0.31/32 via 100.0.31.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.31.1/32 via 100.0.31.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.31.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.32.102/24
exec ip route add 10.0.0.32/32 via 100.0.32.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.32.1/32 via 100.0.32.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.32.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.33.102/24
exec ip route add 10.0.0.33/32 via 100.0.33.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.33.1/32 via 100.0.33.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.33.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.34.102/24
exec ip route add 10.0.0.34/32 via 100.0.34.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.34.1/32 via 100.0.34.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.34.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.35.102/24
exec ip route add 10.0.0.35/32 via 100.0.35.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.35.1/32 via 100.0.35.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.35.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.36.102/24
exec ip route add 10.0.0.36/32 via 100.0.36.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.36.1/32 via 100.0.36.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.36.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.37.102/24
exec ip route add 10.0.0.37/32 via 100.0.37.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.37.1/32 via 100.0.37.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.37.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.38.102/24
exec ip route add 10.0.0.38/32 via 100.0.38.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.38.1/32 via 100.0.38.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.38.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.39.102/24
exec ip route add 10.0.0.39/32 via 100.0.39.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.39.1/32 via 100.0.39.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.39.1 40:a6:b7:85:e7:80
ipsec_spd_add_del(is_add=True,spd_id=1)
ipsec_interface_add_del_spd(is_add=True,sw_if_index=2,spd_id=1)
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 100, ‘is_outbound’: True, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 50, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’dxffxffxff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8xffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 100, ‘is_outbound’: False, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 50, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8xffxffxff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’dxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
exec ipsec sa add 100000 esp spi 300000 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 100.0.0.1 tunnel dst 200.0.0.102
exec ipsec sa add 100001 esp spi 300001 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 100.0.1.1 tunnel dst 200.0.1.102
exec ipsec sa add 100002 esp spi 300002 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 100.0.2.1 tunnel dst 200.0.2.102
exec ipsec sa add 100003 esp spi 300003 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 100.0.3.1 tunnel dst 200.0.3.102
exec ipsec sa add 100004 esp spi 300004 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 100.0.4.1 tunnel dst 200.0.4.102
exec ipsec sa add 100005 esp spi 300005 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 100.0.5.1 tunnel dst 200.0.5.102
exec ipsec sa add 100006 esp spi 300006 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 100.0.6.1 tunnel dst 200.0.6.102
exec ipsec sa add 100007 esp spi 300007 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 100.0.7.1 tunnel dst 200.0.7.102
exec ipsec sa add 100008 esp spi 300008 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 100.0.8.1 tunnel dst 200.0.8.102
exec ipsec sa add 100009 esp spi 300009 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 100.0.9.1 tunnel dst 200.0.9.102
exec ipsec sa add 100010 esp spi 300010 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 100.0.10.1 tunnel dst 200.0.10.102
exec ipsec sa add 100011 esp spi 300011 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 100.0.11.1 tunnel dst 200.0.11.102
exec ipsec sa add 100012 esp spi 300012 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 100.0.12.1 tunnel dst 200.0.12.102
exec ipsec sa add 100013 esp spi 300013 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 100.0.13.1 tunnel dst 200.0.13.102
exec ipsec sa add 100014 esp spi 300014 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 100.0.14.1 tunnel dst 200.0.14.102
exec ipsec sa add 100015 esp spi 300015 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 100.0.15.1 tunnel dst 200.0.15.102
exec ipsec sa add 100016 esp spi 300016 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 100.0.16.1 tunnel dst 200.0.16.102
exec ipsec sa add 100017 esp spi 300017 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 100.0.17.1 tunnel dst 200.0.17.102
exec ipsec sa add 100018 esp spi 300018 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 100.0.18.1 tunnel dst 200.0.18.102
exec ipsec sa add 100019 esp spi 300019 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 100.0.19.1 tunnel dst 200.0.19.102
exec ipsec sa add 100020 esp spi 300020 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 100.0.20.1 tunnel dst 200.0.20.102
exec ipsec sa add 100021 esp spi 300021 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 100.0.21.1 tunnel dst 200.0.21.102
exec ipsec sa add 100022 esp spi 300022 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 100.0.22.1 tunnel dst 200.0.22.102
exec ipsec sa add 100023 esp spi 300023 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 100.0.23.1 tunnel dst 200.0.23.102
exec ipsec sa add 100024 esp spi 300024 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 100.0.24.1 tunnel dst 200.0.24.102
exec ipsec sa add 100025 esp spi 300025 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 100.0.25.1 tunnel dst 200.0.25.102
exec ipsec sa add 100026 esp spi 300026 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 100.0.26.1 tunnel dst 200.0.26.102
exec ipsec sa add 100027 esp spi 300027 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 100.0.27.1 tunnel dst 200.0.27.102
exec ipsec sa add 100028 esp spi 300028 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 100.0.28.1 tunnel dst 200.0.28.102
exec ipsec sa add 100029 esp spi 300029 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 100.0.29.1 tunnel dst 200.0.29.102
exec ipsec sa add 100030 esp spi 300030 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 100.0.30.1 tunnel dst 200.0.30.102
exec ipsec sa add 100031 esp spi 300031 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 100.0.31.1 tunnel dst 200.0.31.102
exec ipsec sa add 100032 esp spi 300032 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 100.0.32.1 tunnel dst 200.0.32.102
exec ipsec sa add 100033 esp spi 300033 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 100.0.33.1 tunnel dst 200.0.33.102
exec ipsec sa add 100034 esp spi 300034 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 100.0.34.1 tunnel dst 200.0.34.102
exec ipsec sa add 100035 esp spi 300035 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 100.0.35.1 tunnel dst 200.0.35.102
exec ipsec sa add 100036 esp spi 300036 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 100.0.36.1 tunnel dst 200.0.36.102
exec ipsec sa add 100037 esp spi 300037 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 100.0.37.1 tunnel dst 200.0.37.102
exec ipsec sa add 100038 esp spi 300038 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 100.0.38.1 tunnel dst 200.0.38.102
exec ipsec sa add 100039 esp spi 300039 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 100.0.39.1 tunnel dst 200.0.39.102
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100000 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.0 - 20.0.0.0
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100001 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.1 - 20.0.0.1
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100002 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.2 - 20.0.0.2
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100003 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.3 - 20.0.0.3
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100004 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.4 - 20.0.0.4
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100005 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.5 - 20.0.0.5
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100006 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.6 - 20.0.0.6
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100007 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.7 - 20.0.0.7
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100008 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.8 - 20.0.0.8
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100009 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.9 - 20.0.0.9
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100010 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.10 - 20.0.0.10
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100011 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.11 - 20.0.0.11
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100012 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.12 - 20.0.0.12
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100013 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.13 - 20.0.0.13
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100014 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.14 - 20.0.0.14
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100015 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.15 - 20.0.0.15
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100016 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.16 - 20.0.0.16
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100017 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.17 - 20.0.0.17
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100018 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.18 - 20.0.0.18
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100019 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.19 - 20.0.0.19
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100020 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.20 - 20.0.0.20
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100021 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.21 - 20.0.0.21
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100022 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.22 - 20.0.0.22
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100023 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.23 - 20.0.0.23
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100024 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.24 - 20.0.0.24
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100025 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.25 - 20.0.0.25
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100026 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.26 - 20.0.0.26
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100027 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.27 - 20.0.0.27
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100028 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.28 - 20.0.0.28
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100029 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.29 - 20.0.0.29
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100030 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.30 - 20.0.0.30
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100031 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.31 - 20.0.0.31
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100032 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.32 - 20.0.0.32
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100033 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.33 - 20.0.0.33
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100034 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.34 - 20.0.0.34
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100035 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.35 - 20.0.0.35
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100036 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.36 - 20.0.0.36
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100037 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.37 - 20.0.0.37
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100038 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.38 - 20.0.0.38
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100039 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.39 - 20.0.0.39
exec ipsec sa add 200000 esp spi 400000 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 200.0.0.102 tunnel dst 100.0.0.1
exec ipsec sa add 200001 esp spi 400001 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 200.0.1.102 tunnel dst 100.0.1.1
exec ipsec sa add 200002 esp spi 400002 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 200.0.2.102 tunnel dst 100.0.2.1
exec ipsec sa add 200003 esp spi 400003 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 200.0.3.102 tunnel dst 100.0.3.1
exec ipsec sa add 200004 esp spi 400004 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 200.0.4.102 tunnel dst 100.0.4.1
exec ipsec sa add 200005 esp spi 400005 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 200.0.5.102 tunnel dst 100.0.5.1
exec ipsec sa add 200006 esp spi 400006 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 200.0.6.102 tunnel dst 100.0.6.1
exec ipsec sa add 200007 esp spi 400007 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 200.0.7.102 tunnel dst 100.0.7.1
exec ipsec sa add 200008 esp spi 400008 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 200.0.8.102 tunnel dst 100.0.8.1
exec ipsec sa add 200009 esp spi 400009 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 200.0.9.102 tunnel dst 100.0.9.1
exec ipsec sa add 200010 esp spi 400010 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 200.0.10.102 tunnel dst 100.0.10.1
exec ipsec sa add 200011 esp spi 400011 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 200.0.11.102 tunnel dst 100.0.11.1
exec ipsec sa add 200012 esp spi 400012 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 200.0.12.102 tunnel dst 100.0.12.1
exec ipsec sa add 200013 esp spi 400013 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 200.0.13.102 tunnel dst 100.0.13.1
exec ipsec sa add 200014 esp spi 400014 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 200.0.14.102 tunnel dst 100.0.14.1
exec ipsec sa add 200015 esp spi 400015 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 200.0.15.102 tunnel dst 100.0.15.1
exec ipsec sa add 200016 esp spi 400016 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 200.0.16.102 tunnel dst 100.0.16.1
exec ipsec sa add 200017 esp spi 400017 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 200.0.17.102 tunnel dst 100.0.17.1
exec ipsec sa add 200018 esp spi 400018 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 200.0.18.102 tunnel dst 100.0.18.1
exec ipsec sa add 200019 esp spi 400019 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 200.0.19.102 tunnel dst 100.0.19.1
exec ipsec sa add 200020 esp spi 400020 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 200.0.20.102 tunnel dst 100.0.20.1
exec ipsec sa add 200021 esp spi 400021 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 200.0.21.102 tunnel dst 100.0.21.1
exec ipsec sa add 200022 esp spi 400022 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 200.0.22.102 tunnel dst 100.0.22.1
exec ipsec sa add 200023 esp spi 400023 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 200.0.23.102 tunnel dst 100.0.23.1
exec ipsec sa add 200024 esp spi 400024 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 200.0.24.102 tunnel dst 100.0.24.1
exec ipsec sa add 200025 esp spi 400025 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 200.0.25.102 tunnel dst 100.0.25.1
exec ipsec sa add 200026 esp spi 400026 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 200.0.26.102 tunnel dst 100.0.26.1
exec ipsec sa add 200027 esp spi 400027 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 200.0.27.102 tunnel dst 100.0.27.1
exec ipsec sa add 200028 esp spi 400028 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 200.0.28.102 tunnel dst 100.0.28.1
exec ipsec sa add 200029 esp spi 400029 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 200.0.29.102 tunnel dst 100.0.29.1
exec ipsec sa add 200030 esp spi 400030 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 200.0.30.102 tunnel dst 100.0.30.1
exec ipsec sa add 200031 esp spi 400031 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 200.0.31.102 tunnel dst 100.0.31.1
exec ipsec sa add 200032 esp spi 400032 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 200.0.32.102 tunnel dst 100.0.32.1
exec ipsec sa add 200033 esp spi 400033 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 200.0.33.102 tunnel dst 100.0.33.1
exec ipsec sa add 200034 esp spi 400034 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 200.0.34.102 tunnel dst 100.0.34.1
exec ipsec sa add 200035 esp spi 400035 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 200.0.35.102 tunnel dst 100.0.35.1
exec ipsec sa add 200036 esp spi 400036 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 200.0.36.102 tunnel dst 100.0.36.1
exec ipsec sa add 200037 esp spi 400037 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 200.0.37.102 tunnel dst 100.0.37.1
exec ipsec sa add 200038 esp spi 400038 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 200.0.38.102 tunnel dst 100.0.38.1
exec ipsec sa add 200039 esp spi 400039 crypto-alg aes-gcm-256 crypto-key 7858554a45435147694b4845426a625850575761646a476f726d656473536a42 tunnel src 200.0.39.102 tunnel dst 100.0.39.1
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200000 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.0 - 10.0.0.0
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200001 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.1 - 10.0.0.1
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200002 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.2 - 10.0.0.2
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200003 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.3 - 10.0.0.3
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200004 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.4 - 10.0.0.4
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200005 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.5 - 10.0.0.5
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200006 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.6 - 10.0.0.6
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200007 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.7 - 10.0.0.7
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200008 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.8 - 10.0.0.8
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200009 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.9 - 10.0.0.9
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200010 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.10 - 10.0.0.10
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200011 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.11 - 10.0.0.11
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200012 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.12 - 10.0.0.12
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200013 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.13 - 10.0.0.13
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200014 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.14 - 10.0.0.14
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200015 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.15 - 10.0.0.15
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200016 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.16 - 10.0.0.16
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200017 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.17 - 10.0.0.17
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200018 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.18 - 10.0.0.18
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200019 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.19 - 10.0.0.19
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200020 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.20 - 10.0.0.20
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200021 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.21 - 10.0.0.21
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200022 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.22 - 10.0.0.22
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200023 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.23 - 10.0.0.23
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200024 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.24 - 10.0.0.24
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200025 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.25 - 10.0.0.25
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200026 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.26 - 10.0.0.26
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200027 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.27 - 10.0.0.27
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200028 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.28 - 10.0.0.28
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200029 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.29 - 10.0.0.29
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200030 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.30 - 10.0.0.30
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200031 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.31 - 10.0.0.31
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200032 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.32 - 10.0.0.32
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200033 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.33 - 10.0.0.33
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200034 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.34 - 10.0.0.34
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200035 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.35 - 10.0.0.35
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200036 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.36 - 10.0.0.36
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200037 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.37 - 10.0.0.37
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200038 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.38 - 10.0.0.38
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200039 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.39 - 10.0.0.39

 64b-2t2c-ethip4ipsec40tnlsw- 
ip4base-policy-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e7:a0’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.0.102/24
exec ip route add 10.0.0.0/32 via 100.0.0.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.0.1/32 via 100.0.0.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.0.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.1.102/24
exec ip route add 10.0.0.1/32 via 100.0.1.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.1.1/32 via 100.0.1.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.1.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.2.102/24
exec ip route add 10.0.0.2/32 via 100.0.2.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.2.1/32 via 100.0.2.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.2.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.3.102/24
exec ip route add 10.0.0.3/32 via 100.0.3.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.3.1/32 via 100.0.3.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.3.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.4.102/24
exec ip route add 10.0.0.4/32 via 100.0.4.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.4.1/32 via 100.0.4.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.4.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.5.102/24
exec ip route add 10.0.0.5/32 via 100.0.5.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.5.1/32 via 100.0.5.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.5.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.6.102/24
exec ip route add 10.0.0.6/32 via 100.0.6.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.6.1/32 via 100.0.6.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.6.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.7.102/24
exec ip route add 10.0.0.7/32 via 100.0.7.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.7.1/32 via 100.0.7.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.7.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.8.102/24
exec ip route add 10.0.0.8/32 via 100.0.8.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.8.1/32 via 100.0.8.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.8.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.9.102/24
exec ip route add 10.0.0.9/32 via 100.0.9.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.9.1/32 via 100.0.9.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.9.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.10.102/24
exec ip route add 10.0.0.10/32 via 100.0.10.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.10.1/32 via 100.0.10.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.10.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.11.102/24
exec ip route add 10.0.0.11/32 via 100.0.11.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.11.1/32 via 100.0.11.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.11.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.12.102/24
exec ip route add 10.0.0.12/32 via 100.0.12.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.12.1/32 via 100.0.12.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.12.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.13.102/24
exec ip route add 10.0.0.13/32 via 100.0.13.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.13.1/32 via 100.0.13.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.13.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.14.102/24
exec ip route add 10.0.0.14/32 via 100.0.14.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.14.1/32 via 100.0.14.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.14.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.15.102/24
exec ip route add 10.0.0.15/32 via 100.0.15.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.15.1/32 via 100.0.15.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.15.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.16.102/24
exec ip route add 10.0.0.16/32 via 100.0.16.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.16.1/32 via 100.0.16.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.16.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.17.102/24
exec ip route add 10.0.0.17/32 via 100.0.17.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.17.1/32 via 100.0.17.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.17.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.18.102/24
exec ip route add 10.0.0.18/32 via 100.0.18.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.18.1/32 via 100.0.18.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.18.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.19.102/24
exec ip route add 10.0.0.19/32 via 100.0.19.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.19.1/32 via 100.0.19.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.19.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.20.102/24
exec ip route add 10.0.0.20/32 via 100.0.20.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.20.1/32 via 100.0.20.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.20.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.21.102/24
exec ip route add 10.0.0.21/32 via 100.0.21.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.21.1/32 via 100.0.21.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.21.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.22.102/24
exec ip route add 10.0.0.22/32 via 100.0.22.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.22.1/32 via 100.0.22.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.22.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.23.102/24
exec ip route add 10.0.0.23/32 via 100.0.23.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.23.1/32 via 100.0.23.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.23.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.24.102/24
exec ip route add 10.0.0.24/32 via 100.0.24.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.24.1/32 via 100.0.24.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.24.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.25.102/24
exec ip route add 10.0.0.25/32 via 100.0.25.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.25.1/32 via 100.0.25.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.25.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.26.102/24
exec ip route add 10.0.0.26/32 via 100.0.26.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.26.1/32 via 100.0.26.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.26.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.27.102/24
exec ip route add 10.0.0.27/32 via 100.0.27.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.27.1/32 via 100.0.27.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.27.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.28.102/24
exec ip route add 10.0.0.28/32 via 100.0.28.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.28.1/32 via 100.0.28.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.28.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.29.102/24
exec ip route add 10.0.0.29/32 via 100.0.29.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.29.1/32 via 100.0.29.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.29.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.30.102/24
exec ip route add 10.0.0.30/32 via 100.0.30.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.30.1/32 via 100.0.30.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.30.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.31.102/24
exec ip route add 10.0.0.31/32 via 100.0.31.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.31.1/32 via 100.0.31.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.31.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.32.102/24
exec ip route add 10.0.0.32/32 via 100.0.32.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.32.1/32 via 100.0.32.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.32.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.33.102/24
exec ip route add 10.0.0.33/32 via 100.0.33.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.33.1/32 via 100.0.33.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.33.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.34.102/24
exec ip route add 10.0.0.34/32 via 100.0.34.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.34.1/32 via 100.0.34.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.34.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.35.102/24
exec ip route add 10.0.0.35/32 via 100.0.35.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.35.1/32 via 100.0.35.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.35.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.36.102/24
exec ip route add 10.0.0.36/32 via 100.0.36.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.36.1/32 via 100.0.36.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.36.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.37.102/24
exec ip route add 10.0.0.37/32 via 100.0.37.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.37.1/32 via 100.0.37.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.37.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.38.102/24
exec ip route add 10.0.0.38/32 via 100.0.38.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.38.1/32 via 100.0.38.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.38.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.39.102/24
exec ip route add 10.0.0.39/32 via 100.0.39.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.39.1/32 via 100.0.39.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.39.1 40:a6:b7:85:e7:80
ipsec_spd_add_del(is_add=True,spd_id=1)
ipsec_interface_add_del_spd(is_add=True,sw_if_index=2,spd_id=1)
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 100, ‘is_outbound’: True, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 50, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’dxffxffxff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8xffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 100, ‘is_outbound’: False, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 50, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8xffxffxff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’dxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
exec ipsec sa add 100000 esp spi 300000 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 100.0.0.1 tunnel dst 200.0.0.102
exec ipsec sa add 100001 esp spi 300001 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 100.0.1.1 tunnel dst 200.0.1.102
exec ipsec sa add 100002 esp spi 300002 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 100.0.2.1 tunnel dst 200.0.2.102
exec ipsec sa add 100003 esp spi 300003 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 100.0.3.1 tunnel dst 200.0.3.102
exec ipsec sa add 100004 esp spi 300004 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 100.0.4.1 tunnel dst 200.0.4.102
exec ipsec sa add 100005 esp spi 300005 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 100.0.5.1 tunnel dst 200.0.5.102
exec ipsec sa add 100006 esp spi 300006 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 100.0.6.1 tunnel dst 200.0.6.102
exec ipsec sa add 100007 esp spi 300007 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 100.0.7.1 tunnel dst 200.0.7.102
exec ipsec sa add 100008 esp spi 300008 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 100.0.8.1 tunnel dst 200.0.8.102
exec ipsec sa add 100009 esp spi 300009 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 100.0.9.1 tunnel dst 200.0.9.102
exec ipsec sa add 100010 esp spi 300010 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 100.0.10.1 tunnel dst 200.0.10.102
exec ipsec sa add 100011 esp spi 300011 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 100.0.11.1 tunnel dst 200.0.11.102
exec ipsec sa add 100012 esp spi 300012 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 100.0.12.1 tunnel dst 200.0.12.102
exec ipsec sa add 100013 esp spi 300013 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 100.0.13.1 tunnel dst 200.0.13.102
exec ipsec sa add 100014 esp spi 300014 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 100.0.14.1 tunnel dst 200.0.14.102
exec ipsec sa add 100015 esp spi 300015 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 100.0.15.1 tunnel dst 200.0.15.102
exec ipsec sa add 100016 esp spi 300016 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 100.0.16.1 tunnel dst 200.0.16.102
exec ipsec sa add 100017 esp spi 300017 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 100.0.17.1 tunnel dst 200.0.17.102
exec ipsec sa add 100018 esp spi 300018 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 100.0.18.1 tunnel dst 200.0.18.102
exec ipsec sa add 100019 esp spi 300019 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 100.0.19.1 tunnel dst 200.0.19.102
exec ipsec sa add 100020 esp spi 300020 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 100.0.20.1 tunnel dst 200.0.20.102
exec ipsec sa add 100021 esp spi 300021 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 100.0.21.1 tunnel dst 200.0.21.102
exec ipsec sa add 100022 esp spi 300022 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 100.0.22.1 tunnel dst 200.0.22.102
exec ipsec sa add 100023 esp spi 300023 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 100.0.23.1 tunnel dst 200.0.23.102
exec ipsec sa add 100024 esp spi 300024 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 100.0.24.1 tunnel dst 200.0.24.102
exec ipsec sa add 100025 esp spi 300025 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 100.0.25.1 tunnel dst 200.0.25.102
exec ipsec sa add 100026 esp spi 300026 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 100.0.26.1 tunnel dst 200.0.26.102
exec ipsec sa add 100027 esp spi 300027 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 100.0.27.1 tunnel dst 200.0.27.102
exec ipsec sa add 100028 esp spi 300028 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 100.0.28.1 tunnel dst 200.0.28.102
exec ipsec sa add 100029 esp spi 300029 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 100.0.29.1 tunnel dst 200.0.29.102
exec ipsec sa add 100030 esp spi 300030 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 100.0.30.1 tunnel dst 200.0.30.102
exec ipsec sa add 100031 esp spi 300031 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 100.0.31.1 tunnel dst 200.0.31.102
exec ipsec sa add 100032 esp spi 300032 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 100.0.32.1 tunnel dst 200.0.32.102
exec ipsec sa add 100033 esp spi 300033 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 100.0.33.1 tunnel dst 200.0.33.102
exec ipsec sa add 100034 esp spi 300034 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 100.0.34.1 tunnel dst 200.0.34.102
exec ipsec sa add 100035 esp spi 300035 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 100.0.35.1 tunnel dst 200.0.35.102
exec ipsec sa add 100036 esp spi 300036 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 100.0.36.1 tunnel dst 200.0.36.102
exec ipsec sa add 100037 esp spi 300037 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 100.0.37.1 tunnel dst 200.0.37.102
exec ipsec sa add 100038 esp spi 300038 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 100.0.38.1 tunnel dst 200.0.38.102
exec ipsec sa add 100039 esp spi 300039 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 100.0.39.1 tunnel dst 200.0.39.102
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100000 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.0 - 20.0.0.0
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100001 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.1 - 20.0.0.1
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100002 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.2 - 20.0.0.2
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100003 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.3 - 20.0.0.3
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100004 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.4 - 20.0.0.4
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100005 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.5 - 20.0.0.5
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100006 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.6 - 20.0.0.6
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100007 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.7 - 20.0.0.7
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100008 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.8 - 20.0.0.8
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100009 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.9 - 20.0.0.9
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100010 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.10 - 20.0.0.10
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100011 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.11 - 20.0.0.11
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100012 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.12 - 20.0.0.12
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100013 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.13 - 20.0.0.13
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100014 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.14 - 20.0.0.14
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100015 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.15 - 20.0.0.15
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100016 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.16 - 20.0.0.16
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100017 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.17 - 20.0.0.17
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100018 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.18 - 20.0.0.18
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100019 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.19 - 20.0.0.19
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100020 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.20 - 20.0.0.20
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100021 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.21 - 20.0.0.21
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100022 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.22 - 20.0.0.22
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100023 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.23 - 20.0.0.23
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100024 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.24 - 20.0.0.24
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100025 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.25 - 20.0.0.25
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100026 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.26 - 20.0.0.26
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100027 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.27 - 20.0.0.27
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100028 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.28 - 20.0.0.28
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100029 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.29 - 20.0.0.29
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100030 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.30 - 20.0.0.30
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100031 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.31 - 20.0.0.31
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100032 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.32 - 20.0.0.32
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100033 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.33 - 20.0.0.33
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100034 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.34 - 20.0.0.34
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100035 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.35 - 20.0.0.35
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100036 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.36 - 20.0.0.36
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100037 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.37 - 20.0.0.37
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100038 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.38 - 20.0.0.38
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100039 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.39 - 20.0.0.39
exec ipsec sa add 200000 esp spi 400000 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 200.0.0.102 tunnel dst 100.0.0.1
exec ipsec sa add 200001 esp spi 400001 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 200.0.1.102 tunnel dst 100.0.1.1
exec ipsec sa add 200002 esp spi 400002 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 200.0.2.102 tunnel dst 100.0.2.1
exec ipsec sa add 200003 esp spi 400003 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 200.0.3.102 tunnel dst 100.0.3.1
exec ipsec sa add 200004 esp spi 400004 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 200.0.4.102 tunnel dst 100.0.4.1
exec ipsec sa add 200005 esp spi 400005 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 200.0.5.102 tunnel dst 100.0.5.1
exec ipsec sa add 200006 esp spi 400006 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 200.0.6.102 tunnel dst 100.0.6.1
exec ipsec sa add 200007 esp spi 400007 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 200.0.7.102 tunnel dst 100.0.7.1
exec ipsec sa add 200008 esp spi 400008 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 200.0.8.102 tunnel dst 100.0.8.1
exec ipsec sa add 200009 esp spi 400009 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 200.0.9.102 tunnel dst 100.0.9.1
exec ipsec sa add 200010 esp spi 400010 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 200.0.10.102 tunnel dst 100.0.10.1
exec ipsec sa add 200011 esp spi 400011 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 200.0.11.102 tunnel dst 100.0.11.1
exec ipsec sa add 200012 esp spi 400012 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 200.0.12.102 tunnel dst 100.0.12.1
exec ipsec sa add 200013 esp spi 400013 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 200.0.13.102 tunnel dst 100.0.13.1
exec ipsec sa add 200014 esp spi 400014 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 200.0.14.102 tunnel dst 100.0.14.1
exec ipsec sa add 200015 esp spi 400015 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 200.0.15.102 tunnel dst 100.0.15.1
exec ipsec sa add 200016 esp spi 400016 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 200.0.16.102 tunnel dst 100.0.16.1
exec ipsec sa add 200017 esp spi 400017 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 200.0.17.102 tunnel dst 100.0.17.1
exec ipsec sa add 200018 esp spi 400018 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 200.0.18.102 tunnel dst 100.0.18.1
exec ipsec sa add 200019 esp spi 400019 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 200.0.19.102 tunnel dst 100.0.19.1
exec ipsec sa add 200020 esp spi 400020 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 200.0.20.102 tunnel dst 100.0.20.1
exec ipsec sa add 200021 esp spi 400021 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 200.0.21.102 tunnel dst 100.0.21.1
exec ipsec sa add 200022 esp spi 400022 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 200.0.22.102 tunnel dst 100.0.22.1
exec ipsec sa add 200023 esp spi 400023 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 200.0.23.102 tunnel dst 100.0.23.1
exec ipsec sa add 200024 esp spi 400024 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 200.0.24.102 tunnel dst 100.0.24.1
exec ipsec sa add 200025 esp spi 400025 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 200.0.25.102 tunnel dst 100.0.25.1
exec ipsec sa add 200026 esp spi 400026 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 200.0.26.102 tunnel dst 100.0.26.1
exec ipsec sa add 200027 esp spi 400027 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 200.0.27.102 tunnel dst 100.0.27.1
exec ipsec sa add 200028 esp spi 400028 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 200.0.28.102 tunnel dst 100.0.28.1
exec ipsec sa add 200029 esp spi 400029 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 200.0.29.102 tunnel dst 100.0.29.1
exec ipsec sa add 200030 esp spi 400030 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 200.0.30.102 tunnel dst 100.0.30.1
exec ipsec sa add 200031 esp spi 400031 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 200.0.31.102 tunnel dst 100.0.31.1
exec ipsec sa add 200032 esp spi 400032 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 200.0.32.102 tunnel dst 100.0.32.1
exec ipsec sa add 200033 esp spi 400033 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 200.0.33.102 tunnel dst 100.0.33.1
exec ipsec sa add 200034 esp spi 400034 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 200.0.34.102 tunnel dst 100.0.34.1
exec ipsec sa add 200035 esp spi 400035 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 200.0.35.102 tunnel dst 100.0.35.1
exec ipsec sa add 200036 esp spi 400036 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 200.0.36.102 tunnel dst 100.0.36.1
exec ipsec sa add 200037 esp spi 400037 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 200.0.37.102 tunnel dst 100.0.37.1
exec ipsec sa add 200038 esp spi 400038 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 200.0.38.102 tunnel dst 100.0.38.1
exec ipsec sa add 200039 esp spi 400039 crypto-alg aes-gcm-256 crypto-key 45545a485a634d55635a494c7948446646476e6d676f76525367556e546b4d66 tunnel src 200.0.39.102 tunnel dst 100.0.39.1
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200000 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.0 - 10.0.0.0
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200001 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.1 - 10.0.0.1
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200002 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.2 - 10.0.0.2
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200003 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.3 - 10.0.0.3
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200004 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.4 - 10.0.0.4
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200005 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.5 - 10.0.0.5
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200006 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.6 - 10.0.0.6
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200007 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.7 - 10.0.0.7
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200008 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.8 - 10.0.0.8
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200009 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.9 - 10.0.0.9
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200010 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.10 - 10.0.0.10
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200011 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.11 - 10.0.0.11
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200012 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.12 - 10.0.0.12
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200013 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.13 - 10.0.0.13
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200014 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.14 - 10.0.0.14
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200015 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.15 - 10.0.0.15
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200016 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.16 - 10.0.0.16
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200017 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.17 - 10.0.0.17
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200018 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.18 - 10.0.0.18
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200019 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.19 - 10.0.0.19
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200020 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.20 - 10.0.0.20
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200021 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.21 - 10.0.0.21
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200022 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.22 - 10.0.0.22
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200023 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.23 - 10.0.0.23
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200024 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.24 - 10.0.0.24
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200025 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.25 - 10.0.0.25
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200026 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.26 - 10.0.0.26
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200027 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.27 - 10.0.0.27
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200028 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.28 - 10.0.0.28
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200029 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.29 - 10.0.0.29
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200030 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.30 - 10.0.0.30
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200031 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.31 - 10.0.0.31
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200032 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.32 - 10.0.0.32
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200033 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.33 - 10.0.0.33
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200034 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.34 - 10.0.0.34
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200035 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.35 - 10.0.0.35
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200036 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.36 - 10.0.0.36
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200037 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.37 - 10.0.0.37
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200038 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.38 - 10.0.0.38
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200039 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.39 - 10.0.0.39

 64b-4t4c-ethip4ipsec40tnlsw- 
ip4base-policy-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e7:a0’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.0.102/24
exec ip route add 10.0.0.0/32 via 100.0.0.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.0.1/32 via 100.0.0.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.0.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.1.102/24
exec ip route add 10.0.0.1/32 via 100.0.1.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.1.1/32 via 100.0.1.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.1.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.2.102/24
exec ip route add 10.0.0.2/32 via 100.0.2.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.2.1/32 via 100.0.2.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.2.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.3.102/24
exec ip route add 10.0.0.3/32 via 100.0.3.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.3.1/32 via 100.0.3.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.3.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.4.102/24
exec ip route add 10.0.0.4/32 via 100.0.4.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.4.1/32 via 100.0.4.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.4.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.5.102/24
exec ip route add 10.0.0.5/32 via 100.0.5.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.5.1/32 via 100.0.5.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.5.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.6.102/24
exec ip route add 10.0.0.6/32 via 100.0.6.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.6.1/32 via 100.0.6.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.6.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.7.102/24
exec ip route add 10.0.0.7/32 via 100.0.7.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.7.1/32 via 100.0.7.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.7.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.8.102/24
exec ip route add 10.0.0.8/32 via 100.0.8.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.8.1/32 via 100.0.8.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.8.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.9.102/24
exec ip route add 10.0.0.9/32 via 100.0.9.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.9.1/32 via 100.0.9.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.9.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.10.102/24
exec ip route add 10.0.0.10/32 via 100.0.10.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.10.1/32 via 100.0.10.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.10.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.11.102/24
exec ip route add 10.0.0.11/32 via 100.0.11.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.11.1/32 via 100.0.11.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.11.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.12.102/24
exec ip route add 10.0.0.12/32 via 100.0.12.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.12.1/32 via 100.0.12.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.12.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.13.102/24
exec ip route add 10.0.0.13/32 via 100.0.13.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.13.1/32 via 100.0.13.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.13.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.14.102/24
exec ip route add 10.0.0.14/32 via 100.0.14.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.14.1/32 via 100.0.14.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.14.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.15.102/24
exec ip route add 10.0.0.15/32 via 100.0.15.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.15.1/32 via 100.0.15.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.15.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.16.102/24
exec ip route add 10.0.0.16/32 via 100.0.16.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.16.1/32 via 100.0.16.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.16.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.17.102/24
exec ip route add 10.0.0.17/32 via 100.0.17.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.17.1/32 via 100.0.17.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.17.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.18.102/24
exec ip route add 10.0.0.18/32 via 100.0.18.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.18.1/32 via 100.0.18.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.18.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.19.102/24
exec ip route add 10.0.0.19/32 via 100.0.19.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.19.1/32 via 100.0.19.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.19.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.20.102/24
exec ip route add 10.0.0.20/32 via 100.0.20.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.20.1/32 via 100.0.20.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.20.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.21.102/24
exec ip route add 10.0.0.21/32 via 100.0.21.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.21.1/32 via 100.0.21.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.21.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.22.102/24
exec ip route add 10.0.0.22/32 via 100.0.22.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.22.1/32 via 100.0.22.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.22.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.23.102/24
exec ip route add 10.0.0.23/32 via 100.0.23.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.23.1/32 via 100.0.23.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.23.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.24.102/24
exec ip route add 10.0.0.24/32 via 100.0.24.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.24.1/32 via 100.0.24.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.24.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.25.102/24
exec ip route add 10.0.0.25/32 via 100.0.25.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.25.1/32 via 100.0.25.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.25.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.26.102/24
exec ip route add 10.0.0.26/32 via 100.0.26.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.26.1/32 via 100.0.26.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.26.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.27.102/24
exec ip route add 10.0.0.27/32 via 100.0.27.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.27.1/32 via 100.0.27.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.27.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.28.102/24
exec ip route add 10.0.0.28/32 via 100.0.28.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.28.1/32 via 100.0.28.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.28.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.29.102/24
exec ip route add 10.0.0.29/32 via 100.0.29.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.29.1/32 via 100.0.29.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.29.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.30.102/24
exec ip route add 10.0.0.30/32 via 100.0.30.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.30.1/32 via 100.0.30.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.30.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.31.102/24
exec ip route add 10.0.0.31/32 via 100.0.31.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.31.1/32 via 100.0.31.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.31.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.32.102/24
exec ip route add 10.0.0.32/32 via 100.0.32.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.32.1/32 via 100.0.32.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.32.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.33.102/24
exec ip route add 10.0.0.33/32 via 100.0.33.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.33.1/32 via 100.0.33.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.33.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.34.102/24
exec ip route add 10.0.0.34/32 via 100.0.34.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.34.1/32 via 100.0.34.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.34.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.35.102/24
exec ip route add 10.0.0.35/32 via 100.0.35.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.35.1/32 via 100.0.35.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.35.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.36.102/24
exec ip route add 10.0.0.36/32 via 100.0.36.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.36.1/32 via 100.0.36.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.36.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.37.102/24
exec ip route add 10.0.0.37/32 via 100.0.37.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.37.1/32 via 100.0.37.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.37.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.38.102/24
exec ip route add 10.0.0.38/32 via 100.0.38.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.38.1/32 via 100.0.38.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.38.1 40:a6:b7:85:e7:80
exec set interface ip address FortyGigabitEthernet4/0/1 200.0.39.102/24
exec ip route add 10.0.0.39/32 via 100.0.39.1 FortyGigabitEthernet4/0/1
exec ip route add 100.0.39.1/32 via 100.0.39.1 FortyGigabitEthernet4/0/1
exec set ip neighbor FortyGigabitEthernet4/0/1 100.0.39.1 40:a6:b7:85:e7:80
ipsec_spd_add_del(is_add=True,spd_id=1)
ipsec_interface_add_del_spd(is_add=True,sw_if_index=2,spd_id=1)
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 100, ‘is_outbound’: True, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 50, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’dxffxffxff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8xffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
ipsec_spd_entry_add_del(is_add=True,entry={‘spd_id’: 1, ‘priority’: 100, ‘is_outbound’: False, ‘sa_id’: 0, ‘policy’: 0, ‘protocol’: 50, ‘remote_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00x00’}}, ‘remote_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8xffxffxff’}}, ‘local_address_start’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x00’}}, ‘local_address_stop’: {‘af’: 0, ‘un’: {‘ip4’: b’dxffxffxff’}}, ‘remote_port_start’: 0, ‘remote_port_stop’: 65535, ‘local_port_start’: 0, ‘local_port_stop’: 65535})
exec ipsec sa add 100000 esp spi 300000 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 100.0.0.1 tunnel dst 200.0.0.102
exec ipsec sa add 100001 esp spi 300001 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 100.0.1.1 tunnel dst 200.0.1.102
exec ipsec sa add 100002 esp spi 300002 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 100.0.2.1 tunnel dst 200.0.2.102
exec ipsec sa add 100003 esp spi 300003 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 100.0.3.1 tunnel dst 200.0.3.102
exec ipsec sa add 100004 esp spi 300004 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 100.0.4.1 tunnel dst 200.0.4.102
exec ipsec sa add 100005 esp spi 300005 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 100.0.5.1 tunnel dst 200.0.5.102
exec ipsec sa add 100006 esp spi 300006 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 100.0.6.1 tunnel dst 200.0.6.102
exec ipsec sa add 100007 esp spi 300007 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 100.0.7.1 tunnel dst 200.0.7.102
exec ipsec sa add 100008 esp spi 300008 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 100.0.8.1 tunnel dst 200.0.8.102
exec ipsec sa add 100009 esp spi 300009 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 100.0.9.1 tunnel dst 200.0.9.102
exec ipsec sa add 100010 esp spi 300010 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 100.0.10.1 tunnel dst 200.0.10.102
exec ipsec sa add 100011 esp spi 300011 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 100.0.11.1 tunnel dst 200.0.11.102
exec ipsec sa add 100012 esp spi 300012 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 100.0.12.1 tunnel dst 200.0.12.102
exec ipsec sa add 100013 esp spi 300013 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 100.0.13.1 tunnel dst 200.0.13.102
exec ipsec sa add 100014 esp spi 300014 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 100.0.14.1 tunnel dst 200.0.14.102
exec ipsec sa add 100015 esp spi 300015 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 100.0.15.1 tunnel dst 200.0.15.102
exec ipsec sa add 100016 esp spi 300016 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 100.0.16.1 tunnel dst 200.0.16.102
exec ipsec sa add 100017 esp spi 300017 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 100.0.17.1 tunnel dst 200.0.17.102
exec ipsec sa add 100018 esp spi 300018 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 100.0.18.1 tunnel dst 200.0.18.102
exec ipsec sa add 100019 esp spi 300019 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 100.0.19.1 tunnel dst 200.0.19.102
exec ipsec sa add 100020 esp spi 300020 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 100.0.20.1 tunnel dst 200.0.20.102
exec ipsec sa add 100021 esp spi 300021 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 100.0.21.1 tunnel dst 200.0.21.102
exec ipsec sa add 100022 esp spi 300022 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 100.0.22.1 tunnel dst 200.0.22.102
exec ipsec sa add 100023 esp spi 300023 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 100.0.23.1 tunnel dst 200.0.23.102
exec ipsec sa add 100024 esp spi 300024 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 100.0.24.1 tunnel dst 200.0.24.102
exec ipsec sa add 100025 esp spi 300025 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 100.0.25.1 tunnel dst 200.0.25.102
exec ipsec sa add 100026 esp spi 300026 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 100.0.26.1 tunnel dst 200.0.26.102
exec ipsec sa add 100027 esp spi 300027 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 100.0.27.1 tunnel dst 200.0.27.102
exec ipsec sa add 100028 esp spi 300028 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 100.0.28.1 tunnel dst 200.0.28.102
exec ipsec sa add 100029 esp spi 300029 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 100.0.29.1 tunnel dst 200.0.29.102
exec ipsec sa add 100030 esp spi 300030 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 100.0.30.1 tunnel dst 200.0.30.102
exec ipsec sa add 100031 esp spi 300031 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 100.0.31.1 tunnel dst 200.0.31.102
exec ipsec sa add 100032 esp spi 300032 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 100.0.32.1 tunnel dst 200.0.32.102
exec ipsec sa add 100033 esp spi 300033 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 100.0.33.1 tunnel dst 200.0.33.102
exec ipsec sa add 100034 esp spi 300034 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 100.0.34.1 tunnel dst 200.0.34.102
exec ipsec sa add 100035 esp spi 300035 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 100.0.35.1 tunnel dst 200.0.35.102
exec ipsec sa add 100036 esp spi 300036 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 100.0.36.1 tunnel dst 200.0.36.102
exec ipsec sa add 100037 esp spi 300037 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 100.0.37.1 tunnel dst 200.0.37.102
exec ipsec sa add 100038 esp spi 300038 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 100.0.38.1 tunnel dst 200.0.38.102
exec ipsec sa add 100039 esp spi 300039 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 100.0.39.1 tunnel dst 200.0.39.102
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100000 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.0 - 20.0.0.0
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100001 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.1 - 20.0.0.1
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100002 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.2 - 20.0.0.2
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100003 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.3 - 20.0.0.3
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100004 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.4 - 20.0.0.4
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100005 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.5 - 20.0.0.5
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100006 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.6 - 20.0.0.6
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100007 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.7 - 20.0.0.7
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100008 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.8 - 20.0.0.8
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100009 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.9 - 20.0.0.9
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100010 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.10 - 20.0.0.10
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100011 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.11 - 20.0.0.11
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100012 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.12 - 20.0.0.12
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100013 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.13 - 20.0.0.13
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100014 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.14 - 20.0.0.14
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100015 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.15 - 20.0.0.15
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100016 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.16 - 20.0.0.16
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100017 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.17 - 20.0.0.17
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100018 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.18 - 20.0.0.18
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100019 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.19 - 20.0.0.19
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100020 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.20 - 20.0.0.20
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100021 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.21 - 20.0.0.21
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100022 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.22 - 20.0.0.22
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100023 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.23 - 20.0.0.23
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100024 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.24 - 20.0.0.24
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100025 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.25 - 20.0.0.25
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100026 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.26 - 20.0.0.26
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100027 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.27 - 20.0.0.27
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100028 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.28 - 20.0.0.28
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100029 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.29 - 20.0.0.29
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100030 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.30 - 20.0.0.30
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100031 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.31 - 20.0.0.31
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100032 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.32 - 20.0.0.32
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100033 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.33 - 20.0.0.33
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100034 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.34 - 20.0.0.34
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100035 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.35 - 20.0.0.35
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100036 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.36 - 20.0.0.36
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100037 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.37 - 20.0.0.37
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100038 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.38 - 20.0.0.38
exec ipsec policy add spd 1 priority 10 inbound action protect sa 100039 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 20.0.0.39 - 20.0.0.39
exec ipsec sa add 200000 esp spi 400000 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 200.0.0.102 tunnel dst 100.0.0.1
exec ipsec sa add 200001 esp spi 400001 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 200.0.1.102 tunnel dst 100.0.1.1
exec ipsec sa add 200002 esp spi 400002 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 200.0.2.102 tunnel dst 100.0.2.1
exec ipsec sa add 200003 esp spi 400003 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 200.0.3.102 tunnel dst 100.0.3.1
exec ipsec sa add 200004 esp spi 400004 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 200.0.4.102 tunnel dst 100.0.4.1
exec ipsec sa add 200005 esp spi 400005 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 200.0.5.102 tunnel dst 100.0.5.1
exec ipsec sa add 200006 esp spi 400006 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 200.0.6.102 tunnel dst 100.0.6.1
exec ipsec sa add 200007 esp spi 400007 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 200.0.7.102 tunnel dst 100.0.7.1
exec ipsec sa add 200008 esp spi 400008 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 200.0.8.102 tunnel dst 100.0.8.1
exec ipsec sa add 200009 esp spi 400009 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 200.0.9.102 tunnel dst 100.0.9.1
exec ipsec sa add 200010 esp spi 400010 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 200.0.10.102 tunnel dst 100.0.10.1
exec ipsec sa add 200011 esp spi 400011 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 200.0.11.102 tunnel dst 100.0.11.1
exec ipsec sa add 200012 esp spi 400012 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 200.0.12.102 tunnel dst 100.0.12.1
exec ipsec sa add 200013 esp spi 400013 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 200.0.13.102 tunnel dst 100.0.13.1
exec ipsec sa add 200014 esp spi 400014 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 200.0.14.102 tunnel dst 100.0.14.1
exec ipsec sa add 200015 esp spi 400015 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 200.0.15.102 tunnel dst 100.0.15.1
exec ipsec sa add 200016 esp spi 400016 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 200.0.16.102 tunnel dst 100.0.16.1
exec ipsec sa add 200017 esp spi 400017 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 200.0.17.102 tunnel dst 100.0.17.1
exec ipsec sa add 200018 esp spi 400018 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 200.0.18.102 tunnel dst 100.0.18.1
exec ipsec sa add 200019 esp spi 400019 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 200.0.19.102 tunnel dst 100.0.19.1
exec ipsec sa add 200020 esp spi 400020 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 200.0.20.102 tunnel dst 100.0.20.1
exec ipsec sa add 200021 esp spi 400021 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 200.0.21.102 tunnel dst 100.0.21.1
exec ipsec sa add 200022 esp spi 400022 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 200.0.22.102 tunnel dst 100.0.22.1
exec ipsec sa add 200023 esp spi 400023 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 200.0.23.102 tunnel dst 100.0.23.1
exec ipsec sa add 200024 esp spi 400024 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 200.0.24.102 tunnel dst 100.0.24.1
exec ipsec sa add 200025 esp spi 400025 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 200.0.25.102 tunnel dst 100.0.25.1
exec ipsec sa add 200026 esp spi 400026 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 200.0.26.102 tunnel dst 100.0.26.1
exec ipsec sa add 200027 esp spi 400027 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 200.0.27.102 tunnel dst 100.0.27.1
exec ipsec sa add 200028 esp spi 400028 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 200.0.28.102 tunnel dst 100.0.28.1
exec ipsec sa add 200029 esp spi 400029 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 200.0.29.102 tunnel dst 100.0.29.1
exec ipsec sa add 200030 esp spi 400030 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 200.0.30.102 tunnel dst 100.0.30.1
exec ipsec sa add 200031 esp spi 400031 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 200.0.31.102 tunnel dst 100.0.31.1
exec ipsec sa add 200032 esp spi 400032 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 200.0.32.102 tunnel dst 100.0.32.1
exec ipsec sa add 200033 esp spi 400033 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 200.0.33.102 tunnel dst 100.0.33.1
exec ipsec sa add 200034 esp spi 400034 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 200.0.34.102 tunnel dst 100.0.34.1
exec ipsec sa add 200035 esp spi 400035 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 200.0.35.102 tunnel dst 100.0.35.1
exec ipsec sa add 200036 esp spi 400036 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 200.0.36.102 tunnel dst 100.0.36.1
exec ipsec sa add 200037 esp spi 400037 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 200.0.37.102 tunnel dst 100.0.37.1
exec ipsec sa add 200038 esp spi 400038 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 200.0.38.102 tunnel dst 100.0.38.1
exec ipsec sa add 200039 esp spi 400039 crypto-alg aes-gcm-256 crypto-key 4872536a6d46616b5a584950565a4f4776785544635052644554475953797572 tunnel src 200.0.39.102 tunnel dst 100.0.39.1
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200000 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.0 - 10.0.0.0
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200001 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.1 - 10.0.0.1
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200002 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.2 - 10.0.0.2
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200003 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.3 - 10.0.0.3
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200004 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.4 - 10.0.0.4
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200005 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.5 - 10.0.0.5
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200006 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.6 - 10.0.0.6
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200007 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.7 - 10.0.0.7
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200008 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.8 - 10.0.0.8
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200009 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.9 - 10.0.0.9
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200010 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.10 - 10.0.0.10
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200011 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.11 - 10.0.0.11
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200012 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.12 - 10.0.0.12
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200013 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.13 - 10.0.0.13
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200014 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.14 - 10.0.0.14
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200015 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.15 - 10.0.0.15
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200016 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.16 - 10.0.0.16
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200017 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.17 - 10.0.0.17
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200018 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.18 - 10.0.0.18
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200019 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.19 - 10.0.0.19
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200020 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.20 - 10.0.0.20
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200021 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.21 - 10.0.0.21
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200022 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.22 - 10.0.0.22
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200023 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.23 - 10.0.0.23
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200024 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.24 - 10.0.0.24
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200025 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.25 - 10.0.0.25
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200026 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.26 - 10.0.0.26
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200027 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.27 - 10.0.0.27
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200028 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.28 - 10.0.0.28
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200029 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.29 - 10.0.0.29
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200030 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.30 - 10.0.0.30
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200031 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.31 - 10.0.0.31
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200032 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.32 - 10.0.0.32
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200033 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.33 - 10.0.0.33
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200034 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.34 - 10.0.0.34
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200035 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.35 - 10.0.0.35
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200036 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.36 - 10.0.0.36
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200037 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.37 - 10.0.0.37
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200038 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.38 - 10.0.0.38
exec ipsec policy add spd 1 priority 10 outbound action protect sa 200039 local-ip-range 0.0.0.0 - 255.255.255.255 remote-ip-range 10.0.0.39 - 10.0.0.39

40ge2p1xl710-ethip4ipsec4tnlsw-ip4base-int-aes128cbc-hmac512sha-mrr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular opology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG vefication: In MaxReceivedRate tests TG sends traffic at line rate and reports total received packets over trial period. Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to

umber of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG ode interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 1518b-1t1c-ethip4ipsec4tnlsw-ip4base- 
int-aes128cbc-hmac512sha-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e7:a0’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’tOsulwjdIcXoPNJM’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’GQvHLTWiGzdZqWoBqNRGOAPzEwhvEQTVQKyfLWxjzOEHAgxboGGgUbHoDfpvLHZE’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’tOsulwjdIcXoPNJM’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’GQvHLTWiGzdZqWoBqNRGOAPzEwhvEQTVQKyfLWxjzOEHAgxboGGgUbHoDfpvLHZE’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’GMCwEqcMSpQucQXK’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’lPdZLRktgCProcbQQdBrAUmSgfoMuqzVvpzmSievtzwNaHlHxVGzMQLpcssjYEvw’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’GMCwEqcMSpQucQXK’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’lPdZLRktgCProcbQQdBrAUmSgfoMuqzVvpzmSievtzwNaHlHxVGzMQLpcssjYEvw’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’vcwZSmTgUdfSorFq’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’PEpDYFymFnYuvWETalZLJUQDxIeXoMJioKwKOHAfeHQIEAKlXfndStabLbHwDcOa’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’vcwZSmTgUdfSorFq’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’PEpDYFymFnYuvWETalZLJUQDxIeXoMJioKwKOHAfeHQIEAKlXfndStabLbHwDcOa’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’GyzAKAPCdoXuDzsO’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’OqbcSHWboVZWGEDBxwdEENuHRbeSkhiGTMTsFnXKsWhKneUSCQKdfpsCLCVcjwmn’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’GyzAKAPCdoXuDzsO’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’OqbcSHWboVZWGEDBxwdEENuHRbeSkhiGTMTsFnXKsWhKneUSCQKdfpsCLCVcjwmn’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-2t2c-ethip4ipsec4tnlsw-ip4base- 
int-aes128cbc-hmac512sha-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e7:a0’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’tgYjMXcYcasEJXUf’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’YKWGFMSkjUQnBWpHkhHsPpncYkteyjDVgLlwRLfCrNjKezxPjZgbVKwNFssoNMoS’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’tgYjMXcYcasEJXUf’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’YKWGFMSkjUQnBWpHkhHsPpncYkteyjDVgLlwRLfCrNjKezxPjZgbVKwNFssoNMoS’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’KyGItMWhnsAOUUyn’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’YvjSGUKJKPCPAwYwFJPvCZgQVEKHGYWESEazEazSzyakOSDCHhHkxfJiQveZfdTE’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’KyGItMWhnsAOUUyn’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’YvjSGUKJKPCPAwYwFJPvCZgQVEKHGYWESEazEazSzyakOSDCHhHkxfJiQveZfdTE’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’eUXIpRUoIgCIanqe’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’KbPgQaTLIuindAwkvAPAaFKYqBuSMuqKubEnhVwOuiFTTfqlXLlgSlqkvLqbkhpQ’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’eUXIpRUoIgCIanqe’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’KbPgQaTLIuindAwkvAPAaFKYqBuSMuqKubEnhVwOuiFTTfqlXLlgSlqkvLqbkhpQ’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’lryLCAyJDyUEfcIx’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’yEZIUeImjotEMseBXZxpPVLDEDifVnfMlLcXqGcaeNDlcowXeDRHTkURDPuiLamU’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’lryLCAyJDyUEfcIx’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’yEZIUeImjotEMseBXZxpPVLDEDifVnfMlLcXqGcaeNDlcowXeDRHTkURDPuiLamU’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-4t4c-ethip4ipsec4tnlsw-ip4base- 
int-aes128cbc-hmac512sha-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e7:a0’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’pIbQPcLAdrzXgpzF’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’qVbTOJetMMRByojhNPyGdDfMpBIWhfugyQXMXQiiHrReBzTgXOlEFjUxHEyQVzrR’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’pIbQPcLAdrzXgpzF’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’qVbTOJetMMRByojhNPyGdDfMpBIWhfugyQXMXQiiHrReBzTgXOlEFjUxHEyQVzrR’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’QsYkMRIWPqREiNNL’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’IKgdBpYeBygUjSHlpXfYkCiJAInvlSwAKpKrXbWqPEEceWKKQZxaqjLoHNSbtwsk’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’QsYkMRIWPqREiNNL’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’IKgdBpYeBygUjSHlpXfYkCiJAInvlSwAKpKrXbWqPEEceWKKQZxaqjLoHNSbtwsk’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’GCjZDUHKQfRejJrT’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’VaMfyDNRoGzmtkNjuIxYQEUKhIXyUQqpzPcveNZQmEWdhuahBHAkoLQpSGGehASV’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’GCjZDUHKQfRejJrT’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’VaMfyDNRoGzmtkNjuIxYQEUKhIXyUQqpzPcveNZQmEWdhuahBHAkoLQpSGGehASV’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’hMJgkUTXFYgMUMhX’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’DVFpSPSepSReYAnAgkKIyGpLNinuOYpyDktLFOUCvUNgteTXuGUPnsbGcNevkHzx’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’hMJgkUTXFYgMUMhX’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’DVFpSPSepSReYAnAgkKIyGpLNinuOYpyDktLFOUCvUNgteTXuGUPnsbGcNevkHzx’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-1t1c-ethip4ipsec4tnlsw-ip4base- 
int-aes128cbc-hmac512sha-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e7:a0’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’DlSBxfduLzZCvFal’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’wJZTFfpGvxwwCtxvFYDufLcgCKttCmEsSHBVghBqRrKibPMfIhkjkdAhSaDAkGqy’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’DlSBxfduLzZCvFal’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’wJZTFfpGvxwwCtxvFYDufLcgCKttCmEsSHBVghBqRrKibPMfIhkjkdAhSaDAkGqy’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’XWSLctrluDGTohUY’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’YbgxDRtFtJoTImatbuTcZepNXiJJBKbLspKnPhwIMsFTrHwIYXyOlNHhyOFXHriO’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’XWSLctrluDGTohUY’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’YbgxDRtFtJoTImatbuTcZepNXiJJBKbLspKnPhwIMsFTrHwIYXyOlNHhyOFXHriO’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’oauVHQbjcoGGgFYg’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’BtTJfEOVjUmdZfHEvxixFsVCgroChyuByGLywZWHbqXgXyZdUJsoxIpOLJkNcOhP’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’oauVHQbjcoGGgFYg’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’BtTJfEOVjUmdZfHEvxixFsVCgroChyuByGLywZWHbqXgXyZdUJsoxIpOLJkNcOhP’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’aDIwASoCejpRUtal’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’VCzmuAigUirSbQYksOZPzlojhOoqGYvDesBEPKCcxIUeKIhjBkMhFLOGwYmYXnVs’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’aDIwASoCejpRUtal’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’VCzmuAigUirSbQYksOZPzlojhOoqGYvDesBEPKCcxIUeKIhjBkMhFLOGwYmYXnVs’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-2t2c-ethip4ipsec4tnlsw-ip4base- 
int-aes128cbc-hmac512sha-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e7:a0’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’SnhrsaSbktIxUENG’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’fpKOgiuWjObWYlfAmijenJWyEPvSBEyXKTQwjgGPYVHqDhHCTqjpNxDoOJAxtqYV’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’SnhrsaSbktIxUENG’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’fpKOgiuWjObWYlfAmijenJWyEPvSBEyXKTQwjgGPYVHqDhHCTqjpNxDoOJAxtqYV’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’hvzekcfkynfSYEKh’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’WdBjFZoVdSPXTZWjeuIMFPLvqSIUNhKFNWqPnoEpQFSIvesBCkAvAUKbakNappvJ’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’hvzekcfkynfSYEKh’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’WdBjFZoVdSPXTZWjeuIMFPLvqSIUNhKFNWqPnoEpQFSIvesBCkAvAUKbakNappvJ’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’BYnsnNPnKvnVheno’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’oiLLDCauRKccHtvcDSXcQQmLXOpHpDSYblrYVIKGkkaNbaSwVoliYOyVCEdpQbXa’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’BYnsnNPnKvnVheno’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’oiLLDCauRKccHtvcDSXcQQmLXOpHpDSYblrYVIKGkkaNbaSwVoliYOyVCEdpQbXa’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’syWvsROodKuCFtbq’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’MbvuKSvVPplolgBfqiwfDUDxtkzcpiTKhYlMlCyraRHVKCyKkIMeKZNOvuDlhIRZ’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’syWvsROodKuCFtbq’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’MbvuKSvVPplolgBfqiwfDUDxtkzcpiTKhYlMlCyraRHVKCyKkIMeKZNOvuDlhIRZ’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-4t4c-ethip4ipsec4tnlsw-ip4base- 
int-aes128cbc-hmac512sha-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e7:a0’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’LeLUvcZhEHzeOMBL’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’prElaiepyWfTGnDGtGWsVZMmJmWtpJBrjeYYiPVSqhuUbzLeXkMkNzwSulMyqQCM’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’LeLUvcZhEHzeOMBL’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’prElaiepyWfTGnDGtGWsVZMmJmWtpJBrjeYYiPVSqhuUbzLeXkMkNzwSulMyqQCM’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’VPfzZjNINFAyeCbK’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’lDBveqgnlPlIGlemRoIotCnEKHWxfaEWXTEVOogUTSjjCgKpGUtfSreUtpNsidqk’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’VPfzZjNINFAyeCbK’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’lDBveqgnlPlIGlemRoIotCnEKHWxfaEWXTEVOogUTSjjCgKpGUtfSreUtpNsidqk’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’BbrgVmpaBHhIYRKN’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’rXYSyUoufYTUqBbzWOyewGwzjvNuUwHPwUnkmzQhvPjHcfSshMCjpaPqENslmDWX’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’BbrgVmpaBHhIYRKN’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’rXYSyUoufYTUqBbzWOyewGwzjvNuUwHPwUnkmzQhvPjHcfSshMCjpaPqENslmDWX’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’OwXSSKwwQngxeUKI’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’XCGDwxzCNmrgYaxbeUvyKsKFGruEcfiXjFmkKhxEmZfyIezHCAHPxrMmhLYKRBMn’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’OwXSSKwwQngxeUKI’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’XCGDwxzCNmrgYaxbeUvyKsKFGruEcfiXjFmkKhxEmZfyIezHCAHPxrMmhLYKRBMn’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

40ge2p1xl710-ethip4ipsec4tnlsw-ip4base-int-aes128gcm-mrr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular opology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG vefication: In MaxReceivedRate tests TG sends traffic at line rate and reports total received packets over trial period. Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to

umber of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG ode interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 1518b-1t1c-ethip4ipsec4tnlsw- 
ip4base-int-aes128gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e7:a0’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’bPCxTJZVpMVbQWmk’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’bPCxTJZVpMVbQWmk’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’FIiFUOQSxbVFREBn’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’FIiFUOQSxbVFREBn’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’uzevbXTeanVYiztR’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’uzevbXTeanVYiztR’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’SvlMFolYyjYQAsWg’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’SvlMFolYyjYQAsWg’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-2t2c-ethip4ipsec4tnlsw- 
ip4base-int-aes128gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e7:a0’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’DMTZDWDKuFtoDnOm’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’DMTZDWDKuFtoDnOm’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’qgDqWSDHHeXCDhWi’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’qgDqWSDHHeXCDhWi’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’fQFIUMgVMuhwMAfb’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’fQFIUMgVMuhwMAfb’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’veydqzkVqqMLFtLs’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’veydqzkVqqMLFtLs’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-4t4c-ethip4ipsec4tnlsw- 
ip4base-int-aes128gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e7:a0’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’mSqHRSISjAcOkQOm’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’mSqHRSISjAcOkQOm’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’KhXFMIFgYmnBctzD’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’KhXFMIFgYmnBctzD’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’ublXtpsyaKmdXLiY’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’ublXtpsyaKmdXLiY’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’tCIvJfmuLXlBHXoY’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’tCIvJfmuLXlBHXoY’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-1t1c-ethip4ipsec4tnlsw- 
ip4base-int-aes128gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e7:a0’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’jloIePKJioHyLhTg’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’jloIePKJioHyLhTg’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’WibtpURqZlKlTnrI’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’WibtpURqZlKlTnrI’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’NgfVKSbYwjIAMmqe’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’NgfVKSbYwjIAMmqe’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’ZNMlBOwcNqjikrIk’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’ZNMlBOwcNqjikrIk’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-2t2c-ethip4ipsec4tnlsw- 
ip4base-int-aes128gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e7:a0’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’UKDUszmLUWiguvMe’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’UKDUszmLUWiguvMe’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’YYpSDeEwYIjOSfDD’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’YYpSDeEwYIjOSfDD’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’aSXVqSVIHdpzwmfy’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’aSXVqSVIHdpzwmfy’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’gSikbzcIHEJVVYbD’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’gSikbzcIHEJVVYbD’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-4t4c-ethip4ipsec4tnlsw- 
ip4base-int-aes128gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e7:a0’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’SdwxSkIgLCHmMjvZ’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’SdwxSkIgLCHmMjvZ’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’RnoVIXTXtaoIQVvZ’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’RnoVIXTXtaoIQVvZ’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’NzwTgngiQMVlQRQi’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’NzwTgngiQMVlQRQi’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’wlNxqylCzROameei’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 7, ‘crypto_key’: {‘length’: 16, ‘data’: b’wlNxqylCzROameei’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

40ge2p1xl710-ethip4ipsec4tnlsw-ip4base-int-aes256gcm-mrr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular opology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG vefication: In MaxReceivedRate tests TG sends traffic at line rate and reports total received packets over trial period. Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to

umber of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG ode interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 1518b-1t1c-ethip4ipsec4tnlsw- 
ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e7:a0’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’OTdaFoeOobwLFtLkigZYhDzICZOjHiNG’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’OTdaFoeOobwLFtLkigZYhDzICZOjHiNG’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’WrkZwTDGvpHHySHsPjQBBDBWVLCdycnC’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’WrkZwTDGvpHHySHsPjQBBDBWVLCdycnC’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’jmpWTdqCXljULBbYsGLmprjsBNcozwLE’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’jmpWTdqCXljULBbYsGLmprjsBNcozwLE’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’ohMaBfgcaOICTUYdcQqMyAGMHXqDllpS’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’ohMaBfgcaOICTUYdcQqMyAGMHXqDllpS’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-2t2c-ethip4ipsec4tnlsw- 
ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e7:a0’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’difLwugaZPRGdhiUwSKBSAcneOioeUEh’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’difLwugaZPRGdhiUwSKBSAcneOioeUEh’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’VsbMKXgfbxAQtaJEVnkIDSJIwEapIgtf’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’VsbMKXgfbxAQtaJEVnkIDSJIwEapIgtf’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’qbzhGMXyUXDKTOAlEOavlxHxPHoXrUhy’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’qbzhGMXyUXDKTOAlEOavlxHxPHoXrUhy’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’fYaCQFIwiRSjohAubuzPHRPvppejJQbR’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’fYaCQFIwiRSjohAubuzPHRPvppejJQbR’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-4t4c-ethip4ipsec4tnlsw- 
ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e7:a0’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’GlzIXqoIcEMSWDWIyPrvofTLEpDUpFqx’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’GlzIXqoIcEMSWDWIyPrvofTLEpDUpFqx’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’iYvFRICCDlgZTLNyNEcsSBiRBusYSkSN’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’iYvFRICCDlgZTLNyNEcsSBiRBusYSkSN’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’AfNpZUWSIqdcUJrWdyDCXsyqEoOJzcbE’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’AfNpZUWSIqdcUJrWdyDCXsyqEoOJzcbE’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’zdNmriMsllSjsBEeRLSPkAnmIxnNvwWw’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’zdNmriMsllSjsBEeRLSPkAnmIxnNvwWw’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-1t1c-ethip4ipsec4tnlsw- 
ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e7:a0’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’FdBLhqFKZwzIHhqQMXEFXzGkEIYrEfUv’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’FdBLhqFKZwzIHhqQMXEFXzGkEIYrEfUv’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’UWrVyTWRgEhbbHCFLSZwuMuFilWiWjlI’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’UWrVyTWRgEhbbHCFLSZwuMuFilWiWjlI’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’slJlTUbxEpDvQjdwEEmiTMsgyEouoomM’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’slJlTUbxEpDvQjdwEEmiTMsgyEouoomM’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’IiyKCPxTdzzbrYINTAIcvuRrEhzhOcOV’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’IiyKCPxTdzzbrYINTAIcvuRrEhzhOcOV’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-2t2c-ethip4ipsec4tnlsw- 
ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e7:a0’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’opRJGolhOtGbjflwLiCcoAFIweLUTUnD’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’opRJGolhOtGbjflwLiCcoAFIweLUTUnD’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’UvMmBpaxgFTFxvRNWmjpbGpKUNMZLFZZ’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’UvMmBpaxgFTFxvRNWmjpbGpKUNMZLFZZ’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’BFQTRkTFUuujEuAthIXjkKeDzUHtVWJZ’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’BFQTRkTFUuujEuAthIXjkKeDzUHtVWJZ’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’NtAazdqeWVDeOXuqlUjZNCmXiXOxEwws’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’NtAazdqeWVDeOXuqlUjZNCmXiXOxEwws’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-4t4c-ethip4ipsec4tnlsw- 
ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:c3:e7:a0’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’UyWzVKIQHcbbYTdUgcSDHxBgFowQIpyD’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’UyWzVKIQHcbbYTdUgcSDHxBgFowQIpyD’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’qaEkMMINSicBAVWRuXzWtoTJIjKlRTgu’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’qaEkMMINSicBAVWRuXzWtoTJIjKlRTgu’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’WjzyVAKQsgjFfeDzmktPLRyDgEpfgGtm’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’WjzyVAKQsgjFfeDzmktPLRyDgEpfgGtm’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’RUwugGvBGPHSNXkPCHOrMdSkNUSSxwzx’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’RUwugGvBGPHSNXkPCHOrMdSkNUSSxwzx’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})